full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/857.ps1
|
857.ps1
|
function New-HDInsightAndVNet {
$ErrorActionPreference = "Stop"
$context = Get-AzContext
if ($context -eq $null) {
Connect-AzAccount
}
$context
$resourceGroupName = Read-Host -Prompt "Enter the Azure Resource Group name"
$location = Read-Host -Prompt "Enter the Azure region to use"
$networkName = Read-Host -Prompt "Enter the name of the virtual network"
$storageName = Read-Host -Prompt "Enter the storage account name"
$clusterName = Read-Host -Prompt "Enter the HDInsight cluster name"
$adminCreds = Get-Credential -Message "Enter the HTTPS user name and password for the HDInsight cluster" -UserName "admin"
$sshCreds = Get-Credential -Message "Enter the SSH user name and password for the HDInsight cluster" -UserName "sshuser"
$defaultContainerName = $clusterName
$hdiWorkerNodes = 4
$hdiVersion = "3.5"
$hdiType = "Hadoop"
$defaultSubnetName = "default"
$networkAddressPrefix = "10.0.0.0/16"
$defaultSubnetPrefix = "10.0.0.0/24"
New-AzResourceGroup -Name $resourceGroupName -Location $location
$defaultSubnetConfig = New-AzVirtualNetworkSubnetConfig -Name $defaultSubnetName `
-AddressPrefix $defaultSubnetPrefix
New-AzVirtualNetwork -Name $networkName `
-ResourceGroupName $resourceGroupName `
-Location $location `
-AddressPrefix $networkAddressPrefix `
-Subnet $defaultSubnetConfig
$network = Get-AzVirtualNetwork -Name $networkName `
-ResourceGroupName $resourceGroupName
$defaultSubnet = Get-AzVirtualNetworkSubnetConfig -Name $defaultSubnetName `
-VirtualNetwork $network
New-AzStorageAccount `
-ResourceGroupName $resourceGroupName `
-Name $storageName `
-Type Standard_GRS `
-Location $location
$defaultStorageKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName `
-Name $storageName)[0].Value
$storageContext = New-AzStorageContext -StorageAccountName $storageName `
-StorageAccountKey $defaultStorageKey
New-AzStorageContainer -Name $defaultContainerName `
-Context $storageContext
New-AzHDInsightCluster `
-ResourceGroupName $resourceGroupName `
-ClusterName $clusterName `
-Location $location `
-ClusterSizeInNodes $hdiWorkerNodes `
-ClusterType $hdiType `
-OSType Linux `
-Version $hdiVersion `
-HttpCredential $adminCreds `
-SshCredential $sshCreds `
-DefaultStorageAccountName "$storageName.blob.core.windows.net" `
-DefaultStorageAccountKey $defaultStorageKey `
-DefaultStorageContainer $defaultContainerName `
-VirtualNetworkId $network.Id `
-SubnetName $defaultSubnet.Id
}
function New-VPNGateway {
$resourceGroupName = Read-Host -Prompt "Enter the Azure Resource Group name"
$location = Read-Host -Prompt "Enter the Azure region to use"
$networkName = Read-Host -Prompt "Enter the name of the virtual network"
$rootCert = Read-Host -Prompt "Enter the path to the VPN root certificate"
$defaultSubnetName = "default"
$networkAddressPrefix = "10.0.0.0/16"
$gatewaySubnetPrefix = "10.0.1.0/24"
$vpnClientAddressPool = "172.16.201.0/24"
$gatewaySubnetName = "GatewaySubnet"
$gatewayPublicIpName = "GatewayIp"
$gatewayIpConfigName = "GatewayConfig"
$vpnRootCertName = "rootcert"
$vpnName = "VPNGateway"
$rootCertFile = Get-ChildItem $rootCert
$cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($rootCertFile)
$certBase64 = [System.Convert]::ToBase64String($cert.RawData)
$p2sRootCert = New-AzVpnClientRootCertificate `
-Name $vpnRootCertName `
-PublicCertData $certBase64
$defaultSubnetConfig = New-AzVirtualNetworkSubnetConfig -Name $defaultSubnetName `
-AddressPrefix $defaultSubnetPrefix
$gatewaySubnetConfig = New-AzVirtualNetworkSubnetConfig -Name $gatewaySubnetName `
-AddressPrefix $gatewaySubnetPrefix
New-AzVirtualNetwork -Name $networkName `
-ResourceGroupName $resourceGroupName `
-Location $location `
-AddressPrefix $networkAddressPrefix `
-Subnet $defaultSubnetConfig, $gatewaySubnetConfig
$network = Get-AzVirtualNetwork -Name $networkName `
-ResourceGroupName $resourceGroupName
$gatewaySubnet = Get-AzVirtualNetworkSubnetConfig -Name $gatewaySubnetName `
-VirtualNetwork $network
$defaultSubnet = Get-AzVirtualNetworkSubnetConfig -Name $defaultSubnetName `
-VirtualNetwork $network
$gatewayPublicIp = New-AzPublicIpAddress -Name $gatewayPublicIpName `
-ResourceGroupName $resourceGroupName `
-Location $location `
-AllocationMethod Dynamic
$gatewayIpConfig = New-AzVirtualNetworkGatewayIpConfig -Name $gatewayIpConfigName `
-Subnet $gatewaySubnet `
-PublicIpAddress $gatewayPublicIp
New-AzVirtualNetworkGateway -Name $vpnName `
-ResourceGroupName $resourceGroupName `
-Location $location `
-IpConfigurations $gatewayIpConfig `
-GatewayType Vpn `
-VpnType RouteBased `
-EnableBgp $false `
-GatewaySku Standard `
-VpnClientAddressPool $vpnClientAddressPool `
-VpnClientRootCertificates $p2sRootCert
Get-AzVpnClientPackage -ResourceGroupName $resourceGroupName `
-VirtualNetworkGatewayName $vpnName `
-ProcessorArchitecture Amd64
}
|
combined_dataset/train/non-malicious/sample_11_91.ps1
|
sample_11_91.ps1
|
#************************************************
# TS_NetworkDTCEnabled.ps1
# Version 1.0.0
# Date: 03-23-2012
# Author: Jeremy LaBorde - jlaborde
# Description: Checks to see if Network DTC
# is enabled
#
#************************************************
. .\DistSvcs_Utils.ps1
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_DSI_DistSvcs_RC_Activity -Status $ScriptStrings.ID_DSI_DistSvcs_RC_NetworkDTCEnabledNotice
# read local DTC settings
$local:security = Get-Item "registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security"
# network DTC check
$LocalNetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess"
# report on local DTC settings
if( !($LocalNetworkDTCAccessOn) )
{
AlertKnownIssue "RC_NetworkDTCEnabled" "Network DTC Is Not Enabled (Local DTC): http://support.microsoft.com/kb/817064" "Internal"
} else
{ if( $global:gDebugSDPOn )
{ Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false
}
}
# now check cluster resources
$local:clusterkeys = Get-Item "registry::HKEY_LOCAL_MACHINE\Cluster\Resources\*" -ErrorAction SilentlyContinue
if( $null -ne $local:clusterkeys )
{ # loop through each resource, looking for DTC ones
foreach( $local:subkey in $local:clusterkeys )
{ $local:type = Get-RegKeyValue $local:subkey.Name "Type"
$local:name = Get-RegKeyValue $local:subkey.Name "Name"
if( $null -ne $local:type -and $local:type -eq "Distributed Transaction Coordinator" )
{
$ClusterResourceName = Get-RegKeyValue $local:subkey.Name "Name"
if( [Environment]::OSVersion.Version -gt 5.2 ) # 7 / 2K8R2 / Vista / 2K8
{
$local:security = Get-Item ("registry::" + ($local:subkey.Name + "\MSDTCPRIVATE\MSDTC\Security"))
$NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess"
}
else
{
# have to find the subkey that has a REG_SZ named MSDTC
$local:clusternode = Get-RegistrySubKeyBasedOnEntry $local:subkey "MSDTC" ""
if( $null -ne $local:clusternode )
{
$local:security = ($local:clusternode.Name + "\Security")
$NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess"
}
}
# report on cluster instance DTC settings
if( !($NetworkDTCAccessOn) )
{
$message = "Network DTC Is Not Enabled (Cluster Resource: " + $ClusterResourceName + "): http://support.microsoft.com/kb/817064"
AlertKnownIssue "RC_NetworkDTCEnabled" $message "Internal"
} else
{ if( $global:gDebugSDPOn )
{ Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false
}
}
}
}
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDv89R5P3ztaEIP
# +U5C0fxMkNd3Q+fciI9g8XlV+tRIGaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG0x
# Z80PyAVAUkVlQMH8RYvEyhtV2JPyIZbCyZt9SbByMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAYt+riZ2KoJ39XCA6WMMWENMu/OsOynWhl0C0
# xGHYcghAFoaBhiHRYRFkHfS/XHhG3Kry6CN3gtJdPACBjy90CosTQ2BwfkeNTjZ4
# LN6BfPoAUS+KHdKanhaPMpzOsOlS1nUJKC9ADA0wk0hqTd/aqXRLGbAOCI2Ih6Tu
# xz29zoH6NVz3AQurdZdLhQyu77vnH2WRQMMG2MK5sbpvwalj67XIb+lS/D2H5O6V
# SCOePog4GUy5hmMca9MVcf7fs5Zw3+ieuQA3Ir0irYESbZXHwlA27Jyr89j0UK8m
# B1iZL0JklwBrH8wvwxpMLeelLJwti39VWTSSuFocnugu0XkiZaGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBzPaqMIQrkRKA9g9a5aaMT1H49qd1ghgyl
# RPbzLAYGawIGZv8ZfhF4GBMyMDI0MTAyODExNDAzOS4yMThaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv
# JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja
# Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V
# ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm
# kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK
# /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm
# bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL
# 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w
# GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc
# EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25
# gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2
# HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY
# xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw
# gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7
# 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT
# EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h
# OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk
# C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi
# CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP
# cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ
# m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB
# tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0
# 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0
# MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA
# AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX
# evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ
# uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI
# GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx
# w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j
# vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQg2EzOsxEYg3A/sx/87OJO2ryiRVPvCQSIaBfypoATposwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll
# QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI
# wwAlMA0GCSqGSIb3DQEBCwUABIICADP/OeZEiKTsZxq4iieteoR78tGpYkRdZ1Ry
# jj8SZtp4cCPuVsDI0jzZudQr6DkeG79uVkTRV9s7ahfpH9AbAQBBLsYnNbmUBrjz
# Kvk3gNYNmHy5O/W1fiLtNARLSw6bK/qKvS1L8E8fV5h+NRI6W0BANLpusYtwKPjC
# XWjjM/r5xheejWdv2AEZGWme2TZ5mj5/ERusZ9lD9+AMArPbnRQvqxMMY4I2cP6y
# Sjbf6OKbgfGZcCSAiz8y/I+lNHoD3Om/g+DsWcSs3It1lp3FuJ8qsNK08NcsOpTh
# gf4dLePYyF7N9KY4UNNvWCC0m4AHibpxrnZiod4XFgs1/BPjumdCdyJR4z/v7oJU
# lA0ABnG3mRbHp7qJBq7Vv//zS6csPYVBHaloIYvOtGm3NlsaT/5w7EzHAI2Ip6Bv
# 5XVYgNKv0RvkNgCNX197QIhTv2spWIbJjZ1TKkhwHthMAsgejpHv3OotmA0HXuYL
# vrwInTSt2sjqjPkQBXKToXw7fnTrxUqnzxmoYYjImfrMBpBrbcD8Uq3wS0TQ7EOf
# oFctWSpOuXV0TZfXK1+/JgAqobDWYvR+2UEVx4u5fGM1dRCSm5KQjA20txn6nJte
# uK7kFS3zFelHf8jaU8Wr8VBYp3fp/rAb9YVAB6CoeQgNqPEkvMWlW4LfCM1Mr/dU
# EDfCDJoP
# SIG # End signature block
|
combined_dataset/train/non-malicious/765.ps1
|
765.ps1
|
function Import-FileNoWildcard {
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,
Position=0,
ParameterSetName="Path",
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Path to one or more locations.")]
[Alias("PSPath")]
[ValidateNotNullOrEmpty()]
[string[]]
$Path
)
begin {
}
process {
$paths = @()
foreach ($aPath in $Path) {
if (!(Test-Path -LiteralPath $aPath)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath
$psCmdlet.WriteError($errRecord)
continue
}
$paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath)
}
foreach ($aPath in $paths) {
if ($pscmdlet.ShouldProcess($aPath, 'Operation')) {
$aPath
}
}
}
end {
}
}
|
combined_dataset/train/non-malicious/sample_66_41.ps1
|
sample_66_41.ps1
|
#
# Module manifest for module 'Az.Synapse'
#
# Generated by: Microsoft Corporation
#
# Generated on: 7/4/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.Synapse.psm1'
# Version number of this module.
ModuleVersion = '3.0.9'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '89eceb4f-9916-4ec5-8499-d5cca97a9cae'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - Azure Synapse Analytics in Windows PowerShell and PowerShell Core.
For more information on Azure Synapse Analytics, please visit the following: https://azure.microsoft.com/en-us/services/synapse-analytics/'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Azure.Analytics.Synapse.AccessControl.dll',
'Azure.Analytics.Synapse.Artifacts.dll',
'Azure.Analytics.Synapse.ManagedPrivateEndpoints.dll',
'Azure.Analytics.Synapse.Spark.dll',
'Microsoft.Azure.Management.Synapse.dll',
'Microsoft.DataTransfer.Gateway.Encryption.dll',
'Synapse.Autorest/bin/Az.Synapse.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'Synapse.Autorest\Az.Synapse.format.ps1xml',
'Synapse.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('Az.Synapse.psm1', 'Synapse.Autorest/Az.Synapse.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Add-AzSynapseKustoPoolLanguageExtension', 'Get-AzSynapseKustoPool',
'Get-AzSynapseKustoPoolAttachedDatabaseConfiguration',
'Get-AzSynapseKustoPoolDatabase',
'Get-AzSynapseKustoPoolDatabasePrincipalAssignment',
'Get-AzSynapseKustoPoolDataConnection',
'Get-AzSynapseKustoPoolFollowerDatabase',
'Get-AzSynapseKustoPoolLanguageExtension',
'Get-AzSynapseKustoPoolPrincipalAssignment',
'Get-AzSynapseKustoPoolSku',
'Invoke-AzSynapseDetachKustoPoolFollowerDatabase',
'New-AzSynapseKustoPool',
'New-AzSynapseKustoPoolAttachedDatabaseConfiguration',
'New-AzSynapseKustoPoolDatabase',
'New-AzSynapseKustoPoolDatabasePrincipalAssignment',
'New-AzSynapseKustoPoolDataConnection',
'New-AzSynapseKustoPoolPrincipalAssignment',
'Remove-AzSynapseKustoPool',
'Remove-AzSynapseKustoPoolAttachedDatabaseConfiguration',
'Remove-AzSynapseKustoPoolDatabase',
'Remove-AzSynapseKustoPoolDatabasePrincipalAssignment',
'Remove-AzSynapseKustoPoolDataConnection',
'Remove-AzSynapseKustoPoolLanguageExtension',
'Remove-AzSynapseKustoPoolPrincipalAssignment',
'Start-AzSynapseKustoPool', 'Stop-AzSynapseKustoPool',
'Update-AzSynapseKustoPool', 'Update-AzSynapseKustoPoolDatabase',
'Update-AzSynapseKustoPoolDataConnection'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-AzSynapseDataFlowDebugSessionPackage',
'Add-AzSynapseTriggerSubscription',
'Clear-AzSynapseSqlPoolVulnerabilityAssessmentRuleBaseline',
'Convert-AzSynapseSqlPoolVulnerabilityAssessmentScan',
'Disable-AzSynapseActiveDirectoryOnlyAuthentication',
'Disable-AzSynapseSqlAdvancedDataSecurity',
'Disable-AzSynapseSqlPoolSensitivityRecommendation',
'Enable-AzSynapseActiveDirectoryOnlyAuthentication',
'Enable-AzSynapseSqlAdvancedDataSecurity',
'Enable-AzSynapseSqlPoolSensitivityRecommendation',
'Enable-AzSynapseWorkspace', 'Export-AzSynapseKqlScript',
'Export-AzSynapseNotebook', 'Export-AzSynapseSparkConfiguration',
'Export-AzSynapseSqlScript',
'Get-AzSynapseActiveDirectoryOnlyAuthentication',
'Get-AzSynapseActivityRun', 'Get-AzSynapseDataFlow',
'Get-AzSynapseDataFlowDebugSession', 'Get-AzSynapseDataset',
'Get-AzSynapseDroppedSqlPool', 'Get-AzSynapseFirewallRule',
'Get-AzSynapseIntegrationRuntime',
'Get-AzSynapseIntegrationRuntimeKey',
'Get-AzSynapseIntegrationRuntimeMetric',
'Get-AzSynapseIntegrationRuntimeNode', 'Get-AzSynapseKqlScript',
'Get-AzSynapseLinkConnection',
'Get-AzSynapseLinkConnectionDetailedStatus',
'Get-AzSynapseLinkConnectionLinkTable',
'Get-AzSynapseLinkConnectionLinkTableStatus',
'Get-AzSynapseLinkedService',
'Get-AzSynapseManagedIdentitySqlControlSetting',
'Get-AzSynapseManagedPrivateEndpoint', 'Get-AzSynapseNotebook',
'Get-AzSynapsePipeline', 'Get-AzSynapsePipelineRun',
'Get-AzSynapseRoleAssignment', 'Get-AzSynapseRoleDefinition',
'Get-AzSynapseRoleScope', 'Get-AzSynapseSparkConfiguration',
'Get-AzSynapseSparkJob', 'Get-AzSynapseSparkJobDefinition',
'Get-AzSynapseSparkPool', 'Get-AzSynapseSparkSession',
'Get-AzSynapseSparkStatement',
'Get-AzSynapseSqlActiveDirectoryAdministrator',
'Get-AzSynapseSqlAdvancedDataSecurityPolicy',
'Get-AzSynapseSqlAdvancedThreatProtectionSetting',
'Get-AzSynapseSqlAuditSetting', 'Get-AzSynapseSqlDatabase',
'Get-AzSynapseSqlPool',
'Get-AzSynapseSqlPoolAdvancedThreatProtectionSetting',
'Get-AzSynapseSqlPoolAuditSetting', 'Get-AzSynapseSqlPoolGeoBackup',
'Get-AzSynapseSqlPoolRestorePoint',
'Get-AzSynapseSqlPoolSensitivityClassification',
'Get-AzSynapseSqlPoolSensitivityRecommendation',
'Get-AzSynapseSqlPoolTransparentDataEncryption',
'Get-AzSynapseSqlPoolVulnerabilityAssessmentRuleBaseline',
'Get-AzSynapseSqlPoolVulnerabilityAssessmentScanRecord',
'Get-AzSynapseSqlPoolVulnerabilityAssessmentSetting',
'Get-AzSynapseSqlScript',
'Get-AzSynapseSqlVulnerabilityAssessmentSetting',
'Get-AzSynapseTrigger', 'Get-AzSynapseTriggerRun',
'Get-AzSynapseTriggerSubscriptionStatus', 'Get-AzSynapseWorkspace',
'Get-AzSynapseWorkspaceKey', 'Get-AzSynapseWorkspacePackage',
'Invoke-AzSynapseDataFlowDebugSessionCommand',
'Invoke-AzSynapseIntegrationRuntimeUpgrade',
'Invoke-AzSynapsePipeline', 'Invoke-AzSynapseSparkStatement',
'Invoke-AzSynapseTriggerRun', 'New-AzSynapseFirewallRule',
'New-AzSynapseGitRepositoryConfig',
'New-AzSynapseIntegrationRuntimeKey', 'New-AzSynapseKqlScript',
'New-AzSynapseLinkedServiceEncryptedCredential',
'New-AzSynapseManagedPrivateEndpoint',
'New-AzSynapseManagedVirtualNetworkConfig',
'New-AzSynapseRoleAssignment', 'New-AzSynapseSparkConfiguration',
'New-AzSynapseSparkPool', 'New-AzSynapseSqlDatabase',
'New-AzSynapseSqlPool', 'New-AzSynapseSqlPoolRestorePoint',
'New-AzSynapseWorkspace', 'New-AzSynapseWorkspaceKey',
'New-AzSynapseWorkspacePackage', 'Remove-AzSynapseDataFlow',
'Remove-AzSynapseDataset', 'Remove-AzSynapseFirewallRule',
'Remove-AzSynapseIntegrationRuntime',
'Remove-AzSynapseIntegrationRuntimeNode',
'Remove-AzSynapseKqlScript', 'Remove-AzSynapseLinkConnection',
'Remove-AzSynapseLinkedService',
'Remove-AzSynapseManagedPrivateEndpoint',
'Remove-AzSynapseNotebook', 'Remove-AzSynapsePipeline',
'Remove-AzSynapseRoleAssignment',
'Remove-AzSynapseSparkConfiguration',
'Remove-AzSynapseSparkJobDefinition', 'Remove-AzSynapseSparkPool',
'Remove-AzSynapseSqlActiveDirectoryAdministrator',
'Remove-AzSynapseSqlDatabase', 'Remove-AzSynapseSqlPool',
'Remove-AzSynapseSqlPoolRestorePoint',
'Remove-AzSynapseSqlPoolSensitivityClassification',
'Remove-AzSynapseSqlScript', 'Remove-AzSynapseTrigger',
'Remove-AzSynapseTriggerSubscription', 'Remove-AzSynapseWorkspace',
'Remove-AzSynapseWorkspaceKey', 'Remove-AzSynapseWorkspacePackage',
'Reset-AzSynapseSparkSessionTimeout',
'Reset-AzSynapseSqlAdvancedThreatProtectionSetting',
'Reset-AzSynapseSqlAuditSetting',
'Reset-AzSynapseSqlPoolAdvancedThreatProtectionSetting',
'Reset-AzSynapseSqlPoolAuditSetting',
'Reset-AzSynapseSqlPoolVulnerabilityAssessmentSetting',
'Reset-AzSynapseSqlVulnerabilityAssessmentSetting',
'Restore-AzSynapseSqlPool', 'Resume-AzSynapseSqlPool',
'Set-AzSynapseDataFlow', 'Set-AzSynapseDataset',
'Set-AzSynapseIntegrationRuntime', 'Set-AzSynapseLinkConnection',
'Set-AzSynapseLinkConnectionLinkTable',
'Set-AzSynapseLinkedService',
'Set-AzSynapseManagedIdentitySqlControlSetting',
'Set-AzSynapseNotebook', 'Set-AzSynapsePipeline',
'Set-AzSynapseSparkJobDefinition',
'Set-AzSynapseSqlActiveDirectoryAdministrator',
'Set-AzSynapseSqlAuditSetting', 'Set-AzSynapseSqlPoolAuditSetting',
'Set-AzSynapseSqlPoolSensitivityClassification',
'Set-AzSynapseSqlPoolTransparentDataEncryption',
'Set-AzSynapseSqlPoolVulnerabilityAssessmentRuleBaseline',
'Set-AzSynapseSqlScript', 'Set-AzSynapseTrigger',
'Start-AzSynapseDataFlowDebugSession',
'Start-AzSynapseIntegrationRuntime',
'Start-AzSynapseLinkConnection', 'Start-AzSynapseSparkSession',
'Start-AzSynapseSqlPoolVulnerabilityAssessmentScan',
'Start-AzSynapseTrigger', 'Stop-AzSynapseDataFlowDebugSession',
'Stop-AzSynapseIntegrationRuntime', 'Stop-AzSynapseLinkConnection',
'Stop-AzSynapsePipelineRun', 'Stop-AzSynapseSparkJob',
'Stop-AzSynapseSparkSession', 'Stop-AzSynapseSparkStatement',
'Stop-AzSynapseTrigger', 'Stop-AzSynapseTriggerRun',
'Submit-AzSynapseSparkJob', 'Suspend-AzSynapseSqlPool',
'Sync-AzSynapseIntegrationRuntimeCredential',
'Test-AzSynapseSparkPool', 'Test-AzSynapseSqlDatabase',
'Test-AzSynapseSqlPool', 'Test-AzSynapseWorkspace',
'Update-AzSynapseFirewallRule',
'Update-AzSynapseIntegrationRuntime',
'Update-AzSynapseIntegrationRuntimeNode',
'Update-AzSynapseLinkConnectionLandingZoneCredential',
'Update-AzSynapseManagedVirtualNetworkConfig',
'Update-AzSynapseSparkPool',
'Update-AzSynapseSqlAdvancedThreatProtectionSetting',
'Update-AzSynapseSqlDatabase', 'Update-AzSynapseSqlPool',
'Update-AzSynapseSqlPoolAdvancedThreatProtectionSetting',
'Update-AzSynapseSqlPoolVulnerabilityAssessmentSetting',
'Update-AzSynapseSqlVulnerabilityAssessmentSetting',
'Update-AzSynapseWorkspace', 'Wait-AzSynapseSparkJob'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'Clear-AzSynapseSqlAdvancedThreatProtectionSetting',
'Clear-AzSynapseSqlPoolAdvancedThreatProtectionSetting',
'Clear-AzSynapseSqlPoolVulnerabilityAssessmentSetting',
'Clear-AzSynapseSqlVulnerabilityAssessmentSetting',
'Disable-AzSynapseSqlAdvancedThreatProtection',
'Enable-AzSynapseSqlAdvancedThreatProtection',
'Get-AzSynapseSqlAudit', 'Get-AzSynapseSqlPoolAudit',
'Import-AzSynapseKqlScript', 'Import-AzSynapseNotebook',
'Import-AzSynapseSparkConfiguration', 'Import-AzSynapseSqlScript',
'New-AzSynapseDataFlow', 'New-AzSynapseDataset',
'New-AzSynapseLinkConnection', 'New-AzSynapseLinkedService',
'New-AzSynapseNotebook', 'New-AzSynapsePipeline',
'New-AzSynapseSparkJobDefinition', 'New-AzSynapseSqlScript',
'New-AzSynapseTrigger', 'Remove-AzSynapseSqlAudit',
'Remove-AzSynapseSqlPoolAudit', 'Set-AzSynapseKqlScript',
'Set-AzSynapseManagedPrivateEndpoint',
'Set-AzSynapseSparkConfiguration', 'Set-AzSynapseSqlAudit',
'Set-AzSynapseSqlPoolAudit'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
ModuleList = @(@{ModuleName = 'Az.Accounts'; ModuleVersion = '3.0.1'; })
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','Synapse','Analytics'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Updated Azure.Analytics.Synapse.Artifacts to 1.0.0-preview.20.
* Fixed the issue that Azure.Core.AccessToken is used before assigned.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAN66VN0ffZgmKR
# 77lK13NnhjehkpGH4KHiY72IO1MG0KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC4vfyab7zp4lhSiYGrtH4Ro
# PS8epHcElQLtUTkCa3eRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAQa1zn+D6umOqCs9mYMjRp4uRfreA4v8ld/JmuRt2krtXFK+gtoCnHLye
# inXwwDTQGquWH5b8BN2R4mBg/tga+kv3zr+5PPy4aUFkqcfQ8uqlsFsnq5uwJSwL
# GE6L8BPjaj6UQh8KwM3U0ROzgf0g9Rp3+DQHKwCzNdPtSHKZU5d7r4NsvrOyAYWk
# j3Rj3nwB831Bck8dUT+PCAEqUpyye2PLHJh3/YYOGAPR5HLvSRpc32rZnILrm4LM
# OI/Aq+3ee0A2zZr/vrVTZ0Cgk8oIst7JKpw53Xsz9RIRRICEOdB+qqps8RbOnfEN
# VgGG9k684nrx6FSQLXRFwuSpcfFWKKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBTpCAL35b+Phwj6UQzhteTcVpr54jAu8tdPvZDNSjjuAIGZkY+W26l
# GBMyMDI0MDcwNDA4NDk0Mi40MTZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jCpxTAiGA8yMDI0MDcwNDA0NTUz
# M1oYDzIwMjQwNzA1MDQ1NTMzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqMKnF
# AgEAMAcCAQACAiYAMAcCAQACAhJnMAoCBQDqMftFAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBACrXv3gTLOMT6sidJgq422SmLSY7fSxNuqcohwjFmCbhPGAf
# B5cxtRZ3fOmrdUV0+QulbHLUBn8KMKy5TpjawS2qhalDKf6hNYOtsn69YY7h3yFJ
# vhq/g5zFiByPRMRWb/woQsZdzbZrO6HoH4ynr02dcZbRIXtSIRdDuoMPv95zuSt7
# zRGnycqwrP5OcQAjvHQvUYmztMLwEIsMRfuP/Vzqb1HadvOu0o81cpK9Dm1zCQQ3
# Qa+vBtkNciOyUcqvaMe8xSY6atcd4AA16f/lr7RlTs618iVdgAWd1E11rubc7XUg
# dXFnGLE5JlU48Lx7oFmiPC1RAATUfXSfWHc/a+YxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB7zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCFo8jbff9n2FrXjlMVr0v4md+lWWaGFOJrzqnVadfoGzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0DbcdsX
# 8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgg0R/IFMw5mO1HRGnsVhIizjuGMfF
# fbaMJHrzys5o/LQwDQYJKoZIhvcNAQELBQAEggIACVjELs4WbvnZfInd/QkVf2aJ
# ZzLMDWV8P9rXqD4S2TpvWYVOesEZmnwhDrpO9b8v+hZalhwKeWW5GZTfYNNidGOE
# a4yrkdDUbGscIWmhlbU7sa9xKi3vGm4dPooOcBOJ6v8KwMO5BVAHEniuYbGiGcsb
# M/eUSOJtcq7DZehLhDFGaUPyLz8Ef+Z2NdbWxsxHmrh0TJy6ID+oVPoHu3kZ5vkC
# BZ/yLYmzDjm9H6ICzi+jDAWpjalRdCZWKJRIP6ymAi3ZPASJmWtlec7sh1yxxrFE
# M9dRMmd97ymVijuwQtKhOCEhhV2doyDum/EM6pwM+fgfPWpopmqqllFzvut4Ug6P
# xubM/WERONP1//F3FJRdBdRoyLS1fLq0GE8J1X8KD1DAH6CMjpcAZwgPU39mesjg
# eN27cEm5ixXe3XjlUUDVAKe4JO4DR3M+Bk0Fm1QPxUlqbgzLglhix+XYM56QPP9v
# N6j3VXwQOblASLzUXfGKF+X7rUuQnPz+vA78NcH94hwU9mvpV+Ay06ectYzIZAkO
# oL5Xvbo7O1tWZ6TRibmarGSekgR66fC0qOyHHbbeOsypKv6Vb0Xg3g5JgjNk0tq2
# oWqNjIhIwadW0hJqCgronW8auCQ3sOpbr0hejUxEUHheTa/DZEZw+So8fl0xoKDP
# g9K57lRhZTapf8Wt+mo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_59_86.ps1
|
sample_59_86.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
Import-Module $PSScriptRoot\AzStackHci.SBEHealth.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lhwTxt -FileName AzStackHci.SBEHealth.Strings.psd1
function Invoke-AzStackHciSBEHealthValidation
{
<#
.SYNOPSIS
Perform AzStackHci SBE Health validation
.DESCRIPTION
Perform AzStackHci SBE Health validation
.EXAMPLE
PS C:\> Invoke-AzStackHciSBEHealthValidation -SBESourcePath "C:\SBE"
Perform SBE Health validations on localhost
.EXAMPLE
PS C:\> $Credential = Get-Credential -Message "Credential for RemoteSystem"
PS C:\> $RemoteSystemSession = New-PSSession -Computer 10.0.0.4,10.0.0.5 -Credential $Credential
PS C:\> Invoke-AzStackHciSBEHealthValidation -SBESourcePath "C:\SBE" -PsSession $RemoteSystemSession
Perform SBE Health validations on the localhost and all specified remote PS sessions
.PARAMETER PsSession
Specify the PsSession(s) used to validation from
.PARAMETER Tag
Specify the Tag value to be passed to the SolutionExtension module when called
.PARAMETER SBESourcePath
Specify the full local path to the folder containing the extracted SBE Package
.PARAMETER SBEMetadataPath
Specify the full local path to the folder containing the SBE Metadata files
.PARAMETER PassThru
Return PSObject result
.PARAMETER OutputPath
Directory path for log and report output
.PARAMETER CleanReport
Remove all previous progress and create a clean report
.INPUTS
Inputs (if any)
.OUTPUTS
Output (if any)
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $false, HelpMessage = "Specify the PsSession(s) used to validation from. If null the local machine will be used.")]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false, HelpMessage = "Tag to pass to SolutionExtension module functions.")]
[string]
$Tag = "Deployment",
[Parameter(Mandatory = $true, HelpMessage = "Local path to the folder containing the extracted SBE Package.")]
[string]
$SBESourcePath,
[Parameter(Mandatory = $true, HelpMessage = "Local path to the folder containing the SBE metadata file.")]
[string]
$SBEMetadataPath,
[Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")]
[switch]
$PassThru,
[Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")]
[string]$OutputPath,
[Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")]
[switch]$CleanReport = $false,
[Parameter(Mandatory = $false, HelpMessage = "Show only failed results on screen.")]
[switch]$ShowFailedOnly,
[Parameter(Mandatory = $false, HelpMessage = "Skip the SBE file integrity test.")]
[switch]$SkipIntegrityTest,
[Parameter(Mandatory = $false, HelpMessage = "ECE Params")]
[CloudEngine.Configurations.EceInterfaceParameters]$ECEParameters
)
try
{
$script:ErrorActionPreference = 'Stop'
Set-AzStackHciOutputPath -Path $OutputPath
$allResult = @()
$sbeWorkingDir = Join-Path -Path $env:SystemDrive -ChildPath "SBE\Extracted"
Write-AzStackHciHeader -Invocation $MyInvocation -Params $PSBoundParameters -PassThru:$PassThru
Test-ModuleUpdate -PassThru:$PassThru
# Call/Initialise reporting
$envcheckerReport = Get-AzStackHciEnvProgress -Clean:$CleanReport
$envcheckerReport = Add-AzStackHciEnvJob -Report $envcheckerReport
Log-Info -Message ("Check partner properties in unattended.json match SBE manifest") -Type Info
try
{
$result = Test-SBEPropertiesValid -ECEParameters $ECEParameters
}
catch
{
Log-Info -Message "Error validating partner properties in unattended.json with SBE manifest" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SBEPropertiesValid' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate partner properties in unattended.json"
$exceptionResult.Severity = 'CRITICAL'
$detailedMessage = "Found invalid partnerProperties in unattended.json. $($PSItem.Exception.Message)"
$exceptionResult.Remediation = "Fix PartnerProperties to be compliant with the JSON schema in the <PartnerProperties> element of the SBE manifest located at c:\SBE\SBE_Discovery*.xml."
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
Log-Info -Message ("Check SBE credentials in secret store match SBE manifest") -Type Info
try
{
$result = Test-SBECredentialsValid -ECEParameters $ECEParameters
}
catch
{
Log-Info -Message "Error validating SBE credentials in secret store with SBE manifest" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SBECredentialsValid' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate SBE credentials in secret store"
$exceptionResult.Severity = 'CRITICAL'
$detailedMessage = "Found invalid SBE Credentials in secret store. $($PSItem.Exception.Message)"
$exceptionResult.Remediation = "Correct issues with the indicated secrets in the Key Vault associated with this cluster and restart your deployment."
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Pre-validation checks and preparation
Log-Info -Message ("Validate the SolutionExtension module is present and meets the requirements for health testing.") -Type Info
try
{
$result = Test-SolutionExtensionModule -PackagePath $SBESourcePath
if ($false -eq $result)
{
$detailedMessage = "Skipping as the provided SolutionExtension module has not implemented any tests or does not support the HealthServiceIntegration tag."
Log-Info -Message $detailedMessage -Type Info
$instanceResult = New-SBEHealthResultObject -TestName 'Test-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'SUCCESS' -Description "Validate SolutionExtension module exists and supports health tests"
$instanceResult.AdditionalData.Detail = $detailedMessage
$allResult += $instanceResult
return $allResult
}
}
catch
{
Log-Info -Message "The SolutionExtension module could not be validated" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate SolutionExtension module exists and supports health tests"
$exceptionResult.Severity = 'CRITICAL'
$detailedMessage = "The SolutionExtension module could not be validated. $($PSItem.Exception.Message)"
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Copy SBE package to local working dir
try
{
$result = Copy-SBEContentLocalToNode -PackagePath $SBESourcePath -TargetNodeName $env:ComputerName -ExcludeDirs @("IntegratedContent")
if ($false -eq $result)
{
throw "An error occurred during the SBE package copy operation. See logs for details."
}
}
catch
{
Log-Info -Message "An error occurred during the SBE package copy operation" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName 'Copy-SBEContentLocalToNode' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Copy the SBE Package to working folder on '$($env:ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Validate SBE content integrity of working dir
try
{
if (-not $SkipIntegrityTest)
{
$result = Invoke-TestSBEContentIntegrity -SBEMetadataPath $SBEMetadataPath -SBEContentPath $sbeWorkingDir
if ($false -eq $result)
{
throw "SBE content integrity check found irregularities in the files at '$($sbeWorkingDir)'. Check the ECE logs for more information."
}
}
}
catch
{
$detailedMessage = "SBE content failed integrity check at '$($sbeWorkingDir)'"
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SBEContentIntegrity' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate SBE content integrity"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Import the SolutionExtension module
try
{
$result = Import-SolutionExtensionModule -PackagePath $sbeWorkingDir
}
catch
{
$detailedMessage = "Import SolutionExtension module from '$($sbeWorkingDir)' failed. The exception was: $($PSItem.Exception.Message)"
Log-Info -Message "Import SolutionExtension module from '$($sbeWorkingDir)' failed." -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Import-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Import SolutionExtension module"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Run validation
try
{
$functionName = 'Get-SBEHealthCheckResult'
$exceptionResult = $null
$instanceResult = @()
$functionFound = Get-Command -Module SolutionExtension -Name $functionName -ErrorAction SilentlyContinue
if ($null -eq $functionFound)
{
$detailedMessage = "A function named '$($functionName)' was not found in the SolutionExtension module."
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$thisResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "Invoke $functionName"
$thisResult.Severity = 'CRITICAL'
$thisResult.AdditionalData.Detail = $detailedMessage
$instanceResult += $thisResult
}
else
{
$solExtVersion = $functionFound.Version.ToString()
Log-Info -Message "SolutionExtension version being used: $solExtVersion" -Type Info
$params = Get-SBEHealthCheckParams -ECEParameters $ECEParameters
Log-Info -Message "Invoke $functionName on $($env:ComputerName)" -Type Info
[array]$thisResult = & $functionName @params
if ($thisResult.Count -eq 0)
{
Log-Info -Message "'$($functionName)' did not return any test results or no tests have been implemented." -Type Warning
}
else
{
[array]$assertResult = Assert-ResponseSchemaValid -ResultObject $thisResult
$instanceResult += $assertResult
}
}
}
catch
{
# Unexpected exception occurred during partner tests
Log-Info -Message "An error occurred during '$($functionName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "$functionName on $($env:ComputerName)"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData.Detail = "An unhandled error occurred: " + ($PSItem | Format-List * | Out-String).Trim()
throw $PSItem
}
finally
{
$allResult += $instanceResult
$allResult += $exceptionResult
}
try
{
$jobRun = @()
$exceptionResult = ""
$instanceResult = @()
$functionName = 'Get-SBEHealthCheckResultOnNode'
$functionFound = Get-Command -Module SolutionExtension -Name $functionName -ErrorAction SilentlyContinue
if ($null -eq $functionFound)
{
$detailedMessage = "A function named '$($functionName)' was not found in the SolutionExtension module."
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "Invoke $functionName"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData.Detail = $detailedMessage
}
else
{
if ($null -eq $params)
{
$params = Get-SBEHealthCheckParams -ECEParameters $ECEParameters
}
foreach ($session in $PsSession)
{
try
{
$thisCred = $session.Runspace.ConnectionInfo.Credential
$result = Copy-SBEContentLocalToNode -PackagePath $SBESourcePath -TargetNodeName ($session.ComputerName) -ExcludeDirs @("IntegratedContent") -Credential $thisCred
if ($false -eq $result)
{
throw "An error occurred during the SBE package copy operation to '$($session.ComputerName)'. See logs for details."
}
}
catch
{
Log-Info -Message "An unhandled error occurred during 'Copy-SBEContentLocalToNode' to '$($session.ComputerName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $session.ComputerName -Status 'FAILURE' -Description "Copy-SBEContentLocalToNode to '$($session.ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData.Detail = $detailedMessage
throw $detailedMessage
}
}
try
{
foreach ($session in $PsSession)
{
# Verify SBE content integrity
if (-not $SkipIntegrityTest)
{
$result = Invoke-TestSBEContentIntegrity -SBEMetadataPath $SBEMetadataPath -SBEContentPath $sbeWorkingDir -PsSession $session
if ($false -eq $result)
{
throw "SBE content integrity check found irregularities in the files at '$($sbeWorkingDir)' on '$($session.ComputerName)'"
}
}
# Import the SolutionExtension module
$result = Import-SolutionExtensionModule -PackagePath $sbeWorkingDir -PsSession $session
Log-Info -Message "Invoke $functionName on '$($session.ComputerName)'" -Type Info
$sbJob = {
if ($null -eq $functionName)
{
$functionName = $using:functionName
}
if ($null -eq $params)
{
$params = $using:params
}
& $functionName @params
}
$jobRun += Invoke-Command -Session $session -ScriptBlock $sbJob -AsJob
}
}
catch
{
Log-Info -Message "An unhandled error occurred on '$($session.ComputerName)' during '$($functionName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $session.ComputerName -Status 'FAILURE' -Description "Invoke '$($functionName)' on '$($session.ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData.Detail = $detailedMessage
throw $detailedMessage
}
# Wait for all jobs to complete with a timeout after 30 minutes
Log-Info -Message "Waiting for all '$($functionName)' jobs to complete" -Type Info
$waitJob = $true
$stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
$timeoutMinutes = 30
while ($true -eq $waitJob)
{
if ($stopwatch.Elapsed.TotalMinutes -ge $timeoutMinutes)
{
Log-Info -Message "All jobs have not completed in the specified timeout period." -Type Error
$stopwatch.Stop()
$waitJob = $false
}
else
{
$keepWaiting = $false
foreach ($job in $jobRun.ChildJobs)
{
if ($job.State -eq 'Running')
{
$keepWaiting = $true
}
}
if ($false -eq $keepWaiting)
{
$stopwatch.Stop()
$waitJob = $false
}
else
{
Start-Sleep -Seconds 30
}
}
}
foreach ($job in $jobRun.ChildJobs)
{
$thisComputerName = $job.Location
if ($job.State -eq 'Failed')
{
[string]$detailedMessage = "Error while running '$($functionName)' on '$($thisComputerName)'. Exception message: " + $job.JobStateInfo.Reason.Message
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $job.Location -Status 'FAILURE' -Description "An exception occurred during $functionName"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData.Detail = $detailedMessage
$allResult += $exceptionResult
}
elseif ($job.State -eq 'Running')
{
Log-Info -Message "'$($functionName)' was still running on '$($thisComputerName)' when the timeout period was hit." -Type Warning
$job | Stop-Job
}
else
{
Log-Info -Message "Log results for '$($thisComputerName)'" -Type Info
[array]$thisOutput = $job.Output
if ($thisOutput.Count -gt 0)
{
$instanceResult += $thisOutput
}
}
}
if ($instanceResult.Count -gt 0)
{
[array]$assertResult = Assert-ResponseSchemaValid -ResultObject $instanceResult
[array]$instanceResult = $assertResult
}
else
{
Log-Info -Message "'$($functionName)' did not return any test results or no tests have been implemented." -Type Warning
}
}
}
catch
{
foreach ($job in $jobRun.ChildJobs)
{
if ($job.State -eq 'Running')
{
Log-Info -Message "'$($functionName)' was still running on '$($thisComputerName)' when an exception occurred." -Type Warning
$job | Stop-Job
}
}
throw $PSItem
}
finally
{
$allResult += $instanceResult
$allResult += $exceptionResult
}
return $allResult
}
catch
{
Log-Info -Message "" -ConsoleOut
Log-Info -Message "$($PSItem.Exception.Message)" -ConsoleOut -Type Error
Log-Info -Message "$($PSItem.ScriptStackTrace)" -ConsoleOut -Type Error
$cmdletFailed = $true
throw $PSItem
}
finally
{
Log-Info -Message "Performing clean up"
$cleanupScriptBlock = {
Get-Module -Name SolutionExtension -ErrorAction SilentlyContinue | Remove-Module -Force -Verbose:$false
if ($null -eq $sbeWorkingDir)
{
$sbeWorkingDir = $using:sbeWorkingDir
}
if (Test-Path -Path $sbeWorkingDir)
{
Write-Output "Remove SBE temporary working folder '$($sbeWorkingDir)' on '$($env:ComputerName)'"
Remove-Item -Path $sbeWorkingDir -Recurse -Force
}
}
if ($PsSession.Count -gt 0)
{
$jobClean = Invoke-Command -Session $PsSession -ScriptBlock $cleanupScriptBlock -AsJob
$jobClean | Wait-Job | Out-Null
foreach ($job in $jobClean.ChildJobs)
{
if ($job.State -eq 'Failed')
{
[string]$detailedMessage = "An exception occurred during clean-up on '$($job.Location)'. Exception message: " + $job.JobStateInfo.Reason.Message
Log-Info -Message $detailedMessage -Type Warning
}
else
{
[string]$output = $job.Output
Log-Info -Message $output -Type Info
}
}
}
else
{
Invoke-Command -ScriptBlock $cleanupScriptBlock
}
$script:ErrorActionPreference = 'SilentlyContinue'
# Write result to telemetry channel
foreach ($res in $allResult)
{
Write-ETWResult -Result $res
}
# Write validation result to report object and close out report
$envcheckerReport | Add-Member -MemberType NoteProperty -Name 'SBEHealth' -Value $allResult -Force
$envcheckerReport = Close-AzStackHciEnvJob -Report $envcheckerReport
Write-AzStackHciEnvReport -Report $envcheckerReport
Write-AzStackHciFooter -Invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru
}
}
# SIG # Begin signature block
# MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1RmckjShDF+Da
# fZc6Qu6Obg1+4lwBZfXv5P5KRofd+aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGggwghoEAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDdd8+XFQjGd6I0rNVFi14+I
# VIDLXlkLbVEsCbrapoALMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAjL1T1wkLz+Zy3Hh2G94rnGA4JhKccFAZmds91Ie0A1YRb8uyY1kmkdlv
# j2Bd0IM2+U897Ov6gfEy9w5Sw+fF7/Qexh5YQoU2ywucCCNgHz4aLQLvFipOMOqP
# 8i1u97bqKdHbw4pnSWJDFiAGsWjOYOc+/uNtIuE04XbyMA4RHEdhSJ/bXoLRnUrG
# rT+pPOai7bkWEfbNXe3mjJAKNuBYODK1gsPW8eFjXK9ZlyXmfgVW/pwR/RdFMXYa
# mJr1NTt8afFkjt/Ymgp7bkSiPX/hd3u2QituL1ogglaiuYz6aBerkTL2YXhQb5HC
# KUAYsocJa3BaqN5PQ2S3Gf6+ZAwn7KGCF5IwgheOBgorBgEEAYI3AwMBMYIXfjCC
# F3oGCSqGSIb3DQEHAqCCF2swghdnAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCCEzMnKoRNixay8zaVxulJdxytGaz/PXB7Ypg4aAJW9QIGZkYyUC6W
# GBIyMDI0MDUxNjE4NDUwMC4zNVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjozNzAzLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EekwggcgMIIFCKADAgECAhMzAAAB6pokctVZP2FjAAEAAAHqMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz
# MFoXDTI1MDMwNTE4NDUzMFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjozNzAzLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBALULX/FIPyAH1fsu52ijatZvaSypoXrlC0mRtCmaxzob
# huDkw6/pY/+4nhc4m8pf9zW3R6PihYGp0YPpVuNdfhPQp/KVO6WvMq2DGfFmHurW
# 4PQPL/DkbQMkM9vqjFCvPq8xXZnfL1nGN9moGcN+oaif/hUMedmF1qzbay9ILkYf
# LCxDYn3Qwzsvh5xjxOcsjzmRddNURJvT23Eva0cxisH4ocLLTx2zfpqfshw4Z9Ga
# EdsWg9rmib1galUpLzF5PsQDBbtZtcv+Wjmn0pFEiMCWwEEcPVN0YG5ysYLdNBdJ
# On2zsOOS+80W5RrQEqzPpSIIvEkZBJmF3aI4lMR8nV/FiTadjpIIqxX5Wa1XlqI/
# Nj+xagVjnjb7POsA+vh6Wu+v24HpyL8pyL/8Q4RFkRRME9cwT+Jr63yOtPbLe6DX
# kxIJW6E6w2ua5kXBpEKtEQPTLPhX3CUxMYcglbnmI0zcc9UknX285K+sI/2WwRwT
# BZkhDUULI86eQzV+zvzzR1qEBrlSY+oyTlYQrHMM9WnTzVflFDocZVTPpl2BDSNx
# Pn0Qb4IoM9EPqbHyi/MilL+v/AQc8q3mQ6FiuPJAddz0ocpNZ9ekBWPVLKq3lfie
# v4yl65u/438+NAQ+vSJgkONLMmuoguEGzmnK1vq/JHwdRUyn6YADiteM7Dja+Qd9
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUK4FFJaJR5ukXQFTUxMhyiwVuWV4wHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBACiDrVZeP37+fFVtfcbfsqC/Kg0Ce67bDceh
# ZmPcfRgJ5Ddv0pJlOFVOFbiIVwesqeEUwFtclfi5AjneQ5ZJpYJpXfELOelG3dzj
# +BKfd287/UY/cwmSkl+CjnoKBL3Ms6I/fWR+alR0+p6RlviK8xHoug9vkc2WrRZs
# GnMVu2xOM2tPJ+qpyoDBzqv30N/ZRBOoNrS/PCkDwLGICDYqVs/IzAE49yv2ElPy
# walf9mEsOHXV1lxtQDNcejVEmitJJ+1Vr2EtafPEbMQZp89TAuagROKE4YuohCUK
# m+v3geJqTQarTBjqV25RCOT+XFngTMDD9wYx6TwndB2I1Ly726NiHUHs0uvq3ciC
# V9JwNXdt1VZ63WK1NSgpVEsiK9EPABPt1EfXcKrfaPYkbkFi79eK1ETxx3NomYNU
# HNiGU+X1Be8L7qpHwjo0g3/33XhtOr9LiDoUXh/V2LFTETiqV9Q8yLEavQW3j9LQ
# /h/CaGz5YdGfrY8HiPfMIeLEokKxGf0hHcTEFApB0yLlq6KoHrFAEANR/4XuFIpl
# 9sDywVIWt4tKqG+P6pRAXzg1zG5rGlslZWmw7XwgvhBu3jkLP9AxrsSYwY2ftrww
# ze5NA6VDLS7pz+OrXXWLUmoyNrJNx5Bk0wEwzkQxzkOvmbdPhsOP1ZM0uA/xIV7c
# SpNpZUw5MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA0ww
# ggI0AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAInb
# HtxB+OlGyQnxQYhy04KSYSSPoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp8LDPMCIYDzIwMjQwNTE2MTYyMDMx
# WhgPMjAyNDA1MTcxNjIwMzFaMHMwOQYKKwYBBAGEWQoEATErMCkwCgIFAOnwsM8C
# AQAwBgIBAAIBVTAHAgEAAgIPgjAKAgUA6fICTwIBADA2BgorBgEEAYRZCgQCMSgw
# JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
# DQEBCwUAA4IBAQATW9a4Gm7+Uj2WIMBuKKO8uEHYPZf3QLUlqcKsjPFQ5g+11H3+
# BwPNczX9VMdxHdCkl12Ji54r1g1gUhhQK7q98ApHTjxdLaw79ocB2Qomw7cF99+l
# lPIv53RXhxfiGNOBGsmcJyRJGtlPinqvl28ccBPr5vuhFCBgf9OLX50RuwpzIDHV
# CoxBIwTaTVs0pKG28lJaieyJKfUIsNSpuVt0+KRYCzjE1SJWIfVDW2RUBJF0NfLZ
# UWhZdCErU6p1E84QtAZv/pmirCS6FPG2D+dycvtqxt4of/iQzKPeVlpxe7a0+RAG
# ueRIGScXcvLtMcVNLxZSNsk4BAmSjzH+6W8gMYIEDTCCBAkCAQEwgZMwfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowDQYJ
# YIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkq
# hkiG9w0BCQQxIgQgtFEuQuSNnbdInsdOXeYF2MjmlCAB7yzM7eHIhjGOUoIwgfoG
# CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCApj6HV42Q0eIsINJbSwDVwYeRtbiqi
# iL6vLIynpLhmeDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# AhMzAAAB6pokctVZP2FjAAEAAAHqMCIEIKBNRQw23Dbb1OanJlsSRIZ0OzmUJbMV
# 9APiH1vrWHw6MA0GCSqGSIb3DQEBCwUABIICALIYRTFzYc02blFIbgJmLDOPbYmC
# dBqM38nqARA9Ywa3nUKgSo4+POzdtCXzg8sECKc/t/PuZ+h1jRzJq6hMLQ8xnA9z
# gxhbo/LOAfFRk2WUkA7u0CLD0nN4WfhZvoT0oU93n2czVb5h61c2WbTJ/ASt+P+F
# 9o4HRRJGNIsAnxc8TfqWXmhQWWnp9kz/VbDAsRkALxjq4ytZckocZ8YC+k52LLQQ
# DtmICc2mlxRzctmtssbXxr2IuFEFUigzLzJxjuX7e0JEiudueqxc/8iM9buw1pHD
# Y7t5o5rjhFY7a7a8zw3tXXKc/kd318mE7Oa3gHtjvjevB8zrDPjx5EPOejtaaETW
# +utYGyLR0rph6GyRcFq/QF32Xr9dBb7YeG6G0PP8kLjR0SPEXcVT34mv/6/NGFjC
# 9SgNi5pCkNU6TTA80YFxUp9vjPwcReOPC0qeRiWD17Gt1C0dg8Lkjcv96Pcfvoqc
# mDy+tO74DJs10EKFBD0KvEg52AClRRxKgVnc0m7XbvN7Yshv4TahTU9E5DPsLpa7
# I8uGh6u4Y5Mgj1FnD2sXRDyaZPxTBR/l6zgvWfBS8CqBbwDK2xPD8vEflOWr/M4t
# +pc+PUHJVEbpK+u/EFDpTigHcQ/5MzchXZFbPZNXSYPvqNWHCSnhmE7K7fVg+3p2
# nxGUxeHpQ1Y5UCWN
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_67_71.ps1
|
sample_67_71.ps1
|
#
# Module manifest for module 'OCI.PSModules.Mysql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Mysql.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Mysql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlBackup',
'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel',
'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration',
'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem',
'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster',
'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica',
'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList',
'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest',
'Get-OCIMysqlWorkRequestErrorsList',
'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList',
'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment',
'New-OCIMysqlBackup', 'New-OCIMysqlChannel',
'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem',
'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica',
'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel',
'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem',
'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica',
'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem',
'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem',
'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem',
'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup',
'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration',
'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster',
'Update-OCIMysqlReplica'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_33_70.ps1
|
sample_33_70.ps1
|
#
# Module manifest for module 'OCI.PSModules.Sch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Sch.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '0e74736a-d7dc-4743-afef-d79b95248dee'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Sch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Sch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCISchServiceConnector', 'Get-OCISchConnectorPlugin',
'Get-OCISchConnectorPluginsList', 'Get-OCISchServiceConnector',
'Get-OCISchServiceConnectorsList', 'Get-OCISchWorkRequest',
'Get-OCISchWorkRequestErrorsList', 'Get-OCISchWorkRequestLogsList',
'Get-OCISchWorkRequestsList',
'Invoke-OCISchDeactivateServiceConnector',
'Move-OCISchServiceConnectorCompartment',
'New-OCISchServiceConnector', 'Remove-OCISchServiceConnector',
'Update-OCISchServiceConnector'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Sch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/497.ps1
|
497.ps1
|
function Get-AvailableDriveLetter {
param(
[parameter(Mandatory=$False)]
[Switch]
$ReturnFirstLetterOnly,
[parameter(Mandatory=$False)]
$FavoriteDriveLetter
)
if($ReturnFirstLetterOnly -eq $true -and $FavoriteDriveLetter -ne $null){
throw "Only one parameter is possible for this function"
exit
}
[char[]]$TempDriveLetters = [char[]]'EFGHIJKLMNOPQRSTUVWXYZ' | ? { (Get-PSDrive $_ -ErrorAction 'SilentlyContinue') -eq $null }
if ($ReturnFirstLetterOnly -eq $true)
{
$TempDriveLetters[0]
}elseif($FavoriteDriveLetter -ne $null){
if($TempDriveLetters -contains $FavoriteDriveLetter){
$FavoriteDriveLetter
}else{
$TempDriveLetters[0]
}
}else{
$TempDriveLetters
}
}
|
combined_dataset/train/non-malicious/BufferBox 3.6.ps1
|
BufferBox 3.6.ps1
|
####################################################################################################
## This script is just a demonstration of some of the things you can do with the buffer
## in the default PowerShell host... it serves as a reminder of how much work remains on
## PoshConsole, and as an inspiration to anyone who is thinking about trying to create
## "interactive" PowerShell applications.
##
## Try Test-DisplayBox and then Test-BufferBox (note it has tab completion and everything).
####################################################################################################
$global:BoxChars = new-object PSObject -Property @{
'HorizontalDouble' = ([char]9552).ToString()
'VerticalDouble' = ([char]9553).ToString()
'TopLeftDouble' = ([char]9556).ToString()
'TopRightDouble' = ([char]9559).ToString()
'BottomLeftDouble' = ([char]9562).ToString()
'BottomRightDouble' = ([char]9565).ToString()
'HorizontalDoubleSingleDown' = ([char]9572).ToString()
'HorizontalDoubleSingleUp' = ([char]9575).ToString()
'Horizontal' = ([char]9472).ToString()
'Vertical' = ([char]9474).ToString()
'TopLeft' = ([char]9484).ToString()
'TopRight' = ([char]9488).ToString()
'BottomLeft' = ([char]9492).ToString()
'BottomRight' = ([char]9496).ToString()
'Cross' = ([char]9532).ToString()
'VerticalDoubleRightSingle' = ([char]9567).ToString()
'VerticalDoubleLeftSingle' = ([char]9570).ToString()
}
$global:RectType = "system.management.automation.host.rectangle"
function Show-ConsoleMenu {
param(
[Parameter(ValueFromPipeline=$true)]
[PSObject[]]$choices,
[Alias("Title")]
[string]$Caption,
[int]$indentLeft=8,
[Switch]$Passthru,
[Switch]$UseBufferBox
)
begin {
$allchoices = New-Object System.Collections.ArrayList
}
process {
if($choices) {
$allchoices.AddRange($choices)
}
}
end {
# Make a hashtable with keys
for($i=0; $i -lt $allchoices.Count; $i++) { $allchoices[$i] | Add-Member NoteProperty ConsoleMenuKey $i }
# output the menu to the screen
$menu = $allchoices | Format-Table -HideTableHeader @{E="ConsoleMenuKey";A="Right";W=$indentLeft}, @{E={$_};A="Left"} | Out-String
$menu = "`n" + (" " * ($indentLeft/2)) + $Caption + "`n" + $menu.TrimEnd() + "`n"
if($UseBufferBox) {
$menu -split "`n" | Out-Buffer
} else {
$menu
}
# get a choice from the user
do {
$Key = $Host.UI.RawUI.ReadKey("IncludeKeyDown,NoEcho").Character
try { [int][string]$choice = $Key } catch { [int][char]$choice = $Key }
} while(!$allchoices.Count -and !(13,27 -contains $Key))
if($Passthru) { $allchoices[$choice] } else { $choice }
}}
function Reset-Buffer {
param(
$Position = $Host.UI.RawUI.WindowPosition,
[int]$Height = $Host.UI.RawUI.WindowSize.Height,
[int]$Width = $Host.UI.RawUI.WindowSize.Width,
# Note: all edges are padded by 1 for the box edges, but we also pad each side by this ammount:
[int]$Padding = 1,
$ForegroundColor = $Host.UI.RawUI.ForegroundColor,
$BackgroundColor = $Host.UI.RawUI.BackgroundColor,
$BorderColor = "Yellow",
[switch]$NoBorder,
[switch]$ShowInput,
[string]$Title = ""
)
$global:BufferHeight = $Height
$global:BufferWidth = $Width
$global:BufferPadding = $Padding
$global:BufferForegroundColor = $ForegroundColor
$global:BufferBackgroundColor = $BackgroundColor
$global:BufferBorderColor = $BorderColor
if($NoBorder) {
$global:BufferBoxSides = 0
} else {
$global:BufferBoxSides = 2
}
if($ShowInput) {
$global:BufferHeight -= 2
}
$Host.UI.RawUI.SetBufferContents($Position,(New-BufferBox $BufferHeight $BufferWidth -Title:$Title -NoBorder:$NoBorder -ShowInput:$ShowInput -Background $BufferBackgroundColor -Border $BufferBorderColor))
$global:BufferPosition = $Position
$global:BufferPosition.X += $global:BufferPadding + ($global:BufferBoxSides/2)
# this gets set to the BOTTOM line, because I assume text will flow in from the bottom.
$global:BufferPosition.Y += $global:BufferHeight - 2
# and this goes below that ...
$global:BufferPromptPosition = $BufferPosition
$global:BufferPromptPosition.Y += 2
$global:BufferPromptPosition.X += 2 - $global:BufferPadding # Prompt = "> "
}
function New-BufferBox {
param(
[int]$Height = $global:BufferHeight,
[int]$Width = $global:BufferWidth,
$Title = "",
[switch]$NoBorder,
[switch]$ShowInput,
$BackgroundColor = $global:BufferBackgroundColor,
$BorderColor = $global:BufferBorderColor
)
$Width = $Width - $global:BufferBoxSides
$LineTop =( $global:BoxChars.HorizontalDouble * 2) + $Title `
+ $($global:BoxChars.HorizontalDouble * ($Width - ($Title.Length+2)))
$LineField = ' ' * $Width
$LineBottom = $global:BoxChars.HorizontalDouble * $Width
$LineSeparator = $global:BoxChars.Horizontal * $Width
$LinePrompt = '> ' + ' ' * ($Width-2) # Prompt = "> "
if(!$NoBorder) {
$LineField = $global:BoxChars.VerticalDouble + $LineField + $global:BoxChars.VerticalDouble
$LinePrompt = $global:BoxChars.VerticalDouble + $LinePrompt + $global:BoxChars.VerticalDouble
$LineBottom = $global:BoxChars.BottomLeftDouble + $LineBottom + $global:BoxChars.BottomRightDouble
$LineTop = $global:BoxChars.TopLeftDouble + $LineTop + $global:BoxChars.TopRightDouble
$LineSeparator = $global:BoxChars.VerticalDoubleRightSingle + $LineSeparator + $global:BoxChars.VerticalDoubleLeftSingle
}
if($ShowInput) {
$box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineSeparator;$LinePrompt;$LineBottom}
} else {
$box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineBottom}
}
$boxBuffer = $Host.UI.RawUI.NewBufferCellArray($box,$BorderColor,$BackgroundColor)
return ,$boxBuffer
}
function Move-Buffer {
param(
$Position = $global:BufferPosition,
[int]$Left = $($global:BufferBoxSides/2),
[int]$Top = (2 - $global:BufferHeight),
[int]$Width = $global:BufferWidth - $global:BufferBoxSides,
[int]$Height = $global:BufferHeight,
[int]$Offset = -1
)
$Position.X += $Left
$Position.Y += $Top
$Rect = New-Object $RectType $Position.X, $Position.Y, ($Position.X + $width), ($Position.Y + $height -1)
$Position.Y += $OffSet
$Host.UI.RawUI.ScrollBufferContents($Rect, $Position, $Rect, (new-object System.Management.Automation.Host.BufferCell(' ',$global:BufferForegroundColor,$global:BufferBackgroundColor,'complete')))
}
function Out-Buffer {
param(
[Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
$Message,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$ForegroundColor = $global:BufferForegroundColor,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$BackgroundColor = $global:BufferBackgroundColor,
[switch]$NoScroll,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$Position = $global:BufferPosition,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Left = 0,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Top = $(3 - $global:BufferHeight), # Box Edge + New Lines
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Width = ($global:BufferWidth - $global:BufferBoxSides), # Box Edge
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Height = ($global:BufferHeight - $global:BufferBoxSides), # Box Edge
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Offset = $( 0 - ($Message.Split("`n").Count))
)
process {
$lineCount = $Message.Split("`n").Count
$Width = $Width - ($global:BufferPadding * 2)
if(!$NoScroll){ Move-Buffer $Position $Left $Top $Width $Height $Offset }
$MessageBuffer = New-Object "System.Management.Automation.Host.BufferCell[,]" $lineCount, $width
$index = 0
foreach( $line in $Message.Split("`n") ) {
$Buffer = $Host.UI.RawUI.NewBufferCellArray( @($line.Trim("`r").PadRight($Width)), $ForegroundColor, $BackgroundColor )
for($i = 0; $i -lt $width; $i++) {
$MessageBuffer[$index,$i] = $Buffer[0,$i]
}
$index++
}
$Y = $global:BufferPosition.Y
$global:BufferPosition.Y -= $lineCount - 1
$Host.UI.RawUI.SetBufferContents($global:BufferPosition,$MessageBuffer)
$global:BufferPosition.Y = $Y
}
}
function Set-BufferInputLine {
param([String]$Line = "")
$PromptText = $line.PadRight(($global:BufferWidth - $line.Length - 3)) # Prompt = "> "
$CursorPosition = $BufferPromptPosition
$CursorPosition.X += $line.Length
$Prompt = $Host.UI.RawUI.NewBufferCellArray( @($PromptText),$global:BufferForegroundColor, $global:BufferBackgroundColor)
$Host.UI.RawUI.SetBufferContents( $BufferPromptPosition, $prompt )
$Host.UI.RawUI.CursorPosition = $CursorPosition
}
function Test-DisplayBox {
$Position = $Host.UI.RawUI.WindowPosition
$Position.X += 10
$Position.Y += 3
Reset-Buffer $Position 20 66 3 -ForegroundColor 'Gray' -BackgroundColor 'Black' -BorderColor 'Green'
Out-Buffer 'Greetings!' 'Yellow' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer '- - - Thank you for running this simple demo script! - - -' 'Green' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'We are demonstrating how the scroll buffer works: you can
add more than one line at a time, but you don''t really
need to, since they add almost as fast one at a time.' 'white' 'black'
sleep -m 3000
Out-Buffer '' 'Gray' 'black'
Out-Buffer 'That is, as long as you don''t have any delay, you can just' 'white' 'black'
Out-Buffer 'write out as many lines as you like, one-at-a-time, like' 'white' 'black'
Out-Buffer 'this, and there is really no downside to doing that.' 'white' 'black'
sleep -m 3000
Out-Buffer '' 'Gray' 'black'
Out-Buffer 'Right? '.PadRight(58,"-") 'Red' 'black'
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'It''s clearly not as slick to just pop in multiple lines' 'white' 'black'
sleep -m 1200
Out-Buffer 'with absolutely no scroll delay, and it makes it a little ' 'white' 'black'
sleep -m 1200
Out-Buffer 'hard to tell what you have read already, but that''s ok.' 'white' 'black'
sleep -m 1200
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'If you delay between paragraphs.' 'Red' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'But: don''t scroll off-screen faster than I can read!' 'Yellow' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
}
## Test-BufferBox 3.1 - Now with Tab completion
####################################################################################################
## Imagine it's a chat window: you can type, but the whole time, the ongoing conversation in the
## chat room you have joined is going on in the background.
##
## NOTE: because this is a "chat" demo, we treat your input as text, and to execute script in-line
## you have to enclose it inside $() braces.
####################################################################################################
function Test-BufferBox {
param( $title = "PowerShell Interactive Buffer Demo" )
Reset-Buffer -ShowInput -Title $Title
###################################################################################################
##### We only need this for the purposes of the demo...
##### In a real script you would, presumably, be getting stuff from somewhere else to display
$noise = $MyInvocation.MyCommand.Definition -split "`n"
$index = 0;
$random = New-Object "Random"
[regex]$chunker = @'
[^ \\"']+|([\\"'])[^\\\\1]*?\\\\1[^ \\"']*|([\\"'])[^\\\\1]*$| $
'@
##### Printing a "How to Exit" message
Out-Buffer " " -Fore DarkGray -Back Cyan
Out-Buffer " This is just a demo. " -Fore Black -Back Cyan
Out-Buffer " We will stream in the source code of this script ... " -Fore Black -Back Cyan
Out-Buffer " And you can type at the bottom while it's running. " -Fore Black -Back Cyan
Out-Buffer " Imagine this as an n-way chat application like IRC, except that " -Fore Black -Back Cyan
Out-Buffer " FOR THIS PERFORMANCE ONLY: " -Fore Black -Back Cyan
Out-Buffer " The part of your chatting friends is played by my source code. " -Fore DarkGray -Back Cyan
Out-Buffer " " -Fore DarkGray -Back Cyan
Out-Buffer " Press ESC to exit, or enter 'exit' and hit Enter" -Fore Black -Back Cyan
Out-Buffer " " -Fore DarkGray -Back Cyan
##### Setting the prompt
Set-BufferInputLine
##### And initializing our two variables ...
$line=""
$exit = $false
switch(Show-ConsoleMenu "Continue the demo","Stop the demo","Exit PowerShell" "What would you like to do now?" -UseBuffer) {
0 { <# do nothing, will continue #> }
1 { $exit = $true <#this script exits cleanly below#> }
2 { exit <# stop abruptly #> }
}
while(!$exit){
while(!$exit -and $Host.UI.RawUI.KeyAvailable) {
$char = $Host.UI.RawUI.ReadKey("IncludeKeyUp,IncludeKeyDown,NoEcho");
# we don't want the key up events, but we do want to get rid of them
if($char.KeyDown) {
switch([int]$char.Character) {
13 { # Enter
if($line.Trim() -eq "exit") { $exit = $true; break; }
###################################################################################################
###################################################################################################
############# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING #############
############# This executes the user input! #############
############# Don't use this on, say, content you got from a web page or chat room #############
iex "Out-Buffer `"$line`" -Fore Red"; #############
###################################################################################################
###################################################################################################
$line = "";
Set-BufferInputLine
break;
}
27 { # Esc
$exit = $true; break;
}
9 { # Tab
if($line.Length -gt 0) {
[Array]$words = $chunker.Matches($line)
if($words.Count -ge 1) {
Out-Buffer ($Words | Out-String) -Fore Black -Back White
$lastWord = $words[$($words.Count-1)].Value
$trim = $lastWord.TrimEnd("`r","`n")
## This may return more than one ... in which case subsequent tabs should iterate through them
## But for demo purposes, this is more than enough work...
$replacement = TabExpansion -Line $line -LastWord ($lastWord.Trim() -replace '"')
Out-Buffer ($replacement | Out-String) -Fore Black -Back White
$line = $line.SubString(0, $line.Length - $lastWord.Length) + @($replacement)[0]
Set-BufferInputLine $line
}
}
break;
}
8 { # Backspace
if($line.Length -gt 0) {
$line = $line.SubString(0,$($line.Length-1))
}
# $pos = $Host.UI.RawUI.CursorPosition
Set-BufferInputLine $line
break;
}
0 {
# Not actually a key
# Out-Buffer $($Char | Out-String)
break;
}
default {
$line += $char.Character
Set-BufferInputLine $line
}
}
}
}
# Simulate doing useful things 25% of the time
if($random.NextDouble() -gt 0.75) {
$noise[($index)..($index++)] | Out-Buffer
if($index -ge $noise.Length){$index = 0}
}
sleep -milli 100
}
$CursorPosition = $BufferPromptPosition
$CursorPosition.Y += 2
$CursorPosition.X = 0
$Host.UI.RawUI.CursorPosition = $CursorPosition
}
|
combined_dataset/train/non-malicious/sample_25_84.ps1
|
sample_25_84.ps1
|
#
# Module manifest for module 'OCI.PSModules.Oce'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Oce.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Oce Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList',
'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList',
'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList',
'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance',
'Remove-OCIOceInstance', 'Update-OCIOceInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_38_5.ps1
|
sample_38_5.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create a new Azure Load Testing resource.
.Description
Creates a new Azure Load Testing resource in the resource group.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api20221201.ILoadTestResource
.Link
https://learn.microsoft.com/powershell/module/az.loadtesting/new-azload
#>
function New-AzLoad {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api20221201.ILoadTestResource])]
[CmdletBinding(PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('LoadTestName')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[System.String]
# Name of the new Azure Load Testing resource.
${Name},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[System.String]
# Name of the resource group.
${ResourceGroupName},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the subscription.
${SubscriptionId},
[Parameter(ParameterSetName='CreateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[System.String]
# Location where the Azure Load Testing resource needs to be created.
${Location},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[System.String]
# The managed identity for Customer-managed key settings defining which identity should be used to authenticate to Key Vault.
# Ex: '/subscriptions/fa5fc227-a624-475e-b696-cdd604c735bc/resourceGroups/<resource group>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myId' uses the given user-assigned managed identity.
${EncryptionIdentity},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[System.String]
# Encryption key URL, versioned.
# Ex: https://contosovault.vault.azure.net/keys/contosokek/562a4bb76b524a1493a6afe8e536ee78.
${EncryptionKey},
[Parameter(ParameterSetName='CreateExpanded')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Support.ManagedServiceIdentityType])]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Support.ManagedServiceIdentityType]
# Type of managed identity.
${IdentityType},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api50.IUserAssignedIdentities]))]
[System.Collections.Hashtable]
# The list of user assigned identities associated with the resource. The user identity will be ARM resource ids.
# The User Assigned Identity is a hashtable with keys in the form of an ARM resource id '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}.
# The values of the keys are empty objects ({}) in requests.
${IdentityUserAssigned},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api30.ITrackedResourceTags]))]
[System.Collections.Hashtable]
# Key-value pairs in the form of a hash table set as tags on the server. For example: @{key0="value0";key1=$null;key2="value2"}.
${Tag},
[Parameter(ParameterSetName='CreateExpanded')]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(ParameterSetName='CreateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(ParameterSetName='CreateExpanded', DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
# if encyyption identity has a value, populate the encryption identity type and encryption identity resource id
# add the managed identity to the list of user assigned identities
if ($PSBoundParameters.ContainsKey('EncryptionIdentity')) {
$null = $PSBoundParameters.Add("EncryptionIdentityResourceId", $PSBoundParameters['EncryptionIdentity'])
$null = $PSBoundParameters.Add("EncryptionIdentityType", 'UserAssigned')
$null = $PSBoundParameters.Remove('EncryptionIdentity')
# Update the identity type
if($PSBoundParameters.ContainsKey('IdentityType')) {
if($PSBoundParameters['IdentityType'].ToString().ToLower() -eq 'none') {
$null = $PSBoundParameters.Add("IdentityType", 'UserAssigned')
}
elseif($PSBoundParameters['IdentityType'].ToString().ToLower() -eq 'systemassigned') {
$null = $PSBoundParameters.Add("IdentityType", 'SystemAssigned,UserAssigned')
}
}
else {
$null = $PSBoundParameters.Add("IdentityType", 'UserAssigned')
}
# Update the User Assigned Identities
if ($PSBoundParameters.ContainsKey('IdentityUserAssigned')) {
if ($null -eq $PSBoundParameters['IdentityUserAssigned']){
$PSBoundParameters['IdentityUserAssigned'] = @{}
}
$PSBoundParameters['IdentityUserAssigned'][$PSBoundParameters['EncryptionIdentityResourceId']] = @{}
}
else {
$null = $PSBoundParameters.Add("IdentityUserAssigned", @{ $PSBoundParameters['EncryptionIdentityResourceId'] = @{} })
}
}
Az.LoadTesting.internal\New-AzLoad @PSBoundParameters
}
catch {
throw
}
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAQXgft0aZ6TnNU
# Sl1j/A+V4ZAbM44EG67HHwSL4auCeqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKCw
# Za2qzOmidrjf1TxWvF8Qf1LKaROtcKBy8ft9JX1VMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAhfIVn6e5dcMB5MEDbOq5SbCbgjWxsO3gWOkA
# CkNDj9+u0lCXPn89Q54V2xI2W0Zj3GlDkhlTo2yxmcnbak4I3j9HOToEI2msD75t
# Ihh+L5KGq2WWsB7B6XY/QyFRjat2m88juN/zDx+FEfV/XQB4CyTvDTcZR94erU/b
# fhv1B6pU069ntQHk+u23IVM0G0nylqilXei2us2+kKmzMGD+hEHm4lKzxQsCiyWX
# 6urwh3ZQAN7BIBBimywP/38W+rJeDRhUJfV4sscskyQ03OuofATRxisy82Z2qbiH
# I+jafLE3nV9NgOnkW2By3gJjqebjo+LbuJzINGP4j8f96iy0JqGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBU8pWbs5yzvbImEmTLrbEVVfTXnt11Pd+a
# 2Jd29PA/vgIGZh/+xUOnGBMyMDI0MDQyMzEzMTYxMy43MDRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd
# ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO
# A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g
# 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v
# FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm
# v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR
# KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj
# lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY
# C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834
# bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu
# YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w
# pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I
# l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy
# vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS
# mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx
# vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q
# Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k
# VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm
# i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp
# upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY
# h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW
# InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU
# hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi
# DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy
# NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH
# /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97
# pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm
# cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA
# Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgm6IXsNMuwckiJOBJXnj0E9rU2DK9f+5AuCHn7ne6
# Zs8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3
# 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc
# GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAGjTVluxL1uk08l+b00X
# 3A16C3JKIhV4CAogVxjAWIHfkMnH5lrYvRj9HFBhSTdwfanH363BYfOWKQDGyBZB
# D8K6MDX2B9gXItLifS/jitDlgqUk0zggvamWQLQ5bj+S5r3K4JGe8m5B14yMxIwU
# mGxFurHEHTTBx/ZOsebSdrnt6/tMxY66ksZYDLvPL64jr1UI4B7YxRuQCkRQrao6
# e5yQoN79Fhq6UkA5nX1BU8u3NFCrKm3Nw1042GlrF9oNm543jVAs0o7wxivl1pdh
# f6lomuRt/e8z7b9uiePychSEtphGrih1yXIvVku08s494D8ro5Xbi4BqNdxkOCE1
# /sfnMH0aL0wlG/kQwBUaRqSkEG/ZRRRzp6A4cizeqJJvWuTMeBcnU3EOYy+BKuzK
# +kkOHz3TPBuIdN1xWRJRaXnUGvEUg9OEox9cDV8737GnR2Vh49FvoXAufG+SF9br
# IkRimp//zUCY2e+NNhawBBnbn5J3ae7q7t+uvitEwJB6cdB1UDWtHUk1VTNBdth5
# RvsQlyeGfosssaNX/OXShzut9wB9na3qKIwPWDjE8Dz+1iYXLUxNBtiLTl44W7e0
# m73EBsCsB87qTSJPr33SdWynXg+IvcYugkyUMl+9W1FQIlMfmvkLeSCMEPQH70C7
# It5B82W1kPEaq4Qn5m5MRrqr
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_66_86.ps1
|
sample_66_86.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ocicontrolcenter'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList',
'Get-OCIOcicontrolcenterNamespacesList',
'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_49_38.ps1
|
sample_49_38.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ospgateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ospgateway.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2c26fa04-4a4e-49f5-877a-c15e551fc06e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ospgateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ospgateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOspgatewayAddress', 'Get-OCIOspgatewayAddressRule',
'Get-OCIOspgatewayInvoice', 'Get-OCIOspgatewayInvoiceLinesList',
'Get-OCIOspgatewayInvoicesList', 'Get-OCIOspgatewaySubscription',
'Get-OCIOspgatewaySubscriptionsList',
'Invoke-OCIOspgatewayAuthorizeSubscriptionPayment',
'Invoke-OCIOspgatewayDownloadPdfContent',
'Invoke-OCIOspgatewayPayInvoice',
'Invoke-OCIOspgatewayPaySubscription',
'Invoke-OCIOspgatewayVerifyAddress',
'Update-OCIOspgatewaySubscription'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ospgateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_5_68.ps1
|
sample_5_68.ps1
|
#************************************************
# DC_RDSGW.ps1
# Version 1.0.1
# Date: 21-01-2012
# Author: Daniel Grund - dgrund@microsoft.com
# Description:
# This script gets the RDSSH config and
# checks vital signs to inform user.
# 1.0.0 Beta release
#************************************************
PARAM(
$TargetHost = "localhost",
$RDSobject,
$OutputFileName ,
$OS,
$RDSSDPStrings,
$bIsRDSGW
)
# globals and function definitions for RDS
$OutputFolder = $PWD.Path
Import-LocalizedData -BindingVariable RDSSDPStrings
Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSGW
$RDSGWLB = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayLoadBalancer -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWLB)
{
$OutputFileName = SaveAsXml $RDSGWLB ($TargetHost + "_Win32_TSGatewayLoadBalancer.xml") $OutputFileName
}
$RDSGWRAD = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayRADIUSServer -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWRAD)
{
$OutputFileName = SaveAsXml $RDSGWRAD ($TargetHost + "_Win32_TSGatewayRADIUSServer.xml") $OutputFileName
}
$RDSGWRAP = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayResourceAuthorizationPolicy -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWRAP)
{
$OutputFileName = SaveAsXml $RDSGWRAP ($TargetHost + "_Win32_TSGatewayResourceAuthorizationPolicy.xml") $OutputFileName
}
$RDSGWCAP = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayConnectionAuthorizationPolicy -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWCAP)
{
$OutputFileName = SaveAsXml $RDSGWCAP ($TargetHost + "_Win32_TSGatewayConnectionAuthorizationPolicy.xml") $OutputFileName
}
$RDSGWRG = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayResourceGroup -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWRG)
{
$OutputFileName = SaveAsXml $RDSGWRG ($TargetHost + "_Win32_TSGatewayResourceGroup.xml") $OutputFileName
}
$RDSGWS = FilterWMIObject (Get-CimInstance -Class Win32_TSGatewayServerSettings -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate)
if ($null -ne $RDSGWS)
{
$OutputFileName = SaveAsXml $RDSGWS ($TargetHost + "_Win32_TSGatewayServerSettings.xml") $OutputFileName
}
# get the HTTPS cert from host
$File = $OutputFolder + "\"+ $TargetHost + "_GateWayCert.cer"
switch([RDSHelper]::GetHttpsCert($TargetHost, $File))
{
0{
[array]$OutputFileName += $File
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $false
}
1{
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $true -Parameter @{"Solution" = "$RDSSDPStrings.ID_RDSGWCert1"}
}
2{
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $true -Parameter @{"Solution" = "$RDSSDPStrings.ID_RDSGWCert2"}
}
3{
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $true -Parameter @{"Solution" = "$RDSSDPStrings.ID_RDSGWCert3"}
}
4{
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $true -Parameter @{"Solution" = "$RDSSDPStrings.ID_RDSGWCert4"}
}
5{
Update-DiagRootCause -Id "RC_RDSGWCert" -Detected $true -Parameter @{"Solution" = "$RDSSDPStrings.ID_RDSGWCert5"}
}
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBbTOHax3qSDkjZ
# pwcZsdhhu0vUxHRgpkO6yHEmEICtrqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFJmCW61iSD9OdF/zS58oQFd
# rTrHkKsqLSmfRLmdruzLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAH+eINRjb9xSkaRpqhvMnsQTaJUpcX6zVvbtafAOUsuZDUU1W4Ek8Hn7z
# hovHYmF4oyFlSErCm6ffDGIhuDNkJ7KqAhN4QRhuOyaLvragFAdeYbXL1Bn2T3l8
# +oC0d53PYDFAqleZrQ8nBKo3NpFe8PHfFEDvONG/9qOpq0hQyrzc76gMkDIhlHuZ
# eFf8mvTmeFRhwhoLwP5KCWdr87noVKRPvnIROeDHQOi5LhRuMDchgb8idwNeaEdc
# 4tGJD3ryDyLP6ePVOwV9FeWpyqQ3keEsIsqh3vtSC8HfHDxWTjdC5Jpm+ZjLtcuF
# QiHcYubP8K4N07/OIc4CLAja8WDdCqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBxDX3//u4sps3hYGF0ZfvWOk27hFx49yqj0iPB9DtJKwIGZv8ZfhHx
# GBMyMDI0MTAyODExNDA0My40ODFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF
# +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx
# Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd
# /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI
# SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o
# YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa
# x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z
# dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E
# Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z
# Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43
# 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4
# 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ
# fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1
# WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w
# B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV
# 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO
# 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7
# 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF
# Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL
# yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS
# KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz
# W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6
# HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN
# t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0MTAyOTEwMTYxNVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEAAgIV+jAHAgEAAgISoDAK
# AgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBpUFU4+vZJFyUm
# Vb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGXevIycaqI5McGg28UnXlT
# 85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQuxkh2lsfu3f8RO+rHyvy
# oc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMIGgIOURNjC5+mH+r4R0gk
# grO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnExw84j1PW/7aPVhavzoHfT
# 0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6jvcBxO0h6Uf9FkqnHwg7B
# sMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgacQ9DPBLkC8a
# 62IyBwrKWagerXmbeHLhSBb07K36ZpkwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2
# MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhIwwAlMA0GCSqGSIb3DQEB
# CwUABIICAAq1YQmnx4QzDTzdpjCP1JcSBy5y+cnjvqCXMEQc6Au6rupJ+Bu1U4jn
# fqzwiNbrXLYGyFXIdw20M6fuyAP7HLPitK4eJzch5p42iFNHAaMDwJX5FXpLfBkj
# INVxqjZFojKYEa805WAYSBFSEyamr0bLr5m/uMX+/TXWkBxZBFeTdDFaFDfQE3Em
# 4/y4ofmSbDDgdJEHFUKBFzWkK6Mt3VX9fbhhHPffsNQXJSMxeDNTGPvCMOh30feP
# g8a9JwvX+C0CwFSdou/HHkvdRzVAIi/6e7WLybcFMgF+1fI8la7UeSmiKaWdAnsX
# cCLv1myHiNaLnf4CIjP1iwg1lXVgedVduY8pe0aMPe2dgJjiBmIwaHHh1aJAAOaH
# SF8tOblP7A8pe+cRnvdloGeXNOm8/0NRSFz2rhSoFqbRx93M8yvq5ljI9zfc8tIV
# sHj1uJGOwXqD7OaeTX7sg69s52SMbARjoGqcad9liue5uYxKWQg++DZG8UyApqpV
# Pdd2reapTbmMNu5iQ9wWk/zX9KSyPKQRNwMrKt7gFy8NbifIZAQko/E5r6PhMHuU
# FO5H7xM3j0N561oJeO3Yh33Wigy737bEV038/4Z9wEkiyzLm1QS0GtNClvRQFegU
# Q9J1bhtdjEJjWLiMzJqxWKaWxpIQXRe3R16ujo9uTQ5hYDukZIiD
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_6_44.ps1
|
sample_6_44.ps1
|
#region ::::: Help :::::
<#
.SYNOPSIS
Script Name: GetLogs.ps1
Purpose: gather data from Windows Failover Cluster Nodes (default 3 Month back)
Version: 1.4
Last Update: 2nd June 2020
Author: Josef Holzer
Email-Alias: josefh
.DESCRIPTION
This script collects data from one or more computers
If the script runs on a cluster node with cluster service running, it collects data from all cluster nodes
.PARAMETER ComputerNames
Define on which computers you want to run the script. Default is local host
.PARAMETER LogPathLocal
Path where we store the data. Default is SystemDrive\MS_DATA\DataTime; e.g. C:\MS_DATA\180925-101214
.PARAMETER HoursBack
How much hours should we look back in the event data and collect them. Test Default =1
.PARAMETER EventLogNames
Define the Eventlogs you want to gather; wildcard * is allowed
Sample: -EventLogNames "System", "Application", "*CSVFS*", "*Smb*", "*winrm*", "*wmi*", "*spaces*"
Alternatively define this in the parameter section on top of this script
.EXAMPLE
GetLogs.ps1 # simply run it without any parameter to collect all data with defaults
.EXAMPLE
GetLogs.ps1 -ComputerName H16N4 # run the script data collection on specific computer
.EXAMPLE
To access the Info´s stored in xml files, do what is done in the following sample
$Inf= Import-CliXml -path "C:\MS_DATA\190221-121553\H16N1-GeneralInfoPerHost.xml"
$Inf # lists all Members
$Inf.Hotfix # Lists installed Hotfixes for example
.EXAMPLE
checkout
#>
#endregion ::::: Help :::::
#region ::::: Changelog - Whats New in this Version :::::
<#
Changelog started at 20th of April 2020
Ver 1.3 - What´s new ?
- Added function CopyFilesInReportsFoldersToLocalComputer -ComputerNames $ComputerNames
From each Node additionally collecting all files in "$Env:SystemRoot\Cluster\Reports" (e.g. c:\windows\cluster\reports) to Local MS_DATA Folder
- By default collect more "Event Logs"
- *CSVFS*, *Hyper-V*, "*Smb*", "*spaces*"
#>
#endregion ::::: Changelog - Whats New in this Version :::::
#region ::::: ToDo - Ideas for the future ::::::
<#
[=== Processing on Customer Site - Data Collection ===]
- Distribute Jobs across Hosts
- Collect Disk, Volume etc. data
- Create a Map
- Volume --> Partition --> Disk
- CSV --> Volume --> Disk --> GUID
- Add most important parts of Get-NetView to GetNetInfoPerHost
- Add Binary Versions - like Get-NetView does this to GetGeneralInfoPerHost
[=== Processing on Engineers Machine ===]
- Extract more simply *.txt files from *.xml files
[=== Data Analysis ===]
- System Eventlog
- find most common events 5120, 1135, 6005
- Cluster Log
- operational green events
- Cluster Service started - clussvc.exe started - Mostly you this is due to a reboot
- The current time is - gives you the local time and the difference to Cluster GMT
- The logs were generated using - Tells you if logs were generated in GMT or local time
- I am the form/join coordinator (offline and lowest number node) - tells you who the coordinator node is
- GroupMove -Cluster Groups are Moved by cluster service
- MoveType::Manual) - Tells you if the Move Group was triggered manually by the customer
- General Errors, Warnings...
- ERR - Errors - Case sensitive
- WARN - Warnings - Case sensitive
- critical - Critical Events
- fatal
- failed
- Critical Events of Clussvc and rhs
- terminated,
- Cluster service terminated
- Cluster service has terminated
- removed from the active failover cluster membership - the node was removed from the active cluster
- timeout
- Timed out
- STATUS_IO_TIMEOUT
- deadlock
- Critical Events - communication Issue
- as down
- are down
- lost communication
- is broken
- is no longer accessible
- Node Disconnected - Node communication to this node does no longer work - Networking issue
- Disconnected - general look for Disconnected - mostly Physical Disk resource xyz has been disconnected
- Lost quorum - Lost Cluster Quorum (including votes of witness resource)
- Critical Events - Isolated, quarantined
- isolated - Cluster Node has beem marked as beeing in isolated state
- I have been quarantined - The current node says it has been quarantined - node ungracefully leaves cluster 3 times in an hour
- has been quarantined - Another Node in the cluster has been quarantined
- 'Start-ClusterNode –ClearQuarantine' - clussvc tried to ClearQuarantine
- quarantine - General Info on nodes quarantine status
- Critical Events - Disks
- SetSharedPRKey: failed - tried to send SCSIReserve Command with Persistent Reservation Shared Key, but failed
- Reservation.SetPrKey failed - SCSI Persistent Reservation Key failed
- PR reserve failed, status 170 - SCSI Persistent Reservation failed - so you can´t access the disk
- Unable to arbitrate - tried to arbitrate a disk - SCSIReserve was sent, but this node could not claim the disk
- Critical Events - CSV
- is no longer accessible from this cluster node - CSV is no longer accessible from this cluster node
- is no longer available on this node because of - CSV is no longer available on this node because of - hopefully a reason is mentioned
- STATUS_CONNECTION_DISCONNECTED - CSV has entered a paused state because of STATUS_CONNECTION_DISCONNECTED
#>
#endregion ::::: ToDo - Ideas for the future ::::::
#region ::::: Define Script Input Parameters :::::
param(
$ComputerNames = $env:COMPUTERNAME, # Pass ComputerNames e.g. H16N1, default is local host name
[String]$LogPath = "$env:SystemDrive\MS_DATA\" + (Get-Date -Format 'yyMMdd-HHmmss'), # Path where the data on each remote computer will be stored
[Int]$HoursBack = 2016, # Define how much hours we should look back in the eventlogs 1day= 24; 1Week=168, 1Month= 672, 3Month= 2016, 6Month= 4032, 1Year= 8064
[String]$ClusterName, # if no ClusterName is passed use local Cluster - implemented in main
# Define which EventLogNames should be collected; either you pass the full Eventlogname or a mask like "*Hyper*"
# To check out what the Eventlog names look like for e.g. Hyper-V: Get-WinEvent -ListLog "*Hyper-V*"
$EventLogNames=(
"System",
#"Application",
"*CSVFS*",
"*Hyper-V*",
"*Smb*",
"*spaces*"
#"*winrm*",
#"*wmi*",
#"Microsoft-Windows-FailoverClustering/Operational"
),
# Define which cluster validation tests should run on customers Cluster Nodes
$ClusterValidationTestNames=(
"Cluster Configuration",
"Hyper-V Configuration",
"Inventory","Network",
#"Storage", # Note: Storage Tests will lead to a short interruption of access to disks and should not be run in a production environment
"System Configuration"
),
#region ::::: Switches :::::
[switch]$NetInfo = $True # If $NetInfo is true, we call GetNetInfoPerHost to collect network related information
#endregion ::::: Switches :::::
)
#endregion ::::: Define Script Input Parameters :::::
#region ::::: Define Global Variables :::::
# Section for global variables, which you don´t want to show up in the parameter region
[bool]$IsClusSvcRunning = $False # variable, to save status of cluster service running/stopped
#endregion ::::: Define Global Variables :::::
#region ::::: Helper Functions :::::
#function Show Progress - Global parameters
$sTimeStampScriptStart= [String](Get-Date -Format 'yyMMdd-HHmmss') # Date as String to be used in Folder Name for Files e.g. MS_DATA\190820-1032
$TimeStampScriptStart = Get-Date # get the timestamp, when this script starts
$TimeStampStartSaved = $Script:TimeStampScriptStart # only first time save the script start timestamp
$DebugLogPath = $LogPath # Directory, where the logs are stored
$DebugLogPathFull = "$DebugLogPath\$sTimeStampScriptStart-ScriptDebug.log" # FullPath of the Scripts Debug.log
$DebugLogLevel = 3 # If DebugLogLevel is 3 everything is logged; 0 is disabled, 1=Light, 2= Medium, 3=All
$DebugLogBuffer = @() # Collect DebugLog Messages in ShowProgress and save them later to a file
$DebugLogCount = 0 # Counter for DebugLogs
$DebugLogCountMax = 50 # After X Messages Save to file
$DebugLogToFile = $True # Default is True, so we spew out the Debug Messages to a File
$RunOnlyOnce = $True # Bool to spew out some Messages only once
$ScriptFullName = $MyInvocation.InvocationName # Full Path of the Script Name
<#
SYNOPSIS: show what we are doing so far; should be placed on top of all other functions
Owner: josefh/sergeg
#>
function ShowProgress {
param(
$MessageUser = "", # pass your own message
$ForeColor = "White" # default ForeGroundColor is White
)
If ($Script:DebugLogLevel -eq 0 ) { Return } # If DebugLogLevel is 0 exit this function imediately
# Get the function name, that was calling ShowProgress
function GetFunctionName ([int]$StackNumber = 1) {
# https://stackoverflow.com/questions/3689543/is-there-a-way-to-retrieve-a-powershell-function-name-from-within-a-function
return [string]$(Get-PSCallStack)[$StackNumber].FunctionName
}
$TimeDisplay = [String](Get-Date -Format 'yyMMdd-HHmmss') # time stamp to display on each action/function call. eg 'yyMMdd-HHmmss'
$TimeStampCurrent = Get-Date
$TimeDiffToStart = $TimeStampCurrent - $TimeStampScriptStart # overall duration since start of script
$TimeDiffToLast = $TimeStampCurrent - $Script:TimeStampStartSaved # time elapsed since the last action
$Script:TimeStampStartSaved = $TimeStampCurrent # update/save timestamp to measure next progress duration
$FuncName = GetFunctionName -StackNumber 2 # Last Function Name
[String]$DurScriptDisplay = "" + $TimeDiffToStart.Minutes + ":" + $TimeDiffToStart.Seconds # " ;Script ran for Min:Sec = " # display duration since script start
[String]$DurFunctionDisplay = "" + $TimeDiffToLast.Minutes + ":" + $TimeDiffToLast.Seconds # " ;Last Action took Min:Sec= " # display duration of last action or function call
if (-not ($TimeDiffToLast.TotalSeconds -ge 1) ) { $DurFunctionDisplay = "0:0" }
If ($RunOnlyOnce){ # Only first time write the head line to explain the columns
$Description= "Script Started at $sTimeStampScriptStart ScriptFullName:$ScriptFullName on Host:$($Env:ComputerName) "
If (-Not ( Test-Path -Path $DebugLogPath ) ){ # if the DebugLogPath does not already exist, e.g. default is c:\MSDATA, then Create it
New-Item -Path $DebugLogPath -ItemType Directory
}
write-host -fore Green $Description
$Description | Out-File -FilePath $DebugLogPathFull -Append
$Description= "TimeStamp |TimeSinceScriptStarted Min:Sec|DurationOfLastAction Min:Sec|FunctionName| UserMessage"
<#
Sample Output
"TimeStamp |TimeSinceScriptStarted Min:Sec|DurationOfLastAction Min:Sec|FunctionName| UserMessage"
190820-103322|0:0 |0:0 |CreateFolder| Enter
190820-103322|0:0|0:0|CreateFolder| ...On Node:H16N2 creating folder: \\H16N2\C$\MS_DATA\190820-103322
190820-103322|0:0|0:0|CreateFolder| try:CreateFolder: \\H16N2\C$\MS_DATA\190820-103322
190820-103322|0:0|0:0|CreateFolder| Folder \\H16N2\C$\MS_DATA\190820-103322 could be created successfully
190820-103322|0:0|0:0|CreateFolder| Exit
#>
write-host $Description
$Description | Out-File -FilePath $DebugLogPathFull -Append
$Script:RunOnlyOnce= $False
}
$FullString= "$TimeDisplay|$DurScriptDisplay|$DurFunctionDisplay|$FuncName| $MessageUser"
write-host -Fore $ForeColor $FullString
# if $DebugLogToFile is $Ture store Output in the Logfile
if ($DebugLogToFile){
$Script:DebugLogCount++
$Script:DebugLogBuffer+= $FullString
if ($Script:DebugLogCount -ge $DebugLogCountMax) {
write-host -ForegroundColor Yellow "Flushing DebugLogBuffer to $DebugLogPathFull"
$Script:DebugLogBuffer | Out-File -FilePath $DebugLogPathFull -Append
$Script:DebugLogCount= 0 # Reset DebugLogCount to 0
$Script:DebugLogBuffer= @() # Reset DebugLogBuffer to empty String
}
}
} # End of ShowProgress
# Checkout if the script runs as admin
function DoIRunAsAdmin{
$currentPrincipal = New-Object Security.Principal.WindowsPrincipal `
( [Security.Principal.WindowsIdentity]::GetCurrent() )
if ($currentPrincipal.IsInRole( [Security.Principal.WindowsBuiltInRole]::Administrator )) {
return $true
}
else {
return $false
}
}
function CreateFolder {
# SYNOPSIS: a general function to create any folder, do some checks and do reporting
Param(
$HostName,
$FolderPath
)
ShowProgress "Enter"
$ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference
$ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own
if (-not (Test-Path $FolderPath) ){ # if the folder does not already exist
ShowProgress "...On Node:$HostName creating folder: $FolderPath"
try{
ShowProgress "try:CreateFolder: $FolderPath"
If ($Env:ComputerName -eq $HostName){ # if we are on the local host where we run the script
New-Item -Path $FolderPath -ItemType Directory | Out-Null # Create folder on the loacal host, to make it faster and prevent issues with WinRM
}
else{
Invoke-Command -ComputerName $HostName -ScriptBlock { # Make it all remote capable
New-Item -Path $Using:FolderPath -ItemType Directory | Out-Null # Create folder, could be remote and suppress output
}
}
ShowProgress "Folder $FolderPath could be created successfully"
#ShowProgress "...On Node:$HostName finished creating folder: $FolderPath"
}
Catch{ # since ErrorActionPreference is on 'Stop' we jump into the catch block if New-Item failed
ShowProgress -Fore red "Catch: Error during Folder Creation" # we ran into an issue
ShowProgress -Fore red "Unable to create the Folder $FolderPath on $HostName "
ShowProgress -Fore Red "FullQualifiedErrorId: $($Error[0].FullyQualifiedErrorId)"
ShowProgress -Fore Red "Full ErrorMessage:$_"
If ($Error[0].FullyQualifiedErrorId -like "AccessDenied*"){
ShowProgress -Fore Magenta "Please check if you are running the powershell host (window) with administrative privileges"
}
If ($Error[0].FullyQualifiedErrorId -like "*server name cannot be resolved*"){
$HostNameFQDN= [System.Net.Dns]::GetHostEntry($HostName).HostName
ShowProgress -Fore Magenta "Looks like the Server Name could not be resolved. [System.Net.Dns]::GetHostEntry(`$HostName):$HostNameFQDN "
}
ShowProgress -ForeColor Yellow -BackColor Black "Aborting this script now "
EXIT
}
}
$ErrorActionPreference = $ErrorActionPreferenceSave
ShowProgress "Exit"
}
function CreateLogFolderOnHosts {
# SYNOPSIS: could be only one
param(
$ComputerNames,
$LogPath
)
ShowProgress "...Start creating Log folder on Hosts: $ComputerNames"
foreach($ComputerName in $ComputerNames){
ShowProgress "...Start creating Log folder on Host:$ComputerName"
$LogPathDollar = $LogPath.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data
$LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data
CreateFolder -HostName $ComputerName -FolderPath $LogPathUNC
}
ShowProgress "...Finished creating log folder on hosts"
}
function MoveDataFromAllComputersToLocalComputer {
# SYNOPSIS: move remotly collected data to local folder, e.g. C:\MS_DATA\180925-101214
param(
$ComputerNames
)
ShowProgress "Enter"
$LocalHost = $env:COMPUTERNAME
$LogPathLocal = $Script:LogPath # LogPath e.g. c:\MS_DATA
$ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference
$ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own
$WaitSec = 10 # Wait for a couple of seconds; default 10 seconds
ShowProgress "...Start moving all data files from all Hosts:$ComputerNames to local Host:$LocalHost"
foreach($ComputerName in $ComputerNames){
if (-not ($ComputerName -eq $LocalHost) ){
$LogPathDollar = $LogPath.Replace(":","$") # e.g. $LogPath = C:\MS_DATA --> C$\MS_DATA
$LogPathRemoteUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS_DATA
ShowProgress "...Start moving files from $LogPathRemoteUNC to $LogPathLocal"
# Sometimes the remote path is not reachable, so we check out and handle this one time
# if it becomes a reoccuring issue we should run this in a loop and try several times
if ( !(Test-Path -Path $LogPathRemoteUNC) ){
ShowProgress -Fore DarkMagenta "Catch: Could not reach remote Path: $LogPathRemoteUNC" # we had an issue - lets wait and do the move then
ShowProgress -Fore DarkMagenta "Let´s wait for some seconds:$WaitSec ... and try again"
Start-Sleep -Seconds $WaitSec # Wait for a couple of seconds if the path is not available immediately
}
# if the path is available
ShowProgress "Finally: Moving Remote files to Local Host "
ShowProgress "...trying to collect all data files from all Hosts:$ComputerNames and move to local Host:$LocalHost ..."
Move-Item -Path $LogPathRemoteUNC\* -Destination $LogPathLocal # Move Files to Local Path
}
}
$ErrorActionPreference = $ErrorActionPreferenceSave
ShowProgress "...Finished moving all data files from all Hosts:$ComputerNames to local Host:$LocalHost"
ShowProgress "Exit"
}
function CopyFilesInReportsFoldersToLocalComputer{
# SYNOPSIS: Copy files in "C:\Windows\Cluster\Reports" from each node to local folder, e.g. C:\MS_DATA\180925-101214
#Validation Reports, #Cluster\reports, #reports, #test-cluster
param(
$ComputerNames
)
ShowProgress "Enter"
$LocalHost = $env:COMPUTERNAME
$LogPathLocal = $Script:LogPath # LogPath e.g. c:\MS_DATA
$ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference
$ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own
$WaitSec = 10 # Wait for a couple of seconds; default 10 seconds
ShowProgress "...Start Copying all files in '`$Env:SystemRoot\Windows\Cluster\Reports' from each node:$ComputerNames to local Host:$LocalHost"
foreach($ComputerName in $ComputerNames){
$ReportsPath = "$Env:SystemRoot\Cluster\Reports" # Reports Path on the current Node "C:\Windows\Cluster\Reports"
$ReportsPathDollar = $ReportsPath.Replace(":","$") # e.g. $ReportsPathDollar= "C$\Windows\Cluster\Reports"
$ReportsPathUNC= "\\$($ComputerName)\$ReportsPathDollar" # e.g. = $ReportsPathUNC= "H16N2\C$\Windows\Cluster\Reports"
ShowProgress "...Start copying files from $ReportsPathUNC to $LogPathLocal"
# Sometimes the remote path is not reachable, so we check out and handle this one time
# if it becomes a reoccuring issue we should run this in a loop and try several times
if ( !(Test-Path -Path $ReportsPathUNC) ){
ShowProgress -Fore DarkMagenta "Catch: Could not reach remote Path: $ReportsPathUNC" # we had an issue - lets wait and do the move then
ShowProgress -Fore DarkMagenta "Let´s wait for some seconds:$WaitSec ... and try again"
Start-Sleep -Seconds $WaitSec # Wait for a couple of seconds if the path is not available immediately
}
# if the path is available
ShowProgress "Finally: Copying Remote files to Local Host "
ShowProgress "...trying to copy all files in $ReportsPath to $LogPathLocal"
$ReportsFolder= "$LogPathLocal\$ComputerName\Reports"
CreateFolder -HostName $env:COMPUTERNAME -FolderPath $ReportsFolder
Copy-Item "$ReportsPathUNC\*" -Destination $ReportsFolder # Copy Reports Folder to e.g. c:\MS_DATA\H16\Reports
}
$ErrorActionPreference = $ErrorActionPreferenceSave
ShowProgress "...Finished Copying all files in $($ReportsPathUNC) to $($ReportsFolder)"
ShowProgress "Exit"
} #Endof CopyFilesInReportsFoldersToLocalComputer
#endregion ::::: Helper Functions :::::
#region ::::: Worker Functions to Collect Computer specific Data for each host Eventlogs, OSVersion... ::::::
function GetEventLogs {
# SYNOPSIS: collect eventlogs from all machines
param(
$ComputerNames, # the name or a list of names of the computers, local or remote you want to gather Eventlogs from
$HoursBack = $Script:HoursBack, # Define how much hours we should look back in the logs; Default is script scope variable $HoursBack
$LogNames # list of event log names; either you pass the full Event Log name like "System" or a mask like "*Hyper*"
# Sample: $EventLogNames=("System", "Application", "*CSVFS*")
)
ShowProgress "Enter"
foreach($ComputerName in $ComputerNames){
# Gather all EventLogs from current ComputerName, extract only last # of hours
# Walk through each LogName in LogNames e.g. ("System", "Application", "*CSVFS*")
foreach($LogName in $LogNames){
$LogFamilyNames = Get-WinEvent -ListLog $LogName -ErrorAction SilentlyContinue # $LogFamilyNames could be a mask representing several Logs - a LogFamily - e.g. *SMB*
# if the LogName does not exist on this computer spew out a message
If ( $Null -eq $LogFamilyNames) {
ShowProgress -Fore DarkMagenta "Could not find the following Log on this Computer: $LogName"
}
# if a Pattern like *SMB* has been passed - walk through each Logname
foreach($LogFamilyName in $LogFamilyNames){ # Microsoft-Windows-SmbClient/Audit, Microsoft-Windows-SMBServer/Audit and so on
$LogFileName = ($LogFamilyName.LogName).Replace("/","_") # Replace Forward Slash in EventLogNames with UnderScore
$LogPathDollar = $LogPath.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data
$LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data
$LogFileNameXML = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".XML"
$LogFileNameTXT = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".Log"
$LogFileNameEvtx = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".evtx"
#Gather SystemEventlogs
ShowProgress "...Start gathering EventLog:$($LogFamilyName.LogName) for Computer:$ComputerName"
# Collecting EventLogs respecting HoursBack
$StartTime = (Get-Date).AddHours(-$HoursBack)
# Using a Filter Hash Table to filter events that match $MinutesBack
# More Info: https://blogs.technet.microsoft.com/heyscriptingguy/2014/06/03/use-filterhashtable-to-filter-event-log-with-powershell/
$Evts = Get-WinEvent -ComputerName $ComputerName -ErrorAction SilentlyContinue -FilterHashtable @{Logname=$LogFamilyName.LogName; StartTime=$StartTime}
#Sorting Events and selecting properties we really need
$EvtsSorted = $Evts | Sort-Object TimeCreated -Descending | Select-Object MachineName, LevelDisplayName, TimeCreated, ProviderName, Id, LogName, Message
# Export Events to deserialized *.xml file
$EvtsSorted | Export-CliXml -Path $LogFileNameXML
# Export Events as simple *.txt file
$EvtsSorted | Export-Csv -Path $LogFileNameTXT -NoTypeInformation
# Gathering Eventlogs in old style *.evtx with wevtutil.exe
ShowProgress "...Gathering *.evtx with Old-Style-Tool:wevtutil"
$MilliSecondsBack = $HoursBack * 60 * 60 * 1000
wevtutil.exe /remote:$ComputerName epl $LogFamilyName.LogName $LogFileNameEvtx /q:"*[System[TimeCreated[timediff(@SystemTime) <=$MilliSecondsBack]]]" /ow:true
<# Gathering Eventlogs in the old style as *.txt - not fully checked yet
wevtutil qe Application /c:3 /rd:true /f:text
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil
#>
ShowProgress "...Finished gathering $($LogFamilyName.LogName) for Computer:$ComputerName"
ShowProgress "-----------------------------"
}
}
}
ShowProgress "Exit"
}
#josefh- needs to be overworked
function GetStorageInfoPerHost{
param(
$ComputerNames
)
ShowProgress "Enter"
$LogPathLocal = $Script:LogPath
#Stor physical disks and the StorageNode they are connected to
$AllStorageNodeDisks=@()
$NodeDisks=@()
ShowProgress "Enter"
$StorageNodes= Get-StorageNode
foreach($StorageNode in $StorageNodes){
$Dsks= $StorageNode | Get-PhysicalDisk -PhysicallyConnected
foreach($Dsk in $Dsks){
$Dsk | Add-Member -NotePropertyName StorageNodeName -NotePropertyValue $StorageNode.Name
$NodeDisks+=$Dsk
}
$NodeDisks | Export-CliXML -Path "$LogPathLocal\$($StorageNode.Name)-DisksPhysicallyConnected.xml"
$AllStorageNodeDisks+= $NodeDisks
$NodeDisks= @()
}
#gather additional data on storage
foreach($ComputerName in $ComputerNames){
$StorSubSysClus = Get-StorageSubSystem *Cluster*
ShowProgress "$StorSubSysClus | Debug-StorageSubSystem"
try{ $StorDebugOut= $StorSubSysClus | Debug-StorageSubSystem -ErrorAction Stop } # stop so that the error is not handled by the cmdlet
catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" }
# Define our own Storage Information Object $StorInf, that takes all Info around Storage
$StorInf= [PSCustomObject][ordered]@{
#S2D Info
S2D = Get-ClusterS2D
S2DClusParam = Get-Cluster | Select-Object S2D* # S2DBusTypes= 134144 -> S2D
#Physical Disks - # Interessting props Get-PhysicalDisk | select SerialNumber, CanPool, CannotPoolReason, LogicalSectorSize, PhysicalSectorSize | ft
GetPhysicalDisk = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-PhysicalDisk }
DisksPhysicallyConnected = $AllStorageNodeDisks # Physical Disks Connected to which Node + Node Name
#Storage Subsystem
StorSubSysClus = $StorSubSysClus
StorJob = $StorSubSysClus | Get-StorageJob
StorDebugOut = $StorDebugOut
}
# Check if we have a Health Resource
$HealthResourceType= Get-ClusterResource | Where-Object {$_.ResourceType -like "*Health*" }
if ($Null -ne $HealthResourceType){ # if we have a Health Resource
ShowProgress "Found a Health Resource on this cluster - Storing Storage Info"
#Cluster Health
$StorInf | Add-Member -NotePropertyName StorHealthAction -NotePropertyValue ($StorSubSysClus | Get-StorageHealthAction )
$StorInf | Add-Member -NotePropertyName StorHealthSetting -NotePropertyValue ($StorSubSysClus | Get-StorageHealthSetting )
$StorInf | Add-Member -NotePropertyName StorHealthReport -NotePropertyValue ($StorSubSysClus | Get-StorageHealthReport ) # deprecated in 2019 - Use Get-ClusterPerformanceHistory instead.
$StorInf | Add-Member -NotePropertyName HealthResParam -NotePropertyValue (Get-ClusterResource Health | Get-ClusterParameter)
$StorInf | Add-Member -NotePropertyName HealthResParamVal -NotePropertyValue ((Get-ClusterResource Health | Get-ClusterParameter).Value )
}
# Export Info from each Node in a Separate File
ShowProgress "Export Storage from Host: $ComputerName"
$StorInf | Export-CliXML -Path "$LogPathLocal\$ComputerName-StorageInfoPerHost.xml"
ShowProgress "...Finished Gathering GeneralInfoPerHost - stored in $LogPathLocal\$ComputerName-StorageInfoPerHost.xml"; write-host
}
ShowProgress "Exit"
}
function GetClusterPerformanceHistory{
<# $P=Import-CliXml -path "C:\MS_DATA\200204-083456\H19N1-ClusPerf.xml"
($P.Disks).Description | Group | Sort Name # To get disks listed on each Node
($P.Disks | Where Description -like "H19N1-Disk2001") | ft Desc*, SizeInGB, Time, MetricId,Value # To get values per a special disk
#>
param(
$ClusterName,
$ComputerNames
)
ShowProgress "Enter"
$LogPathLocal = $Script:LogPath
# Check if it is 2019 Server with CU Oct 2019 or higher
$OS= (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion")
$ReleaseId= [Int]$OS.ReleaseId
$ReleaseIdMin= 1809 # 1809= 2019 Server + CU Oct 2019
if ($ReleaseId -lt $ReleaseIdMin){
ShowProgress -ForeColor Magenta "In this OS we did not implement Get-ClusterPerf"
ShowProgress -ForeColor Magenta "OS:$($OS.ProductName); Build:$($OS.CurrentBuild); ReleaseId:$ReleaseId"
ShowProgress -ForeColor Magenta "Exiting this function GetClusterPerformanceHistory"
Return # Exit this function
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
# Define empty arrays to take ClusterPerformanceHistory types
foreach($ComputerName in $ComputerNames){
ShowProgress "Collecting ClusterPerformanceHistory for Computer: $ComputerName"
ShowProgress "Get-VM | Get-ClusterPerf"
$VMs= Get-VM -CimSession $ComputerName
If ( $Null -ne $VMs ){
$ClusPerfVMs=@()
$ClusPerfVHDs=@()
foreach($VM in $VMs){
# Get-ClusterPerf Counters for each VM
$V= $VM | Get-ClusterPerf
$V | Add-Member -NotePropertyName VMName -NotePropertyValue $VM.VMName
$V | Add-Member -NotePropertyName VMId -NotePropertyValue $VM.VMId
$V | Add-Member -NotePropertyName State -NotePropertyValue $VM.State
$ClusPerfVMs+= $V
$VHDs= $VM | Select-Object VMId | Get-VHD -CimSession $ComputerName | Get-ClusterPerf
$ClusPerfVHDs+= $VHD | Get-ClusterPerf
}
}
ShowProgress "Get-PhysicalDisk | Get-ClusterPerf"
$PhysicalDisks= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-PhysicalDisk }
$ClusPerfDisks=@()
foreach($PhysicalDisk in $PhysicalDisks){
ShowProgress "Get-PhysicalDisk | Get-ClusterPerf - Disk $($PhysicalDisk.Description)"
try{
$Dsk= $PhysicalDisk | Get-ClusterPerf
$Dsk | Add-Member -NotePropertyName UniqueId -NotePropertyValue $PhysicalDisk.UniqueId
$Dsk | Add-Member -NotePropertyName PhysicalLocation -NotePropertyValue $PhysicalDisk.PhysicalLocation
$Dsk | Add-Member -NotePropertyName Description -NotePropertyValue $PhysicalDisk.Description
$Dsk | Add-Member -NotePropertyName SizeInGB -NotePropertyValue ($PhysicalDisk.Size/1024/1024/1024) # in GB
$ClusPerfDisks+= $Dsk
}
catch{
write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)"
}
}
ShowProgress "Get-NetAdapter | Get-ClusterPerf"
$NetAdapters= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-NetAdapter }
$ClusPerfNetAdapters=@()
foreach($NetAdapter in $NetAdapters){
try{
$Nic= $NetAdapter | Get-ClusterPerf
$Nic | Add-Member -NotePropertyName Name -NotePropertyValue $NetAdapter.Name
$Nic | Add-Member -NotePropertyName LinkSpeed -NotePropertyValue $NetAdapter.LinkSpeed
$Nic | Add-Member -NotePropertyName DeviceID -NotePropertyValue $NetAdapter.DeviceID
$Nic | Add-Member -NotePropertyName SystemName -NotePropertyValue $NetAdapter.SystemName
$ClusPerfNetAdapters+= $Nic
}
catch{
write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)"
}
}
ShowProgress "Get-Volume | Get-ClusterPerf"
$Volumes= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-Volume }
$ClusPerfVolumes=@()
foreach($Volume in $Volumes){
try{
$Vol= $Volume | Get-ClusterPerf
$Vol | Add-Member -NotePropertyName ObjectId -NotePropertyValue $NetAdapter.ObjectId
$Vol | Add-Member -NotePropertyName UniqueId -NotePropertyValue $NetAdapter.UniqueId
$Vol | Add-Member -NotePropertyName SizeInGB -NotePropertyValue ($NetAdapter.Size/1024/1024/1024)
$Vol | Add-Member -NotePropertyName FileSystemType -NotePropertyValue $NetAdapter.FileSystemType
$ClusPerfVolumes+= $Vol
}
Catch{
write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)"
}
}
ShowProgress "Get-ClusterNode | Get-ClusterPerf Node: $ComputerName"
try{
$ClusPerfClusterNode= Get-ClusterNode $ComputerName | Get-ClusterPerf
}
Catch{
write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)"
}
ShowProgress "Get-Cluster | Get-ClusterPerf"
try{
$ClusPerfCluster= Get-Cluster -Name $ClusterName | Get-ClusterPerf
}
Catch{
write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)"
}
$ClusPerf= [PSCustomObject][ordered]@{
Cluster = $ClusPerfCluster
ClusterNode = $ClusPerfClusterNode
Disks = $ClusPerfDisks
NetAdapters = $ClusPerfNetAdapters
VMs = $ClusPerfVMs
VHDs = $ClusPerfVHDs
Volumes = $ClusPerfVolumes
}
# Export all ClusterPerformanceHistory Info in xml File
ShowProgress "Export ClusterPerformanceHistory: $ComputerName"
$ClusPerf | Export-CliXML -Path "$LogPathLocal\$ComputerName-ClusPerf.xml"
ShowProgress "...Finished Gathering ClusterPerformanceHistory - stored in $LogPathLocal\$ComputerName-ClusterPerformanceHistory.xml"; write-host
} # foreach($ComputerName in $ComputerNames){
} # function GetClusterPerformanceHistory{
# Gather all FirewallRules with respect to a Firewall Name Filter and return as 1 object $oFirewall
Function GetFirewallRules{
param(
$ComputerName,
$FireWallNameFilter # e.g. "Cluster" # "*" gets all Firewall Rules, but you can add your filter e.g. "cluster"
)
ShowProgress "Enter"
# Gather Infos you need for your object
$FireWallRules= Get-NetFirewallRule -CimSession $ComputerName | Where-Object { $_.DisplayName -like "*$FireWallNameFilter*" }
$FirewallPorts= Get-NetFirewallPortFilter -CimSession $ComputerName
$oFireWall= @() # Create an empty array to add your Firewall Objects one by one
ForEach($FireWallRule in $FireWallRules){ # Walk through each FirewallRule
ForEach($FirewallPort in $FirewallPorts){ # Walk through each Firewall Port
if ($FireWallPort.InstanceId -eq $FireWallRule.Id){ # check if Id´s do match
# old way to create your own Powershell Object: $F= New-Object PSObject -Property @{
$F= [PSCustomObject][ordered]@{ # Create your own Object with your properties ordered
FWName= $FireWallRule.Name
FWDisplayName= $FireWallRule.DisplayName
FWDirection= $FireWallRule.Direction
FWEnabled= $FireWallRule.Enabled
FWProfile= $FireWallRule.Profile
PTProtol= $FireWallPort.Protocol
PTLocalPort= $FireWallPort.LocalPort
PTRemotePort= $FirewallPort.RemotePort
}
$oFirewall+= $F # Add the current object to the Array
}
}
}
ShowProgress "Exit"
Return $oFirewall #return the whole array to the global scope
} # End GetFirewallRules
function GetMsInfo32nfo{
param(
$ComputerNames
)
ShowProgress "Enter"
$LogPathLocal = $Script:LogPath
foreach($ComputerName in $ComputerNames){
msinfo32.exe /nfo "$LogPathLocal\$ComputerName-msinfo32.nfo" /Computer $ComputerName
}
ShowProgress "Exit"
}
function GetGeneralInfoPerHost{
param(
$ComputerNames
)
ShowProgress "Enter"
$LogPathLocal = $Script:LogPath
foreach($ComputerName in $ComputerNames){
# Read Current Windows Version from the Registry
$WinNTKey = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" }
$WinVer = $WinNTKey | Select-Object ProductName, InstallationType, ReleaseId, CurrentMajorVersionNumber, CurrentMinorVersionNumber, CurrentBuild, BuildBranch, BuildLab, UBR
$WinVerGUI = "$($WinVer.ProductName) - Microsoft Windows $($WinVer.InstallationType) - Version $($WinVer.ReleaseId) (OS Build $($WinVer.CurrentBuild).$($WinVer.UBR)) "
$VerifierQuery = Invoke-Command -ComputerName $ComputerName -ScriptBlock { verifier.exe /query } #
$VerifierQuerySettings = Invoke-Command -ComputerName $ComputerName -ScriptBlock { verifier.exe /querysettings } #
$CrashControlRegKey = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ItemProperty -path "HKLM:System\CurrentControlSet\Control\CrashControl"} # Read Dump Type from Registry
<# $DumpType
"HKLM:System\CurrentControlSet\Control\CrashControl\CrashDumpEnabled"
$DumpType: None 0x0, Complete memory dump 0x1, Kernel memory dump 0x2, Small memory dump 0x3, Automatic Memory Dump 0x7,
if CrashDumpEnabled is 0x1 and a Key FilterPages shows up and is 0x1, then the UI shows "Active Memory Dump"
if CrashDumpEnabled is 0x1 and a Key FilterPages does not show up, then the UI shows "Complete Memory Dump"
Automatic memory dump 0x7 (Default 2012/ 2012R2 and beyond )
https://blogs.technet.microsoft.com/askcore/2012/09/12/windows-8-and-windows-server-2012-automatic-memory-dump/
#>
if ($CrashControlRegKey.CrashDumpEnabled -eq 0) { $DumpType= "None" }
if ($CrashControlRegKey.CrashDumpEnabled -eq 2) { $DumpType= "Kernel Memory Dump" }
if ($CrashControlRegKey.CrashDumpEnabled -eq 3) { $DumpType= "Small Memory Dump" }
if ($CrashControlRegKey.CrashDumpEnabled -eq 7) { $DumpType= "Automatic Memory Dump" }
if ( ($CrashControlRegKey.CrashDumpEnabled -eq 1) -and ($Null -eq $CrashControlRegKey.FilterPages) ) { $DumpType= "Complete Memory Dump" } # Complete Memory Dump
if ( ($CrashControlRegKey.CrashDumpEnabled -eq 1) -and ($CrashControlRegKey.FilterPages -eq 1) ) { $DumpType= "Active Memory Dump" } # Active Memory Dump
$ComputerInfo = if ($PSVersionTable.PSVersion.Major -ge 5) {
Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ComputerInfo }
}
else{
"No ComputerInfo as Get-ComputerInfo only works with PS Ver. > 5"
}
# Get All Firewall Rules
ShowProgress "Collecting FirewallRules on Host $ComputerName"
$oFireWallRules= GetFirewallRules -FireWallNameFilter "*" -ComputerName $ComputerName
$Process= Get-Process
$Service= Get-Service
# Store typical Commands that can later be used to analyze data in the Exported *.xml file
$Commands=
("
`$I= Import-CliXml -path 'FullPathToYourXMLFile' e.g. `$I= Import-CliXML -path `"C:\MS_DATA\191113-113833\H16N1-GeneralInfoPerHost.xml`"
`$I.Hotfix
`$I.CrashControlRegKey
`$I.FirewallRules | sort FWDirection | Select-Object FWDirection, FWName, FWDisplayName, PTProtol, PTLocalPort | Out-GridView
")
# Create the custom Object to put all Info together
$GenInf= [PSCustomObject][ordered]@{
HostName= $ComputerName
Hotfix= Get-Hotfix -ComputerName $ComputerName
WinVer= $WinVer
WinVerGUI= $WinVerGUI
PSVersionTable= $PSVersionTable
VerifierQuery= $VerifierQuery
VerifierQuerySettings= $VerifierQuerySettings
CrashControlRegKey= $CrashControlRegKey
DumpType= $DumpType
ComputerInfo= $ComputerInfo
FirewallRules= $oFireWallRules
Process= $Process
Service= $Service
Commands= $Commands
}
# Export Info from each Node in a Separate File
ShowProgress "Export General Info: HostName, Hotfix, Winver, ComputerInfo, PSVersionTable from Host: $ComputerName"
$GenInf | Export-CliXML -Path "$Script:LogPath\$ComputerName-GeneralInfoPerHost.xml"
ShowProgress "...Finished Gathering GeneralInfoPerHost - stored in $LogPathLocal\$ComputerName-GeneralInfoPerHost.xml"; write-host
}
ShowProgress "Exit"
}
function GetNetInfoPerHost{
# SYNOPSIS: collect network related info on each host
param(
$ComputerNames
)
ShowProgress "Enter"
if ($Script:NetInfo -eq $false) { RETURN } # if the switch $NetInfo is false exit this function and do not collect any Net-data here
$LogPathLocal = $Script:LogPath # LogPath e.g. C:\MS_DATA
foreach($ComputerName in $ComputerNames){
ShowProgress "...Start gathering network info on Computer:$ComputerName "
$net = [PSCustomObject][ordered]@{
ComputerName = $ComputerName
NetIpconfig = Get-NetIPConfiguration -CimSession $ComputerName
Ipconfig = Ipconfig /all
IpconfigDNS = Ipconfig /DisplayDNS
SmbMultichannelConnection = Get-SmbMultichannelConnection -CimSession $ComputerName
SmbServerConfiguration = Get-SmbServerConfiguration -CimSession $ComputerName
SmbConnection = Get-SmbConnection -CimSession $ComputerName
SmbSession = Get-SmbSession -CimSession $ComputerName
SmbBandWidthLimit = Get-SmbBandWidthLimit -CimSession $ComputerName -ErrorAction SilentlyContinue
SmbServerNetworkInterface = Get-SmbServerNetworkInterface -CimSession $ComputerName
SmbMultichannelConstraint = Get-SmbMultichannelConstraint -CimSession $ComputerName
SmbWitnessClient = Get-SmbWitnessClient -CimSession $ComputerName
NIC = Get-NetAdapter -CimSession $ComputerName
NICAdv = Get-NetAdapterAdvancedProperty -CimSession $ComputerName -Name *
NICBind = Get-NetAdapterBinding -CimSession $ComputerName –Name *
NICRxTx = Get-NetAdapterChecksumOffload -CimSession $ComputerName -Name *
NICHW = Get-NetAdapterHardwareInfo -CimSession $ComputerName -Name *
NICRIpsec = Get-NetAdapterIPsecOffload -CimSession $ComputerName -Name *
NICLso = Get-NetAdapterLso -CimSession $ComputerName -Name *
NICQos = Get-NetAdapterQos -CimSession $ComputerName –Name *
NICREnc = Get-NetAdapterEncapsulatedPacketTaskOffload -CimSession $ComputerName -Name *
NICRdma = Get-NetAdapterRdma -CimSession $ComputerName –Name *
NICRsc = Get-NetAdapterRsc -CimSession $ComputerName –Name *
NICRss = Get-NetAdapterRss -CimSession $ComputerName –Name *
NICSriov = Get-NetAdapterSriov -CimSession $ComputerName –Name *
NICVmqQueue = Get-NetAdapterVmqQueue -CimSession $ComputerName –Name *
NICVmq = Get-NetAdapterVmq -CimSession $ComputerName –Name *
}
# Export Info from each Node in a Separate File
$net | Export-CliXML -Path "$LogPathLocal\$ComputerName-NetInfoPerHost.xml"
ShowProgress "...Finished gathering network Info per computer and stored in $LogPathLocal\$ComputerName-NetInfoPerHost.xml"
ShowProgress "Exit"
}
}
#endregion ::::: Workerfunctions to Collect Computer specific Data for each host Eventlogs, OSVersion... ::::::
#region ::::: Worker Functions to collect Cluster specific Info ::::::
function IfClusterGetNodeNames{
# SYNOPSIS: Test nodes connection and create a list of reachable nodes
ShowProgress "Enter"
$ErrorActionPreferenceNow= $ErrorActionPreference
$ErrorActionPreference= 'Stop'
$LocalComputerName = $env:COMPUTERNAME
# Checkout if the cluster service is answering on this node
try{
# Check if the cluster service is running
if ( (Get-Service -Name ClusSvc).Status -eq "Running" ){
ShowProgress -Fore Green "Cluster Service is running on this computer: $LocalComputerName"
$Script:IsClusSvcRunning = $True
}
else { # if we are on a cluster, but the cluster service is not running we land here
$Script:IsClusSvcRunning= $False
ShowProgress -Fore DarkMagenta "Cluster Service 'clussvc' is not running on this computer "
ShowProgress "Exit" # Exit this loop if cluster service is not running
RETURN $LocalComputerName # Return local ComputerName, if this computer is not running cluster service to gather Logs from this Host
}
}
catch{ # if we are not on a cluster at all we are landing here
ShowProgress -Fore DarkMagenta " 'Get-Service -Name ClusSvc' did not answer - looks if we have no Cluster Service on this computer "
ShowProgress "Exit"
RETURN $LocalComputerName # Return local ComputerName, if this computer is not running cluster service to gather Logs from this Host
}
# if cluster service did not answer we do not reach the following code
# if cluster service answered we reached this code and will Test Network Connections to all Cluster Nodes
ShowProgress "...Start testing if we can reach the Cluster Nodes over the network"
$GoodNodeNames = @() # Cluster Nodes we can reach over the network
$BadNodeNames = @() # Cluster Nodes we can not reach over the network
$ClusterNodeNames= (Get-ClusterNode).NodeName
foreach($ClusterNodeName in $ClusterNodeNames){
if (Test-Connection -ComputerName $ClusterNodeName -Count 1 -Quiet){ # test network connection
$GoodNodeNames += $ClusterNodeName
}
else {
$BadNodeNames += $ClusterNodeName
}
}
$Nodes = [PSCustomObject]@{
Good = $GoodNodeNames
Bad = $BadNodeNames
}
ShowProgress -Fore Green " - Could connect to Cluster Nodes: $($Nodes.Good)"
if ( '' -ne ($Nodes.Bad) ){ # if we could not connect to all Nodes and have Bad Nodes...
ShowProgress -Fore Red " - Could not connect to Cluster Nodes: $($Nodes.Bad)" # ...show bad nodes
}
else{
ShowProgress " - Could connect to all Cluster Nodes" -ForeColor "green"
}
ShowProgress "...Finished testing network connection to Cluster Nodes"
$ErrorActionPreference= $ErrorActionPreferenceNow
ShowProgress "Exit"
Return $Nodes.Good # Return only the Good Nodes we can reach
}
Function GetClusterLogs{
param(
$ClusterName, # could be replaced by the Cluster Name as string to run remotely
$HoursBack= $Script:HoursBack # How much Minutes should we look back in the logs - it´s defined in the main chapter
)
ShowProgress "Enter"
If (!($IsClusSvcRunning)){
ShowProgress "Exit"
RETURN # Exit this function
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
ShowProgress "...Start Gathering Cluster Logs for Cluster Name:$ClusterName"
# Gather ClusterLogs from All Nodes
$MinutesBack= $HoursBack * 60
Get-ClusterLog -Cluster $ClusterName -TimeSpan $MinutesBack -Destination $Script:LogPath -UseLocalTime
ShowProgress "...Finished Gathering Cluster Logs for Cluster Name:$ClusterName";write-host
ShowProgress "Exit"
}
Function GetClusterHealthLogs{
param(
$ClusterName, # could be replaced by the Cluster Name as string to run remotely
$HoursBack= $Script:HoursBack # How much Minutes should we look back in the logs - it´s defined in the main chapter
)
ShowProgress "Enter"
If (!($IsClusSvcRunning)){
ShowProgress "Exit"
RETURN # Exit this function
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
ShowProgress "...Start Gathering Cluster Health Logs for Cluster Name:$ClusterName"
# Gather ClusterLogs from All Nodes
$MinutesBack= $HoursBack * 60
Get-ClusterLog -Cluster $ClusterName -TimeSpan $MinutesBack -Destination $Script:LogPath -UseLocalTime -Health
ShowProgress "...Finished Gathering Cluster Health Logs for Cluster Name:$ClusterName";write-host
ShowProgress "Exit"
}
function GetClusNet{ # Get all Cluster Network Info and add Livmigration Networks + LM Order and put it in one object
param(
$ClusterName
)
ShowProgress "Enter"
If (!($IsClusSvcRunning)){
ShowProgress "Clussvc is not running"
ShowProgress "Exit"
RETURN # Exit this function if clussvc is not running
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
$ResourceTypeVM= Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter
$ClusterNetworks= Get-ClusterNetwork -Cluster $ClusterName
$LiveMigrationExludeNetworks= Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter MigrationExcludeNetworks
$LiveMigrationNetworkOrder = (Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter MigrationNetworkOrder).Value.split(";")
$ClusNet= @()
foreach($ClusterNetwork in $ClusterNetworks){
$i=0
foreach($LMNetOrder in $LiveMigrationNetworkOrder){
if ($ClusterNetwork.Id -eq $LMNetOrder){
$LiveMigrationOrder= $i
BREAK
}
else{
$LiveMigrationOrder= "no LM"
}
$i++
}
foreach($LiveMigrationExludeNetwork in $LiveMigrationExludeNetworks){
$UsedForLiveMigration= $True
if ($ClusterNetwork.Id -eq $LiveMigrationExludeNetwork.value){
$UsedForLiveMigration= $False
}
$L= [PSCustomObject][ordered]@{
Address = $ClusterNetwork.Address
AddressMask = $ClusterNetwork.AddressMask
AutoMetric = $ClusterNetwork.AutoMetric
Cluster = $ClusterNetwork.Cluster
Description = $ClusterNetwork.Description
Id = $ClusterNetwork.Id
Ipv4Addresses = $ClusterNetwork.Ipv4Addresses
Ipv4PrefixLengths = $ClusterNetwork.Ipv4PrefixLengths
Ipv6Addresses = $ClusterNetwork.Ipv6Addresses
Ipv6PrefixLengths = $ClusterNetwork.Ipv6PrefixLengths
Metric = $ClusterNetwork.Metric
Name = $ClusterNetwork.Name
Role = $ClusterNetwork.Role
State = $ClusterNetwork.State
IsUsedForLiveMigration= $UsedForLiveMigration
LiveMigrationOrder = $LiveMigrationOrder
}
$ClusNet+=$L
}
}
ShowProgress "Exit"
Return $ClusNet
}
function GetClusterInfo{
param(
$ClusterName
)
$LogPathLocal = $Script:LogPath
ShowProgress "Enter"
If (!($IsClusSvcRunning)){
ShowProgress "Exit"
RETURN # Exit this function if clussvc is not running
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
$C= New-Object PSObject -Property @{ # Create your own Object with your properties
Name= $ClusterName
CSV= Get-ClusterSharedVolume
CSVParm= Get-ClusterSharedVolume | Get-ClusterParameter
CSVState= Get-ClusterSharedVolumeState
Group= Get-ClusterGroup
Net= Get-ClusterNetwork
NetplusLM= GetClusNet -ClusterName $ClusterName
NIC= Get-ClusterNetworkInterface
Node= Get-ClusterNode
Param= Get-Cluster -Name $ClusterName | Format-List *
Quorum= Get-ClusterQuorum
Res= Get-ClusterResource
}
# Export Cluster Info
$FileName= "$LogPathLocal\$($ClusterName)_ClusterInfo.XML"
$C | Export-Clixml -Path $FileName
# Create "$LogPathLocal\DependencyReports"
ShowProgress "...Start creating folder $LogPathLocal\DependencyReports"
$LogPathDollar = $LogPathLocal.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data
$LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data
CreateFolder -HostName $Env:ComputerName -FolderPath $DebugLogPath\DependencyReports
# Create Dependency Reports and save to LogPathLocal
$ClusterGroups= $C.Group
ForEach($ClusterGroup in $ClusterGroups){
Get-ClusterResourceDependencyReport -Group $ClusterGroup -ErrorAction SilentlyContinue | Copy-Item -Destination "$LogPathLocal\DependencyReports"
Rename-Item -Path "$LogPathLocal\DependencyReports\$($ClusterGroup.Id).htm" -NewName "$ClusterGroup-ClusGroupDependencyRep.htm" -ErrorAction SilentlyContinue
}
ShowProgress "...Finished Gathering ClusterInfo - stored in $FileName "
ShowProgress "...Finished Gathering DependencyReports - stored in $LogPathLocal\DependencyReports" ; write-host
ShowProgress "Exit"
}
# Collect Cluster Hive and other files you need specific to cluster Nodes
function GetClusterHives{
param(
$ClusterName
)
ShowProgress "Enter"
If (!($IsClusSvcRunning)){
ShowProgress "Exit"
RETURN # Exit this function if clussvc is not running
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
$ClusterNodes= Get-ClusterNode -Cluster $ClusterName
ForEach($ClusterNode in $ClusterNodes){ # Walk through each ClusterNode
$HiveFileUNCPath= $Script:LogPath.Replace(":","$") # C:\MS-Data --> C$\MS-Data
$RemotePath= "\\$($ClusterNode.Name)\$HiveFileUNCPath" # \\H16N2\c$\MS-Data
# Saving the cluster Hive of the current Node
$TimeStamp= [String](Get-Date -Format 'yyMMdd-hhmmss') # Create a Timestamp for the Cluster Hive File
$ClusterHiveFileName = "$ClusterNode-Cluster-$TimeStamp.Hiv" # let´s add a time stamp to the cluster Hive File Name to make it unique
$ClusterHiveFileNameFull= "$RemotePath\$ClusterHiveFileName" # e.g. \\H16N2\c$\MS-Data\H16N2-Cluster-180705-103933.Hiv
# Export Cluster Hive on the remote node
Invoke-Command -ComputerName $ClusterNode.Name -ScriptBlock { Invoke-Expression "REG SAVE 'HKLM\cluster' $Using:ClusterHiveFileNameFull" }
# Move Cluster Hive later from remote node to local node we run the script from
ShowProgress "...Finished Gathering ClusterHives - stored in $Script:LogPath "; write-host
ShowProgress "Exit"
}
}
function GetClusterValidationInfo{
param(
$ClusterName,
$TestNames= $ClusterValidationTestNames
)
ShowProgress "Enter"
If (!($IsClusSvcRunning)){ # if the cluster service is not running on this node where the script runs, exit this function
ShowProgress "Exit"
RETURN # Exit this function
}
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
# Extension .htm is added automatically
Test-Cluster -Cluster $ClusterName -Include $TestNames -ReportName "$LogPathLocal\$ClusterName-Validation-Report"
ShowProgress "Exit"
}
function 5120 {
# SYNOPSIS: collect data for symptom System Event ID 5120
ShowProgress "Enter"
# to be defined
ShowProgress "Exit"
}
#endregion ::::: Worker Functions to collect Cluster specific Info ::::::
#region ===== MAIN - Preparations ==================================================
ShowProgress -Fore Green "Script Start..."
# Checkout if we are running with elevated privileges
$RunningAsAdmin= DoIRunAsAdmin
If ($RunningAsAdmin -eq $False){
ShowProgress -Fore Red "The script does not run in privileged (admin) mode"
ShowProgress -Fore DarkMagenta "so we can´t query the cluster service, can´t create a log folder, debuglogfile and so on... "
ShowProgress -Fore DarkMagenta "Please run again in privileged mode as admin"
ShowProgress -Fore Red "Exiting script now !"
EXIT # Exit the script now as it doesn´t make sense to run this script in non privileged mode
}
ShowProgress -Fore Green "Running functions that should go quickly now ..."
if ($ClusterName -eq ""){ # if no cluster name was passed
$ClusterName= (Get-Cluster).Name # Get local cluster name on this host
}
#josefh - needs to be overworked in order to do the check on a remote cluster as well
$ComputerNames = IfClusterGetNodeNames # Check if Cluster Service answers on the current computer; if yes get the node names we can reach over network else return local computername
ShowProgress "...running data collection on ComputerNames: $ComputerNames"
if ($IsClusSvcRunning) { # if script runs on a cluster create the LogFolder $LogPath on all Cluster Nodes
CreateLogFolderOnHosts -ComputerNames $ComputerNames -LogPath $LogPath
}
else { # else if the cluster service is not running create LogFolder $LogPath on local host
CreateFolder -HostName "$env:ComputerName" -FolderPath $LogPath
}
#endregion ===== MAIN - Preparations ==================================================
#region ===== MAIN - Workerfunctions ==================================================
# Run ::::: Worker Functions to collect general Info ::::::
#
ShowProgress -Fore Green "Running functions that take longer now ..."
GetEventLogs -ComputerNames $ComputerNames -HoursBack $HoursBack -LogNames $EventLogNames
GetStorageInfoPerHost -ComputerNames $ComputerNames # Storage, Disk, Volume...
GetGeneralInfoPerHost -ComputerNames $ComputerNames # HostName, Hotfix, Winver etc.
GetNetInfoPerHost -ComputerNames $ComputerNames # Ipconfig, Smb*, NIC* etc.
GetMsInfo32nfo -ComputerNames $ComputerNames
# End ::::: Worker Functions to collect general Info ::::::
# Run ::::: Worker Functions to collect Cluster specific Info ::::::
GetClusterLogs -ClusterName $ClusterName
GetClusterHealthLogs -ClusterName $ClusterName
GetClusterInfo -ClusterName $ClusterName
GetClusterHives -ClusterName $ClusterName
#GetClusterValidationInfo -ClusterName $ClusterName # -TestNames look for $ClusterValidationTestNames in parameter section
#GetClusterPerformanceHistory -ClusterName $ClusterName -ComputerNames $ComputerNames
# End ::::: Worker Functions to collect Cluster specific Info ::::::
# Administrative Tasks
MoveDataFromAllComputersToLocalComputer -ComputerNames $ComputerNames
CopyFilesInReportsFoldersToLocalComputer -ComputerNames $ComputerNames # From each node - copy all files in c:\windows\cluster\reports to Local MS_DATA Folder
#
# End of Script Messages
$ScriptDuration= ( (Get-Date) - $TimeStampScriptStart ) # Calculate how long the script ran
ShowProgress -Fore Green "Script ran for Min:Sec - $($ScriptDuration.Minutes):$($ScriptDuration.Seconds) "
$DebugLogCount= $DebugLogCountMax # to flush $DebugLogBuffer to the Logfile
ShowProgress -Fore Green "Exit Script - End of Script Logs can be found in: $LogPath"
#
#endregion ===== MAIN - Workerfunctions ==================================================
# SIG # Begin signature block
# MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIbvvVQNwa4mFg
# a9BGGLD5DpbH06bPvgJhk9o0MjGwEqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIETp
# WrNC7SmMUFIo5/S6U9ZfqNIh7D/OJ6r84pwinL9oMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAJy1a8b9rXHD7ZfJmcpSy7CAWvS4uwXDdhQyr
# BINZdbJzNs1LgMcbKPZuTi7+kCqBrxkHFM/LtP0ivr5IeU7PO6uwi2D6UNlN86BE
# EUtzIcS0ISxkflsaNs8Z4cOy7bjLNqS8wyKrdujk0OBmtLokLzwwypaVu2Ly6Pev
# KxtLlrH/Mu0f6jCC3GXA//vZ/ILvbY4yAXNhLZgb9My3ft3fkmlNX+VuhqtQbhDO
# TsLyBgm5Hri1Jid3FioMZTqxxB1V223BQWkEYPjnIu1UFzGqPJqIiXfyUZtXJTX0
# CfQVy+N2ZiWnZubr/fBzPLxxSrL0ouVao+T1r6wZAepFUz1AWqGCF5YwgheSBgor
# BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC1gcPykTJvY9S538KeBJmUl7MaER41d13y
# 1Zu+Vpk5uQIGZxp39maEGBIyMDI0MTAyODExMzUyNy4xMlowBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjo5MjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB5y6PL5MLTxvpAAEA
# AAHnMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDUxOVoXDTI1MDMwNTE4NDUxOVowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5MjAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMJXny/gi5Drn1c8zUO1pYy/
# 38dFQLmR2IQXz1gE/r9GfuSOoyRnkRJ6Z/kSWLgIu1BVJ59GkXWPtLkssqKwxY4Z
# FotxpVsZN9yYjW8xEnW3MzAI0igKr+/LxYfxB1XUH8Bvmwr5D3Ii/MbDjtN9c8Tx
# GWtq7Ar976dafAy3TrRqQRmIknPVWHUuFJgpqI/1nbcRmYYRMJaKCQpty4CeG+Hf
# Ksxrz24F9p4dBkQcZCp2yQzjwQFxZJZ2mJJIGIDHKEdSRuSeX08/O0H9JTHNFmNT
# NYeD1t/WapnRwiIBYLQSMrs42GVB8pJEdUsos0+mXf/5QvheNzRi92pzzyA4tSv/
# zhP3/Ermvza6W9GnYDz9qv1wbhbvrnS4poDFECaAviEqAhfn/RogCxvKok5ro4gZ
# IX1r4N9eXUulA80pHv3axwXu2MPlarAi6J9L1hSIcy9EuOMqTRJIJX+alcLQGg+S
# Tlqx/GuslsKwl48dI4RuWknNGbNo/o4xfBFytvtNcVA6xOQq6qRa+9gg+9XMLrxQ
# z4yyQs+V3V6p044wrtJtt/a0ZJl/f6I7BZAxxZcH2DDmArcAhgrTxaQkm7LM+p+K
# 2C5t1EKZiv0JWw065b7AcNgaFyIkMXYuSuOQVSNRxdIgl31/ayxiK1n0K6sZXvgF
# Bx+vGO+TUvyO+03ua6UjAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUz/7gmICfNjh2
# kR/9mWuHUrvej1gwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAHSh8NuT6WVaLVwL
# qex+J7km2nT2jpvoBEKm+0M+rYoU/6GL5Q00/ssZyIq5ySpcKYFMUiF8F4ZLG+Tr
# JyiR1CvfzXmkQ5phZOce9DT7yErLzqvUXit8G7igcHlxPLTxPiiGsb85gb8H+A2f
# PQ6Xq/u7+oSPPjzNdnpmXEobJnAqYplZoF3YNgTDMql0uQHGzoDp6dZlHSNj6rkV
# 1tXjmCEZMqBKvkQIA6csPieMnB+MirSZFlbANlChe0lJpUdK7aUdAvdgcQWKS6dt
# RMl818EMsvsa/6xOZGINmTLk4DGgsbaBpN+6IVt+mZJ89yCXkI5TN8xCfOkp9fr4
# WQjRBA2+4+lawNTyxH66eLZWYOjuuaomuibiKGBU10tox81Sq8EvlmJIrXOZoQsE
# n1r5g6MTmmZJqtbmwZufuJWQXZb0lAg4fq0ZYsUlLkezfrNqGSgeHyIP3rct4aNm
# qQW6wppRbvbIyP/LFN4YQM6givfmTBfGvVS77OS6vbL4W41jShmOmnOn3kBbWV6E
# /TFo76gFXVd+9oK6v8Hk9UCnbHOuiwwRRwDCkmmKj5Vh8i58aPuZ5dwZBhYDxSav
# wroC6j4mWPwh4VLqVK8qGpCmZ0HMAwao85Aq3U7DdlfF6Eru8CKKbdmIAuUzQrnj
# qTSxmvF1k+CmbPs7zD2Acu7JkBB7MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVALNyBOcZqxLB792u75w97U0X+/BDoIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZN2MCIY
# DzIwMjQxMDI4MDQzNzEwWhgPMjAyNDEwMjkwNDM3MTBaMHcwPQYKKwYBBAGEWQoE
# ATEvMC0wCgIFAOrJk3YCAQAwCgIBAAICCx8CAf8wBwIBAAICFJ4wCgIFAOrK5PYC
# AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK
# MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAAK7wrV6tIbdYD4oXAF9nOKc0
# Ys94nAticUsFKBbTHxtWz3C/ykEcvZMro97bfG0D/S4LAMGHo/l8LbFBvWPfp8Wf
# jIfvhoW+iSmyWFXifWQogTwuqGmU9GkauJJn6zTsNxU54sNnyNFXlGQ3f/ybLKPv
# pHkdKDJlqy1J5+RYsqF2C/WlrXIPyXo1u1wjr1bRWLDPhZ2OCotPC0BJsphI5a1L
# PTHJy/Io8YyV2X8/vKsOdPDk33XpS5ulxprY45X8Y/VEYBNBmgaDf7M+4phifYIQ
# +VL/ClQ8b+fZznHzSNPdGWHxJd3vBnFpn0pWAxNq9bPojS1h/C01RNpsT2i9aTGC
# BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 5y6PL5MLTxvpAAEAAAHnMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx
# DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIHB0hMYIDsWXiKFAkGQ/9ZCh
# BGOWhsSfTKT1byn/xLShMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg5TZd
# DXZqhv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCkfjB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAiBCB+TvIv
# 8WD6rAzEHzfJE0U004YFrb0iF5oVPZC9p8ecXTANBgkqhkiG9w0BAQsFAASCAgCt
# r0z18O5gygdeL2d/ij2OFMWuwJoptDpPxlLIQVOyFLyPf/WqzY5V7QmxNHBnPnrr
# yXZr/lTYC1zFvJE7QSCkXFk+Z6+trnk2Btw5y2+CWWtQBhv3z7WxYX2ub1xQmnfi
# TNKWw1lbVFhQpBrFmPjA8rY9MgT06L5+cDWvLvd24aF1+m5f3Mi14wtRmkgGQOm/
# jym381vhoaLCm9KDAFiTW7ir/qTmb+9DxAtrQpOsiwO9wJcgmx3oRhTfOcPvwJGm
# 1vyayDmSbdqcCL6pqAneN/G3HnWWmVKEgI0AwodXFLen5xusXoCx/kWedhRpyiGP
# lNgL7rl0bwHjvvLqEF5NbWnrEMNuUbAhXWrnxpQ9cMOWTyMt+R/xlokezZv2+jTi
# 5SiPdk5gPodm5Sj34M2OyLV56kqyWBX/BjdIKTXFunXFtduLoCwVO/c24DUH1ECj
# 5bApg2FUArIrS9Z4e0MsNYzaOfByBWQAE0pG0BKQmlRkdHfBOlAlEt+oKqacsb4G
# dtbSlNPtjQpQ7MwSZyhDPqSd2qmQ4UMQgI78o3mZeyECMbBZcPTlmhnam7PjRnkn
# XeV7ngJJ3f5egz4wUwKezEkX+WXquxC+eLFF6ODrGVu86PFgIYJbm2CU/KkPg5D7
# dAy3PJJxxsi/ueYiBCsO3xsNbD5QvBowIha1TE7qeQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_24_58.ps1
|
sample_24_58.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function Find-Ast {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[CmdletBinding(PositionalBinding=$false, DefaultParameterSetName='FilterScript')]
param(
[Parameter(Position=0, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[scriptblock]
$FilterScript = { $true },
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.Ast]
$Ast,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Before,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Family,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Closest', 'F')]
[switch]
$First,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Furthest')]
[switch]
$Last,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Parent')]
[switch]
$Ancestor,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$IncludeStartingAst,
[Parameter(ParameterSetName='AtCursor')]
[switch]
$AtCursor
)
begin {
# InvokeWithContext method is PS4+, but it's significantly faster for large files.
if ($PSVersionTable.PSVersion.Major -ge 4) {
$variableType = [System.Management.Automation.PSVariable]
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $Filter.InvokeWithContext(
<# functionsToDefine: #> $null,
<# variablesToDefine: #> [Activator]::CreateInstance($variableType, @('_', $DollarUnder)),
<# args: #> $aAst)
}
} else {
$FilterScript = [scriptblock]::Create($FilterScript.ToString())
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $DollarUnder | & { process { $Filter.InvokeReturnAsIs($DollarUnder) } }
}
}
# Get all children or ancestors.
function GetAllFamily {
param($Start)
if ($Before.IsPresent) {
$parent = $Start
for ($parent; $parent = $parent.Parent) { $parent }
return
}
return $Start.FindAll({ $true }, $true)
}
# Get all asts regardless of structure, in either direction from the starting ast.
function GetAllAsts {
param($Start)
$predicate = [Func[System.Management.Automation.Language.Ast,bool]]{
$args[0] -ne $Ast
}
$topParent = Find-Ast -Ast $Start -Ancestor -Last -IncludeStartingAst
if (-not $topParent) { $topParent = $Start }
if ($Before.IsPresent) {
# Need to store so we can reverse the collection.
$result = [Linq.Enumerable]::TakeWhile(
$topParent.FindAll({ $true }, $true),
$predicate) -as [System.Management.Automation.Language.Ast[]]
[array]::Reverse($result)
return $result
}
return [Linq.Enumerable]::SkipWhile(
$topParent.FindAll({ $true }, $true),
$predicate)
}
}
process {
if ($Ancestor.IsPresent) {
$Family = $Before = $true
}
$context = $psEditor.GetEditorContext()
if (-not $Ast -and $context) {
$Ast = $context.CurrentFile.Ast
}
switch ($PSCmdlet.ParameterSetName) {
AtCursor {
$cursorLine = $context.CursorPosition.Line - 1
$cursorColumn = $context.CursorPosition.Column - 1
$cursorOffset = $Ast.Extent.Text |
Select-String "(.*\r?\n){$cursorLine}.{$cursorColumn}" |
ForEach-Object { $PSItem.Matches.Value.Length }
# yield
Find-Ast -Last {
$cursorOffset -ge $PSItem.Extent.StartOffset -and
$cursorOffset -le $PSItem.Extent.EndOffset
}
}
FilterScript {
if (-not $Ast) { return }
# Check if we're trying to get the top level ancestor when we're already there.
if ($Before.IsPresent -and
$Family.IsPresent -and
$Last.IsPresent -and -not
$Ast.Parent -and
$Ast -is [System.Management.Automation.Language.ScriptBlockAst])
{ return $Ast }
if ($Family.IsPresent) {
$asts = GetAllFamily $Ast
} else {
$asts = GetAllAsts $Ast
}
# Check the first ast to see if it's our starting ast, unless
$checkFirstAst = -not $IncludeStartingAst
foreach ($aAst in $asts) {
if ($checkFirstAst) {
if ($aAst -eq $Ast) {
$checkFirstAst = $false
continue
}
}
$shouldReturn = InvokeWithContext $FilterScript $aAst
if (-not $shouldReturn) { continue }
# Return first, last, both, or all depending on the combination of switches.
if (-not $Last.IsPresent) {
$aAst # yield
if ($First.IsPresent) { break }
} else {
$lastMatch = $aAst
if ($First.IsPresent) {
$aAst # yield
$First = $false
}
}
}
# yield
if ($Last.IsPresent) { return $lastMatch }
}
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAItklfWteKH2i/
# HFdzPlev2c8mkTjAIWWicaXP36bs9qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIJKwga/iSAEmqs98xcuwgBq
# GXwTwWpA2lBHh7HkgP8MMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAU47PpGiWG55mgpgK7BfpQMS/jmZxtgF4wjQbYZ5oPMCy0lkSGH9PBge
# QVjqSkKG9Y6XUupsXINig5XnriLQUfbglw39gCIrU7JOg8rc/Duaujz+KDbmRq+8
# 9NsCK/DHp/SiwepNEqc3ydPFeo4wFHBuzNWWhPfozFUI0uP6l7glvOrB4v1Bn9wp
# vq0WWybIXpF2Bw2LXf8S6Bg2gjHRygAO7JxkkPxZalsMKmchZF6ttWlwhNHbBXMV
# +gNblu+tA4t5A984AdPfnRZP2Fu0Ahz7C/N210y1NUFcTbcGslcEWE5ivuc58wpV
# dmoQqGPBmX7mZRi4PaHkKsXCw3clLqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDPe6qccHE2dgRM5EkIv3myd2TNiWaQftFwg/MRutBmHAIGZaAPmyLI
# GBMyMDI0MDEyNjAyMjcxMi41NjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAdMdMpoXO0AwcwABAAAB0zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MjRaFw0yNDAyMDExOTEyMjRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC0jquTN4g1xbhXCc8MV+dOu8Uqc3KbbaWti5vdsAWM
# 1D4fVSi+4NWgGtP/BVRYrVj2oVnnMy0eazidQOJ4uUscBMbPHaMxaNpgbRG9FEQR
# FncAUptWnI+VPl53PD6MPL0yz8cHC2ZD3weF4w+uMDAGnL36Bkm0srONXvnM9eNv
# nG5djopEqiHodWSauRye4uftBR2sTwGHVmxKu0GS4fO87NgbJ4VGzICRyZXw9+Rv
# vXMG/jhM11H8AWKzKpn0oMGm1MSMeNvLUWb31HSZekx/NBEtXvmdo75OV030NHgI
# XihxYEeSgUIxfbI5OmgMq/VDCQp2r/fy/5NVa3KjCQoNqmmEM6orAJ2XKjYhEJzo
# p4nWCcJ970U6rXpBPK4XGNKBFhhLa74TM/ysTFIrEXOJG1fUuXfcdWb0Ex0FAeTT
# r6gmmCqreJNejNHffG/VEeF7LNvUquYFRndiCUhgy624rW6ptcnQTiRfE0QL/gLF
# 41kA2vZMYzcc16EiYXQQBaF3XAtMduh1dpXqTPPQEO3Ms5/5B/KtjhSspMcPUvRv
# b35IWN+q+L+zEwiphmnCGFTuyOMqc5QE0ruGN3Mx0Vv6x/hcOmaXxrHQGpNKI5Pn
# 79Yk89AclqU2mXHz1ZHWp+KBc3D6VP7L32JlwxhJx3asa085xv0XPD58MRW1WaGv
# aQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNLHIIa4FAD494z35hvzCmm0415iMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBAYlhYoUQ+4aaQ54MFNfE6Ey8v4rWv+LtD
# RSjMM2X9g4uanA9cU7VitdpIPV/zE6v4AEhe/Vng2UAR5qj2SV3sz+fDqN6VLWUZ
# sKR0QR2JYXKnFPRVj16ezZyP7zd5H8IsvscEconeX+aRHF0xGGM4tDLrS84vj6Rm
# 0bgoWLXWnMTZ5kP4ownGmm0LsmInuu0GKrDZnkeTVmfk8gTTy8d1y3P2IYc2UI4i
# JYXCuSaKCuFeO0wqyscpvhGQSno1XAFK3oaybuD1mSoQxT9q77+LAGGQbiSoGlgT
# jQQayYsQaPcG1Q4QNwONGqkASCZTbzJlnmkHgkWlKSLTulOailWIY4hS1EZ+w+sX
# 0BJ9LcM142h51OlXLMoPLpzHAb6x22ipaAJ5Kf3uyFaOKWw4hnu0zWs+PKPd192n
# deK2ogWfaFdfnEvkWDDH2doL+ZA5QBd8Xngs/md3Brnll2BkZ/giZE/fKyolriR3
# aTAWCxFCXKIl/Clu2bbnj9qfVYLpAVQEcPaCfTAf7OZBlXmluETvq1Y/SNhxC6MJ
# 1QLCnkXSI//iXYpmRKT783QKRgmo/4ztj3uL9Z7xbbGxISg+P0HTRX15y4TReBbO
# 2RFNyCj88gOORk+swT1kaKXUfGB4zjg5XulxSby3uLNxQebE6TE3cAK0+fnY5UpH
# aEdlw4e7ijCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBS
# x23cMcNB1IQws/LYkRXa7I5JsKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6V0BnTAiGA8yMDI0MDEyNTE1NDk0
# OVoYDzIwMjQwMTI2MTU0OTQ5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpXQGd
# AgEAMAcCAQACAgKeMAcCAQACAhNxMAoCBQDpXlMdAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFz68b0Uj8O0i0uYCWkFWZOCVVV8yKCaqL/uu7FoiMQPWSjX
# 0zM/W2Sx5VCRzQL0MTMKxeTVr8ZgdCPmodIbCtkCSEqkYO5AF63Fje2ATScBbcxC
# fSAec2AEP3zFqbLjOdCcsD9cjfdeznraIOD3uQbUb1368Km74nA/Ea6acGu3htPR
# y6TQSqxsxkgK/A5O0Bhie7bTscblQN4mevrB+37hneHOfV4VkHaMvHVHWgX/oNOe
# ENXv0O1DWo3rpYWDWEwS3yx00M03oPH8wLihtkMK+AZacxuJrRZvCRS2y3WCJ4OR
# EbQMy+p/l0j0+v4xu1h8fZL8a3oHt+sASBNh9EYxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdMdMpoXO0AwcwABAAAB0zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCD2E1dH3st09B+m2XSjZBn5sYTC3NtbfLxUhiAKUN7/uTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJJm9OrE4O5PWA1KaFaztr9uP96r
# QgEn+tgGtY3xOqr1MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHTHTKaFztAMHMAAQAAAdMwIgQgHoHVtgLXGpT0pDHi9/tkXyKrhg9p
# fSV3zVejoEJyeecwDQYJKoZIhvcNAQELBQAEggIAgYXwE+Z1xmfTe0H9XDIHhVJD
# +C5v0bv3tEXv9VbJmMXMwPROCiGfdtSIjcq/qDflS1GHcGsrUYTWoHQzci3MLIgW
# ttXb0EAyS+BbJVqE6foNizAn0SsbFDocC+6SA4DNR0OV2ij7+WUyKKR2F/26sQCR
# +KCmj7iog+zg56RweNduC8H6xH9c+3k1gB2+vqaK0DY0wEzT4I5n4UH7VOnNXJ+7
# hbYniQ/FZs3hNlWeXAJS6r6KLuYThKX7cTak25J2bGj95cB0u2OSHZ6ROzQ5Sbbw
# 0jLfeI1EbFRj2ltz/PKciUsCjsp273L4wa8oNQiQ/UMcICEHbSAHSbRIc1GJu5km
# kGn9y5cAnOWCi2BKLcLMw3OE528U5e1Ad3MW48fH+caQ9fTsi3VNhqjFlcwViLgW
# gqZMyLJ4ME4e88JxiUOy4DvMzR0PmjBtAxDMqoKi3IuGT6VX3kFwqibqukYsp4Jj
# OC/gZyHjeX/rleUxfsmrt7NtlBVtfzuFJ73//TCpRlJM1cBKT+QaObcrxB1ktHta
# F/1RBkc3OEe10wTVP71tatbDY8pMyPmc7h8chAP3nF3w8GXgpMY1gtUefPibf/q/
# isC17mEPdnyRQUi9lRGk0xciqktDnAGVfQAt+B9fJChDt47NcAiB2Dr91FDRHL0r
# GYtn7+ARgWELjRTHDcQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/disable local users 2k08.ps1
|
disable local users 2k08.ps1
|
##################################################################################
#
# Script name: Set-LocalAccount.ps1
# Author: niklas.goude@zipper.se
# Homepage: www.powershell.nu
# http://www.powershell.nu/wp-content/uploads/2009/07/set-localaccount.ps1
# start script - .\\set-localaccount.ps1 -DS user.csv -Add
##################################################################################
#param([string]$DS, [switch]$Add, [switch]$Remove, [switch]$ResetPassword)
param([string]$DS, [string]$UserName, [string]$Password, [string]$fio, [switch]$Add, [switch]$Remove, [switch]$disable, [switch]$ResetPassword)
#param([string]$DS, [string]$dataSource,[string]$UserName, [string]$Password, [string]$fio, [switch]$Add, [switch]$Remove, [switch]$ResetPassword, [switch]$help)
function AddRemove-LocalAccount ([string]$DS, [switch]$Add, [switch]$Remove, [switch]$disable, [switch]$ResetPassword) {
#function AddRemove-LocalAccount ([string]$DS, [string]$dataSource, [string]$UserName, [string]$Password, [string]$fio, [switch]$Add, [switch]$Remove, [switch]$ResetPassword) {
[string]$ComputerName = "$Env:COMPUTERNAME"
if($Add) {
# new
$ADSI = [adsi]"WinNT://$Env:COMPUTERNAME"
$dataSource = Import-Csv $DS -Delimiter ";"
#$dataSource = Import-Csv user.csv -Delimiter ";"
foreach ($dataRecord in $dataSource) {
$UserName = $dataRecord.name
$Password = $dataRecord.password
$fio = $dataRecord.fio
$User = $ADSI.Create("user",$UserName)
$User.Put("Description", $Password)
$User.Put("FullName", $fio)
$User.SetPassword($Password)
$User.SetInfo()
}
}
if($Remove) {
$ADSI = [adsi]"WinNT://$Env:COMPUTERNAME"
#[string]$ConnectionString = "WinNT://$ComputerName"
$ADSI = [adsi]$ConnectionString
$ADSI.Delete("user",$UserName)
#$User.SetInfo()
}
if($disable) {
# Disable the account
[string]$ConnectionString = "WinNT://" + $ComputerName + "/" + $UserName + ",user"
$account=[ADSI]$ConnectionString
$account.psbase.invokeset("AccountDisabled", "True")
$account.setinfo()
}
if($ResetPassword) {
[string]$ConnectionString = "WinNT://" + $ComputerName + "/" + $UserName + ",user"
$Account = [adsi]$ConnectionString
$User.Put("Description", $Password)
$User.SetInfo()
$Account.psbase.invoke("SetPassword", $Password)
}
}
if($DS -AND !$ResetPassword) { AddRemove-LocalAccount -DS $DS -Add}
if($UserName -AND $Password -AND $ResetPassword) { AddRemove-LocalAccount -UserName $UserName -Password $Password -ResetPassword }
if($Username -AND $disable) {AddRemove-LocalAccount -UserName $UserName -disable }
if($UserName -AND $Remove) { AddRemove-LocalAccount -UserName $UserName -Remove }
|
combined_dataset/train/non-malicious/2052.ps1
|
2052.ps1
|
Describe "SxS Module Path Basic Tests" -tags "CI" {
BeforeAll {
if ($IsWindows)
{
$powershell = "$PSHOME\pwsh.exe"
$ProductName = "WindowsPowerShell"
if ($IsCoreCLR -and ($PSHOME -notlike "*Windows\System32\WindowsPowerShell\v1.0"))
{
$ProductName = "PowerShell"
}
$expectedUserPath = Join-Path -Path $HOME -ChildPath "Documents\$ProductName\Modules"
$expectedSharedPath = Join-Path -Path $env:ProgramFiles -ChildPath "$ProductName\Modules"
}
else
{
$powershell = "$PSHOME/pwsh"
$expectedUserPath = [System.Management.Automation.Platform]::SelectProductNameForDirectory("USER_MODULES")
$expectedSharedPath = [System.Management.Automation.Platform]::SelectProductNameForDirectory("SHARED_MODULES")
}
$expectedSystemPath = Join-Path -Path $PSHOME -ChildPath 'Modules'
$skipNoPwsh = -not (Test-Path $powershell)
if ($IsWindows)
{
$expectedWindowsPowerShellPSHomePath = Join-Path $env:windir "System32" "WindowsPowerShell" "v1.0" "Modules"
}
$fakePSHome = Join-Path -Path $TestDrive -ChildPath 'FakePSHome'
$fakePSHomeModuleDir = Join-Path -Path $fakePSHome -ChildPath 'Modules'
$fakePowerShell = Join-Path -Path $fakePSHome -ChildPath (Split-Path -Path $powershell -Leaf)
$fakePSDepsFile = Join-Path -Path $fakePSHome -ChildPath "pwsh.deps.json"
New-Item -Path $fakePSHome -ItemType Directory > $null
New-Item -Path $fakePSHomeModuleDir -ItemType Directory > $null
}
BeforeEach {
$originalModulePath = $env:PSModulePath
}
AfterEach {
$env:PSModulePath = $originalModulePath
}
It "validate sxs module path" -Skip:$skipNoPwsh {
$env:PSModulePath = ""
$defaultModulePath = & $powershell -nopro -c '$env:PSModulePath'
$paths = $defaultModulePath -split [System.IO.Path]::PathSeparator
if ($IsWindows)
{
$paths.Count | Should -Be 4
}
else
{
$paths.Count | Should -Be 3
}
$paths[0].TrimEnd([System.IO.Path]::DirectorySeparatorChar) | Should -Be $expectedUserPath
$paths[1].TrimEnd([System.IO.Path]::DirectorySeparatorChar) | Should -Be $expectedSharedPath
$paths[2].TrimEnd([System.IO.Path]::DirectorySeparatorChar) | Should -Be $expectedSystemPath
if ($IsWindows)
{
$paths[3].TrimEnd([System.IO.Path]::DirectorySeparatorChar) | Should -Be $expectedWindowsPowerShellPSHomePath
}
}
It "ignore pshome module path derived from a different PowerShell instance" -Skip:(!$IsCoreCLR -or $skipNoPwsh) {
New-Item -Path $fakePowerShell -ItemType File -Force > $null
New-Item -Path $fakePSDepsFile -ItemType File -Force > $null
try {
$env:PSModulePath = $fakePSHomeModuleDir
$newModulePath = & $powershell -nopro -c '$env:PSModulePath'
$paths = $newModulePath -split [System.IO.Path]::PathSeparator
if ($IsWindows)
{
$paths.Count | Should -Be 4
}
else
{
$paths.Count | Should -Be 3
}
$paths[0] | Should -Be $expectedUserPath
$paths[1] | Should -Be $expectedSharedPath
$paths[2] | Should -Be $expectedSystemPath
if ($IsWindows)
{
$paths[3].TrimEnd([System.IO.Path]::DirectorySeparatorChar) | Should -Be $expectedWindowsPowerShellPSHomePath
}
} finally {
Remove-Item -Path $fakePowerShell -Force -ErrorAction SilentlyContinue
Remove-Item -Path $fakePSDepsFile -Force -ErrorAction SilentlyContinue
}
}
It "keep non-pshome module path derived from PowerShell instance parent" -Skip:(!$IsCoreCLR -or $skipNoPwsh) {
$customeModules = Join-Path -Path $TestDrive -ChildPath 'CustomModules'
$env:PSModulePath = $fakePSHomeModuleDir, $customeModules -join ([System.IO.Path]::PathSeparator)
$newModulePath = & $powershell -nopro -c '$env:PSModulePath'
$paths = $newModulePath -split [System.IO.Path]::PathSeparator
if ($IsWindows)
{
$paths.Count | Should -Be 6
}
else
{
$paths.Count | Should -Be 5
}
$paths -contains $fakePSHomeModuleDir | Should -BeTrue
$paths -contains $customeModules | Should -BeTrue
}
It 'Ensures $PSHOME\Modules is inserted correctly when launched from a different version of PowerShell' -Skip:(!($IsCoreCLR -and $IsWindows) -or $skipNoPwsh) {
$winpwshModulePath = [System.IO.Path]::Combine([System.Environment]::SystemDirectory, "WindowsPowerShell", "v1.0", "Modules");
$pwshModulePath = Join-Path -Path $PSHOME -ChildPath 'Modules'
$fakeHome = Join-Path -Path $TestDrive -ChildPath 'fakepwsh'
$fakeModulePath = Join-Path -Path $fakeHome -ChildPath 'Modules'
$null = New-Item -Path $fakeHome -ItemType Directory
$null = New-Item -Path $fakeModulePath -ItemType Directory
Set-Content -Path "$fakeHome\pwsh.exe" -Value "fake pwsh.exe"
Set-Content -Path "$fakeHome\pwsh.deps.json" -Value 'fake pwsh.deps.json'
$fakeModulePath = $env:PSModulePath.Replace($pwshModulePath, $fakeModulePath, [StringComparison]::OrdinalIgnoreCase)
$newModulePath = & $powershell -nopro -c '$env:PSModulePath'
$pwshIndex = $newModulePath.IndexOf($pwshModulePath, [StringComparison]::OrdinalIgnoreCase)
$wpshIndex = $newModulePath.IndexOf($winpwshModulePath, [StringComparison]::OrdinalIgnoreCase)
$pwshIndex | Should -Not -Be -1
$wpshIndex | Should -Not -Be -1
$pwshIndex | Should -BeLessThan $wpshIndex
}
}
|
combined_dataset/train/non-malicious/Roll-Dice.ps1
|
Roll-Dice.ps1
|
# Roll-Dice.ps1
# Cody Bunch
# ProfessionalVMware.com
Begin {
$rand = New-Object System.Random
$dice = $rand.next(1,3)
}
Process {
if ( $_ -isnot [VMware.VimAutomation.Client20.ManagedObjectBaseImpl.SnapshotImpl] ) { continue }
if ($dice > 1) {
$_ | Remove-Snapshot -Confirm:$false
Write-Host "$_.Name OH NOES! Has been deleted!`n"
} else {
Write-Host "$_.Name lives to fight again!`n"
}
}
|
combined_dataset/train/non-malicious/2685.ps1
|
2685.ps1
|
Connect-PnPOnline -Url https://yourtenant.sharepoint.com
$creds = Get-Credential
Connect-PnPOnline -Url https://yourtenant.sharepoint.com -Credentials $creds
Connect-PnPOnline -Url https://yourtenant.sharepoint.com -Credentials "LABEL"
Connect-PnPOnline -Url https://yourtenant.sharepoint.com -AppId e8a9a0ef-86a9-4871-ba5f-dbacbcd57e4c -AppSecret abmQDEw/x/PHX6stdhbJgDEF3pSZkN64sS63XDViBm60=
Connect-PnPOnline -Url https://yourtenant.sharepoint.com -AppId e8a9a0ef-86a9-4871-ba5f-dbacbcd57e4c -AppSecret abmQDEw/x/PHX6stdhbJgDEF3pSZkN64sS63XDViBm60= -Realm 939013d2-9450-4a4e-a63a-3f364233c6cd
|
combined_dataset/train/non-malicious/1372.ps1
|
1372.ps1
|
function Get-CIisAppPool
{
[CmdletBinding()]
[OutputType([Microsoft.Web.Administration.ApplicationPool])]
param(
[string]
$Name
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$mgr = New-Object Microsoft.Web.Administration.ServerManager
$mgr.ApplicationPools |
Where-Object {
if( -not $PSBoundParameters.ContainsKey('Name') )
{
return $true
}
return $_.Name -eq $Name
} |
Add-IisServerManagerMember -ServerManager $mgr -PassThru
}
|
combined_dataset/train/non-malicious/4211.ps1
|
4211.ps1
|
$psloadedrunas = $null
function Invoke-Runas {
param (
[Parameter(Mandatory = $True)]
[string]$User,
[Parameter(Mandatory = $True)]
[string]$Password,
[Parameter(Mandatory = $False)]
[string]$Domain=".",
[Parameter(Mandatory = $True)]
[string]$Command,
[Parameter(Mandatory = $False)]
[string]$Args,
[Parameter(Mandatory=$False)]
[switch]$AddType
)
if ($AddType.IsPresent) {
echo "[+] Loading Assembly using AddType"
echo ""
Add-Type -TypeDefinition @"
using System;
using System.Diagnostics;
using System.Runtime.InteropServices;
using System.Security.Principal;
[StructLayout(LayoutKind.Sequential)]
public struct SECURITY_ATTRIBUTES
{
public Int32 Length;
public IntPtr lpSecurityDescriptor;
public bool bInheritHandle;
}
public enum SECURITY_IMPERSONATION_LEVEL
{
SecurityAnonymous,
SecurityIdentification,
SecurityImpersonation,
SecurityDelegation
}
[StructLayout(LayoutKind.Sequential)]
public struct PROCESS_INFORMATION
{
public IntPtr hProcess;
public IntPtr hThread;
public uint dwProcessId;
public uint dwThreadId;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct STARTUPINFO
{
public uint cb;
public string lpReserved;
public string lpDesktop;
public string lpTitle;
public uint dwX;
public uint dwY;
public uint dwXSize;
public uint dwYSize;
public uint dwXCountChars;
public uint dwYCountChars;
public uint dwFillAttribute;
public uint dwFlags;
public short wShowWindow;
public short cbReserved2;
public IntPtr lpReserved2;
public IntPtr hStdInput;
public IntPtr hStdOutput;
public IntPtr hStdError;
}
public class AdjPriv
{
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall, ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)]
internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok);
[DllImport("advapi32.dll", SetLastError = true)]
internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);
[StructLayout(LayoutKind.Sequential, Pack = 1)]
internal struct TokPriv1Luid
{
public int Count;
public long Luid;
public int Attr;
}
internal const int SE_PRIVILEGE_ENABLED = 0x00000002;
internal const int SE_PRIVILEGE_DISABLED = 0x00000000;
internal const int TOKEN_QUERY = 0x00000008;
internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;
public static bool EnablePrivilege(long processHandle, string privilege, bool disable)
{
bool retVal;
TokPriv1Luid tp;
IntPtr hproc = new IntPtr(processHandle);
IntPtr htok = IntPtr.Zero;
retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);
tp.Count = 1;
tp.Luid = 0;
if(disable)
{
tp.Attr = SE_PRIVILEGE_DISABLED;
}
else
{
tp.Attr = SE_PRIVILEGE_ENABLED;
}
retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);
retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);
return retVal;
}
}
public static class Advapi32
{
[DllImport("advapi32.dll", CharSet=CharSet.Auto)]
public extern static bool DuplicateTokenEx(
IntPtr hExistingToken,
uint dwDesiredAccess,
ref SECURITY_ATTRIBUTES lpTokenAttributes,
int ImpersonationLevel,
int TokenType,
ref IntPtr phNewToken);
[DllImport("advapi32.dll", SetLastError = true)]
public static extern bool LogonUser(
string pszUsername,
string pszDomain,
string pszPassword,
int dwLogonType,
int dwLogonProvider,
ref IntPtr phToken);
[DllImport("advapi32.dll", SetLastError = true, CharSet = CharSet.Ansi, CallingConvention = CallingConvention.StdCall)]
public static extern bool CreateProcessAsUser(
IntPtr hToken,
string lpApplicationName,
string lpCommandLine,
ref SECURITY_ATTRIBUTES lpProcessAttributes,
ref SECURITY_ATTRIBUTES lpThreadAttributes,
bool bInheritHandle,
Int32 dwCreationFlags,
IntPtr lpEnvrionment,
string lpCurrentDirectory,
ref STARTUPINFO lpStartupInfo,
ref PROCESS_INFORMATION lpProcessInformation);
[DllImport("advapi32.dll", SetLastError=true, CharSet=CharSet.Unicode)]
public static extern bool CreateProcessWithLogonW(
String userName,
String domain,
String password,
int logonFlags,
String applicationName,
String commandLine,
int creationFlags,
int environment,
String currentDirectory,
ref STARTUPINFO startupInfo,
out PROCESS_INFORMATION processInformation);
}
public static class Kernel32
{
[DllImport("kernel32.dll")]
public static extern uint GetLastError();
}
"@
} else {
if ($psloadedrunas -ne "TRUE") {
$script:psloadedrunas = "TRUE"
echo "[+] Loading Assembly using System.Reflection"
echo ""
$ps = "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"
$dllbytes = [System.Convert]::FromBase64String($ps)
$assembly = [System.Reflection.Assembly]::Load($dllbytes)
}
}
if (($env:username -eq "$($env:computername)$")) {
echo "`n[>] User is `"NT Authority\SYSTEM`" so running LogonUser -> DuplicateTokenEx -> CreateProcessAsUser"
$processHandle = (Get-Process -id $pid).Handle
[AdjPriv]::EnablePrivilege($processHandle, "SeAssignPrimaryTokenPrivilege", $Disable)
$LogonTokenHandle = [IntPtr]::Zero
echo "`n[>] Calling Advapi32::LogonUser"
$CallResult1 = [Advapi32]::LogonUser($User, $Domain, $Password, 2, 0, [ref] $LogonTokenHandle)
if (!$CallResult1) {
echo "`n[!] Mmm, something went wrong! GetLastError returned:"
echo "==> $((New-Object System.ComponentModel.Win32Exception([int][Kernel32]::GetLastError())).Message)`n"
} else {
echo "`n[+] Success, LogonTokenHandle: "
echo $LogonTokenHandle
}
$SecImpersonation = New-Object SECURITY_IMPERSONATION_LEVEL
$SECURITY_ATTRIBUTES = New-Object SECURITY_ATTRIBUTES
$PrivLogonTokenHandle = [IntPtr]::Zero
echo "`n[>] Calling Advapi32::DuplicateTokenEx"
$CallResult2 = [Advapi32]::DuplicateTokenEx($LogonTokenHandle, 0x2000000, [ref] $SECURITY_ATTRIBUTES, 2, 1, [ref] $PrivLogonTokenHandle)
if (!$CallResult2) {
echo "`n[!] Mmm, something went wrong! GetLastError returned:"
echo "==> $((New-Object System.ComponentModel.Win32Exception([int][Kernel32]::GetLastError())).Message)`n"
} else {
echo "`n[+] Success, PrivLogonTokenHandle:"
echo $PrivLogonTokenHandle
}
$StartupInfo = New-Object STARTUPINFO
$StartupInfo.cb = [System.Runtime.InteropServices.Marshal]::SizeOf($StartupInfo)
$StartupInfo.dwFlags = 0x00000001
$StartupInfo.wShowWindow = 0x0001
$ProcessInfo = New-Object PROCESS_INFORMATION
$SecAttributes1 = New-Object SECURITY_ATTRIBUTES
$SecAttributes2 = New-Object SECURITY_ATTRIBUTES
$lpEnvrionment = [IntPtr]::Zero
$CurrentDirectory = $Env:SystemRoot
echo "`n[>] Calling Advapi32::CreateProcessAsUser"
$CallResult3 = [Advapi32]::CreateProcessAsUser($PrivLogonTokenHandle, $command, $args,
[ref] $SecAttributes1, [ref] $SecAttributes2, $false, 0, $lpEnvrionment, $CurrentDirectory, [ref]$StartupInfo, [ref]$ProcessInfo)
if (!$CallResult3) {
echo "`n[!] Mmm, something went wrong! GetLastError returned:"
echo "==> $((New-Object System.ComponentModel.Win32Exception([int][Kernel32]::GetLastError())).Message)`n"
} else {
echo "`n[+] Success, process details:"
Get-Process -Id $ProcessInfo.dwProcessId
echo "`n[+] Please note, this process will have a primary token assigned but the user displayed will be SYSTEM"
echo "`n[+] Run Invoke-TokenManipulation to see the Token loaded"
}
} else {
cd $Env:SystemRoot
echo "`n[>] User is `"$env:username`" so running CreateProcessWithLogonW"
$StartupInfo = New-Object STARTUPINFO
$StartupInfo.dwFlags = 0x00000001
$StartupInfo.wShowWindow = 0x0001
$StartupInfo.cb = [System.Runtime.InteropServices.Marshal]::SizeOf($StartupInfo)
$ProcessInfo = New-Object PROCESS_INFORMATION
$GetCurrentPath = (Get-Item -Path ".\" -Verbose).FullName
echo "`n[>] Calling Advapi32::CreateProcessWithLogonW"
$CallResult = [Advapi32]::CreateProcessWithLogonW(
$User, $Domain, $Password, 0x1, $Command,
$Args, 0x04000000, $null, $GetCurrentPath,
[ref]$StartupInfo, [ref]$ProcessInfo)
if (!$CallResult) {
echo "`n[!] Mmm, something went wrong! GetLastError returned:"
echo "==> $((New-Object System.ComponentModel.Win32Exception([int][Kernel32]::GetLastError())).Message)`n"
} else {
echo "`n[+] Success, process details:"
Get-Process -Id $ProcessInfo.dwProcessId
}
}
}
|
combined_dataset/train/non-malicious/sample_47_6.ps1
|
sample_47_6.ps1
|
#
# Module manifest for module 'Az.ElasticSan'
#
# Generated by: Microsoft Corporation
#
# Generated on: 23/04/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.ElasticSan.psm1'
# Version number of this module.
ModuleVersion = '1.0.2'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = 'ed90c36c-f150-4ad2-96ae-57e0ebb0a376'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell: ElasticSan cmdlets'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'ElasticSan.Autorest/bin/Az.ElasticSan.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'ElasticSan.Autorest\Az.ElasticSan.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('ElasticSan.Autorest/Az.ElasticSan.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Add-AzElasticSanVolumeGroupNetworkRule', 'Get-AzElasticSan',
'Get-AzElasticSanSkuList', 'Get-AzElasticSanVolume',
'Get-AzElasticSanVolumeGroup', 'Get-AzElasticSanVolumeSnapshot',
'New-AzElasticSan', 'New-AzElasticSanVirtualNetworkRuleObject',
'New-AzElasticSanVolume', 'New-AzElasticSanVolumeGroup',
'New-AzElasticSanVolumeSnapshot', 'Remove-AzElasticSan',
'Remove-AzElasticSanVolume', 'Remove-AzElasticSanVolumeGroup',
'Remove-AzElasticSanVolumeGroupNetworkRule',
'Remove-AzElasticSanVolumeSnapshot', 'Update-AzElasticSan',
'Update-AzElasticSanVolume', 'Update-AzElasticSanVolumeGroup'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','PSModule','ElasticSan'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvfwvB2+MAc2Lz
# K/yMUHvsQry5zS1rB+yn6f6yD0Rfw6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAk3s9og9n1ekChIeRoHSOGO
# 9G06nCbytP8Pyg61B+4dMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAjuMVR3GbpEBXqq6+af7LD8Eq5AXMMYbVwtJkKPWmyWD7V43p2Op15prq
# nY4dlCXKe9ccAXnW6ZNMpyN8/1JPKgy9KWT0XAvsFEgCmIJrJvLzQ8mGLXUAi07p
# i9QFbtGJztAahsVdGQ2KzqJnNtFYyjPYq7xM5XTw8RHy8/II/tknEJDrJMv5F1PL
# jh00pLObvmxi18+Kf+rKrBdlhcp9YZPpuJcF4vOqgh+AAYdzCKZw3faP7qi9Q8Ub
# Lm36q4RLoJG4XvJZxXcNYCMwQRLrOVOngi82BZu6wLrAWQNmA6AQUPi0AQhDGz7z
# CO/Osto9uvHmkBZB01pve/lY2dFIR6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCBZ4jsyjh9gFZbmG+mY4LcLwCcm3ObLMT16tKKaoWf8QIGZh/eWdWj
# GBMyMDI0MDQyMzE0MTExNy40NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRnJUwIhgPMjAyNDA0MjMxMDMzNTdaGA8yMDI0MDQyNDEwMzM1N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dGclQIBADAHAgEAAgIXWjAHAgEAAgISjTAKAgUA
# 6dLuFQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPeMyGf3Ydy+jqQvs63
# XCZaWY7a56BswHctd6Tk8AklWwZQVK9M+hXCpDyBP05hd5gdWVf56HOP8SwAs89F
# 83kET0f+Ametk+Om8umz2PI4okluGuXg7eRsJ0iiNMPg7WgQ8Qi7VMXppToEvdFw
# yYwBmtcBpN/Gkc78aAYomHiTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg3Oh3UCipguqhQICPYIvLAe9qGG7SIBLSAfT/BO2lRjwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEII54AP2h7Vh7o+D/3jGv808eKZ8LrGHgQ+q5KtqbazFB
# MA0GCSqGSIb3DQEBCwUABIICAIuvS1PTgVO+kjRJloWXTMlOB0urPFs6GlOz1rGe
# 8FXyA3v9GrB4DcebxhbIPf3te+yEJlsF+PI81F8g27jukiXkNBSSAIPXWQZs3gNq
# E3C9IaOhcreTSE9QVjr85oDEJkBtbzHWpNrwrzb+in8i+8t5SWA5B6cr4VvR5J+B
# EIkWBQaj+woqPw7tK/LJZ4ETEdnzFiCJGxPDRVZmQF+4EBkzapbAhWQ4mcwMHQMu
# I/37WU9h1qDJLkkq2eEFSS4T3095IuQNP2cZyZBdkhixsbUp8ISBrVhYiwRXJP2P
# fD2bBHoX9WbdRxZtBobqxygJ9Us+djTUBDPxebivubY13S3Z84U5MMGew/X+C+1U
# WCJwL/oVUSojH7jR1areAAD8t1A4oJthsoXTE3vr1mupQeudwCACMXSGNPP6sXWY
# lOraQf47nF4nvwTcQ4P9dh7GxzDfnojo4WsNyuB9Xjid6wGLnVyuSmiclum3JORI
# 3Ay5IQQNcJnN3wbBwvwGLqTtL0QQy7B7vKQfebyeayZEj7roCZU6t51xgYwGtW7b
# 9BTK+4lBGIO07uWaTz16yxA/DwhCJ++oHyhsSfD8Z+EF2ljlbWPQVZe12QhNBegM
# iWjaaARJX/bTPasdMfZlQ+E1NWqLu0nBWMChErQF3yASb3oxs61EHx8QVbLVtZsA
# Ht67
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_59_44.ps1
|
sample_59_44.ps1
|
window['excelUiSlice20Sprite'] = {"icons":[{"type":"svg","id":"TrashCan_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 768 1664 h -128 v -1152 h 128 m 256 1152 h -128 v -1152 h 128 m 256 1152 h -128 v -1152 h 128 m 512 -256 h -128 v 1604 q 0 39 -15 73 q -15 35 -40 60 q -26 26 -60 40 q -34 15 -73 15 h -1032 q -39 0 -73 -15 q -35 -14 -60 -40 q -26 -25 -40 -60 q -15 -34 -15 -73 v -1604 h -128 v -128 h 512 q 0 -27 10 -50 q 10 -23 28 -41 q 17 -17 40 -27 q 23 -10 50 -10 h 384 q 27 0 50 10 q 23 10 41 27 q 17 18 27 41 q 10 23 10 50 h 512 m -256 128 h -1152 v 1604 q 0 25 18 42 q 17 18 42 18 h 1032 q 25 0 43 -18 q 17 -17 17 -42 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 444 1984 q -26 0 -48 -10 q -23 -10 -40 -27 q -17 -16 -26 -39 q -10 -22 -10 -48 v -1668 h 1280 v 1668 q 0 26 -9 48 q -10 23 -27 39 q -17 17 -39 27 q -23 10 -49 10 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 768 1664 h -128 v -1152 h 128 m 256 1152 h -128 v -1152 h 128 m 256 1152 h -128 v -1152 h 128 m 512 -256 h -128 v 1604 q 0 39 -15 73 q -15 35 -40 60 q -26 26 -60 40 q -34 15 -73 15 h -1032 q -39 0 -73 -15 q -35 -14 -60 -40 q -26 -25 -40 -60 q -15 -34 -15 -73 v -1604 h -128 v -128 h 512 q 0 -27 10 -50 q 10 -23 28 -41 q 17 -17 40 -27 q 23 -10 50 -10 h 384 q 27 0 50 10 q 23 10 41 27 q 17 18 27 41 q 10 23 10 50 h 512 m -256 128 h -1152 v 1604 q 0 25 18 42 q 17 18 42 18 h 1032 q 25 0 43 -18 q 17 -17 17 -42 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"CommonControlChevronDown_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 960 1562 l -877 -877 l 90 -90 l 787 787 l 787 -787 l 90 90 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 960 1562 l -877 -877 l 90 -90 l 787 787 l 787 -787 l 90 90 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Info_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1024 102 q 127 0 245 33 q 118 33 221 93 q 102 60 186 144 q 84 84 144 186 q 60 103 93 221 q 33 118 33 245 q 0 127 -33 245 q -33 118 -93 220 q -60 103 -144 187 q -84 84 -186 144 q -103 60 -221 93 q -118 33 -245 33 q -127 0 -245 -33 q -118 -33 -220 -93 q -103 -60 -187 -144 q -84 -84 -144 -187 q -60 -102 -93 -220 q -33 -118 -33 -245 q 0 -127 33 -245 q 33 -118 93 -221 q 60 -102 144 -186 q 84 -84 187 -144 q 102 -60 220 -93 q 118 -33 245 -33 m 0 1741 q 113 0 218 -30 q 104 -29 195 -82 q 91 -53 166 -128 q 75 -75 128 -166 q 53 -91 83 -196 q 29 -104 29 -217 q 0 -113 -29 -218 q -30 -104 -83 -195 q -53 -91 -128 -166 q -75 -75 -166 -128 q -91 -53 -195 -83 q -105 -29 -218 -29 q -113 0 -217 29 q -105 30 -196 83 q -91 53 -166 128 q -75 75 -128 166 q -53 91 -82 195 q -30 105 -30 218 q 0 113 30 217 q 29 105 82 196 q 53 91 128 166 q 75 75 166 128 q 91 53 196 82 q 104 30 217 30 m 102 -307 h -204 v -717 h 204 m 0 -102 h -204 v -205 h 204 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1024 1891 q -120 0 -230 -31 q -111 -31 -207 -88 q -97 -56 -176 -135 q -79 -79 -135 -176 q -57 -96 -88 -207 q -31 -110 -31 -230 q 0 -119 31 -230 q 31 -111 88 -208 q 56 -96 135 -175 q 79 -79 176 -136 q 96 -56 207 -87 q 110 -31 230 -31 q 119 0 230 31 q 111 31 208 87 q 96 57 175 136 q 79 79 136 175 q 56 97 87 208 q 31 111 31 230 q 0 120 -31 230 q -31 111 -87 207 q -57 97 -136 176 q -79 79 -175 135 q -97 57 -208 88 q -111 31 -230 31 z"},{"type":"path","className":"OfficeIconColors_m24","d":"M 1024 102 q 127 0 245 33 q 118 33 221 93 q 102 60 186 144 q 84 84 144 186 q 60 103 93 221 q 33 118 33 245 q 0 127 -33 245 q -33 118 -93 220 q -60 103 -144 187 q -84 84 -186 144 q -103 60 -221 93 q -118 33 -245 33 q -127 0 -245 -33 q -118 -33 -220 -93 q -103 -60 -187 -144 q -84 -84 -144 -187 q -60 -102 -93 -220 q -33 -118 -33 -245 q 0 -127 33 -245 q 33 -118 93 -221 q 60 -102 144 -186 q 84 -84 187 -144 q 102 -60 220 -93 q 118 -33 245 -33 m 0 1741 q 113 0 218 -30 q 104 -29 195 -82 q 91 -53 166 -128 q 75 -75 128 -166 q 53 -91 83 -196 q 29 -104 29 -217 q 0 -113 -29 -218 q -30 -104 -83 -195 q -53 -91 -128 -166 q -75 -75 -166 -128 q -91 -53 -195 -83 q -105 -29 -218 -29 q -113 0 -217 29 q -105 30 -196 83 q -91 53 -166 128 q -75 75 -128 166 q -53 91 -82 195 q -30 105 -30 218 q 0 113 30 217 q 29 105 82 196 q 53 91 128 166 q 75 75 166 128 q 91 53 196 82 q 104 30 217 30 m 102 -307 h -204 v -717 h 204 m 0 -102 h -204 v -205 h 204 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"AlertWarning_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 265 1843 h 1512 l -785 -1515 m 954 1618 h -1844 l 887 -1847 m -80 1437 v -717 h 128 v 717 m 0 102 v 103 h -128 v -103 z"},{"type":"path","className":"OfficeIconColors_m212","d":"M 1875 1894 h -1708 l 822 -1711 z"},{"type":"path","className":"OfficeIconColors_m211","d":"M 265 1843 h 1512 l -785 -1515 m 954 1618 h -1844 l 887 -1847 z"},{"type":"path","className":"OfficeIconColors_m2173","d":"M 909 1536 v -717 h 128 v 717 m 0 102 v 103 h -128 v -103 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"DeleteHyperlink_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1602 1536 l 446 446 l -66 66 l -446 -446 l -446 446 l -66 -66 l 446 -446 l -446 -446 l 66 -66 l 446 446 l 446 -446 l 66 66 m -236 -113 q -16 -35 -41 -64 q -26 -29 -59 -50 q -34 -21 -74 -33 q -40 -11 -83 -11 h -121 v -102 h 121 q 54 0 104 13 q 50 13 93 37 q 43 24 79 57 q 35 33 61 73 m -784 537 q -81 0 -152 -28 q -71 -28 -124 -77 q -54 -49 -84 -115 q -31 -65 -31 -139 q 0 -74 31 -139 q 30 -65 84 -114 q 53 -49 124 -77 q 71 -28 152 -28 h 18 v 102 h -18 q -58 0 -109 20 q -51 20 -89 55 q -38 35 -60 81 q -22 47 -22 100 q 0 45 16 85 q 16 41 45 73 q 28 33 67 56 q 39 24 84 34 l 111 111 m -937 -666 q 0 53 22 99 q 22 47 60 82 q 38 35 89 55 q 50 20 108 20 h 121 v 102 h -121 q -81 0 -152 -28 q -71 -28 -124 -77 q -53 -48 -84 -114 q -31 -65 -31 -139 q 0 -74 31 -140 q 31 -65 84 -114 q 53 -48 124 -76 q 71 -28 152 -28 h 447 q 81 0 152 28 q 71 28 125 76 q 53 49 84 114 q 30 66 30 140 q 0 58 -19 110 q -19 52 -54 97 l -78 -78 q 18 -29 29 -62 q 11 -32 11 -67 q 0 -53 -22 -100 q -22 -46 -60 -81 q -38 -35 -89 -55 q -51 -20 -109 -20 h -447 q -58 0 -108 20 q -51 20 -89 55 q -38 35 -60 81 q -22 47 -22 100 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1812 977 q -16 -35 -41 -64 q -26 -29 -59 -50 q -34 -21 -74 -33 q -40 -11 -83 -11 h -121 v -102 h 121 q 54 0 104 13 q 50 13 93 37 q 43 24 79 57 q 35 33 61 73 m -784 537 q -81 0 -152 -28 q -71 -28 -124 -77 q -54 -49 -84 -115 q -31 -65 -31 -139 q 0 -74 31 -139 q 30 -65 84 -114 q 53 -49 124 -77 q 71 -28 152 -28 h 18 v 102 h -18 q -58 0 -109 20 q -51 20 -89 55 q -38 35 -60 81 q -22 47 -22 100 q 0 45 16 85 q 16 41 45 73 q 28 33 67 56 q 39 24 84 34 l 111 111 m -937 -666 q 0 53 22 99 q 22 47 60 82 q 38 35 89 55 q 50 20 108 20 h 121 v 102 h -121 q -81 0 -152 -28 q -71 -28 -124 -77 q -53 -48 -84 -114 q -31 -65 -31 -139 q 0 -74 31 -140 q 31 -65 84 -114 q 53 -48 124 -76 q 71 -28 152 -28 h 447 q 81 0 152 28 q 71 28 125 76 q 53 49 84 114 q 30 66 30 140 q 0 58 -19 110 q -19 52 -54 97 l -78 -78 q 18 -29 29 -62 q 11 -32 11 -67 q 0 -53 -22 -100 q -22 -46 -60 -81 q -38 -35 -89 -55 q -51 -20 -109 -20 h -447 q -58 0 -108 20 q -51 20 -89 55 q -38 35 -60 81 q -22 47 -22 100 z"},{"type":"path","className":"OfficeIconColors_m213","d":"M 1602 1536 l 446 446 l -66 66 l -446 -446 l -446 446 l -66 -66 l 446 -446 l -446 -446 l 66 -66 l 446 446 l 446 -446 l 66 66 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Gear_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1946 853 v 342 l -282 41 q -23 69 -54 129 q -31 61 -78 114 l 109 273 l -295 170 l -181 -230 q -35 7 -69 11 q -35 4 -72 4 q -36 0 -71 -4 q -35 -4 -69 -11 l -181 230 l -294 -170 l 111 -273 q -47 -53 -80 -114 q -33 -60 -56 -129 l -282 -41 v -342 l 282 -41 q 23 -69 54 -130 q 31 -60 78 -113 l -109 -272 l 295 -171 l 181 230 q 35 -7 70 -11 q 35 -4 71 -4 q 36 0 71 4 q 35 4 70 11 l 181 -230 l 293 170 l -112 273 q 48 53 81 113 q 33 61 56 130 m 179 130 l -256 -38 l -20 -60 q -21 -63 -49 -114 q -29 -50 -67 -93 l -43 -48 l 102 -249 l -139 -81 l -165 210 l -62 -13 q -60 -12 -120 -12 q -60 0 -120 12 l -62 13 l -165 -210 l -142 82 l 100 249 l -43 47 q -36 39 -62 90 q -26 51 -49 117 l -20 60 l -256 38 v 164 l 256 38 l 20 60 q 40 122 116 207 l 42 48 l -101 249 l 140 81 l 164 -210 l 63 13 q 60 12 119 12 q 60 0 120 -12 l 62 -13 l 165 210 l 142 -82 l -100 -249 l 43 -47 q 35 -38 62 -89 q 26 -51 49 -118 l 20 -60 l 256 -38 m -819 -389 q 64 0 120 24 q 56 24 98 65 q 41 42 65 98 q 24 56 24 120 q 0 64 -24 120 q -24 56 -65 97 q -42 42 -98 66 q -56 24 -120 24 q -64 0 -120 -24 q -56 -24 -97 -66 q -42 -41 -66 -97 q -24 -56 -24 -120 q 0 -64 24 -120 q 24 -56 66 -98 q 41 -41 97 -65 q 56 -24 120 -24 m 0 512 q 42 0 80 -16 q 37 -16 65 -44 q 28 -28 44 -66 q 16 -37 16 -79 q 0 -42 -16 -80 q -16 -37 -44 -65 q -28 -28 -65 -44 q -38 -16 -80 -16 q -42 0 -79 16 q -38 16 -66 44 q -28 28 -44 65 q -16 38 -16 80 q 0 42 16 79 q 16 38 44 66 q 28 28 66 44 q 37 16 79 16 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1664 1236 q -23 69 -54 129 q -31 61 -78 114 l 109 273 l -295 170 l -181 -230 q -35 7 -69 11 q -35 4 -72 4 q -36 0 -71 -4 q -35 -4 -69 -11 l -181 230 l -294 -170 l 111 -273 q -47 -53 -80 -114 q -33 -60 -56 -129 l -282 -41 v -342 l 282 -41 q 23 -69 54 -130 q 31 -60 78 -113 l -109 -272 l 295 -171 l 181 230 q 35 -7 70 -11 q 34 -4 71 -4 q 36 0 71 4 q 35 4 69 11 l 180 -230 l 295 170 l -112 273 q 48 53 81 113 q 33 61 56 130 l 282 41 v 342 m -666 -171 q 0 -53 -20 -100 q -20 -46 -55 -81 q -35 -35 -81 -55 q -47 -20 -100 -20 q -53 0 -99 20 q -47 20 -82 55 q -35 35 -55 81 q -20 47 -20 100 q 0 53 20 99 q 20 47 55 82 q 35 35 82 55 q 46 20 99 20 q 53 0 100 -20 q 46 -20 81 -55 q 35 -35 55 -82 q 20 -46 20 -99 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1946 853 v 342 l -282 41 q -23 69 -54 129 q -31 61 -78 114 l 109 273 l -295 170 l -181 -230 q -35 7 -69 11 q -35 4 -72 4 q -36 0 -71 -4 q -35 -4 -69 -11 l -181 230 l -294 -170 l 111 -273 q -47 -53 -80 -114 q -33 -60 -56 -129 l -282 -41 v -342 l 282 -41 q 23 -69 54 -130 q 31 -60 78 -113 l -109 -272 l 295 -171 l 181 230 q 35 -7 70 -11 q 35 -4 71 -4 q 36 0 71 4 q 35 4 70 11 l 181 -230 l 293 170 l -112 273 q 48 53 81 113 q 33 61 56 130 m 179 130 l -256 -38 l -20 -60 q -21 -63 -49 -114 q -29 -50 -67 -93 l -43 -48 l 102 -249 l -139 -81 l -165 210 l -62 -13 q -60 -12 -120 -12 q -60 0 -120 12 l -62 13 l -165 -210 l -142 82 l 100 249 l -43 47 q -36 39 -62 90 q -26 51 -49 117 l -20 60 l -256 38 v 164 l 256 38 l 20 60 q 40 122 116 207 l 42 48 l -101 249 l 140 81 l 164 -210 l 63 13 q 60 12 119 12 q 60 0 120 -12 l 62 -13 l 165 210 l 142 -82 l -100 -249 l 43 -47 q 35 -38 62 -89 q 26 -51 49 -118 l 20 -60 l 256 -38 m -819 -389 q 64 0 120 24 q 56 24 98 65 q 41 42 65 98 q 24 56 24 120 q 0 64 -24 120 q -24 56 -65 97 q -42 42 -98 66 q -56 24 -120 24 q -64 0 -120 -24 q -56 -24 -97 -66 q -42 -41 -66 -97 q -24 -56 -24 -120 q 0 -64 24 -120 q 24 -56 66 -98 q 41 -41 97 -65 q 56 -24 120 -24 m 0 512 q 42 0 80 -16 q 37 -16 65 -44 q 28 -28 44 -66 q 16 -37 16 -79 q 0 -42 -16 -80 q -16 -37 -44 -65 q -28 -28 -65 -44 q -38 -16 -80 -16 q -42 0 -79 16 q -38 16 -66 44 q -28 28 -44 65 q -16 38 -16 80 q 0 42 16 79 q 16 38 44 66 q 28 28 66 44 q 37 16 79 16 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Sync_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1946 410 v 512 h -512 v -103 h 329 q -34 -121 -104 -225 q -70 -103 -167 -178 q -97 -75 -216 -118 q -120 -42 -252 -42 q -146 0 -276 51 q -130 51 -231 141 q -101 90 -167 211 q -67 122 -86 263 h -104 q 13 -108 51 -207 q 38 -99 97 -185 q 58 -85 136 -155 q 77 -69 169 -118 q 92 -49 196 -76 q 104 -27 215 -27 q 142 0 271 43 q 129 43 236 120 q 107 77 187 183 q 80 107 125 233 v -323 m 45 716 q -13 108 -51 207 q -38 99 -96 184 q -59 86 -136 155 q -78 70 -170 119 q -92 49 -196 76 q -104 27 -215 27 q -142 0 -271 -43 q -129 -43 -236 -120 q -107 -77 -187 -184 q -80 -106 -125 -232 v 323 h -103 v -512 h 512 v 103 h -329 q 34 122 104 225 q 70 103 167 178 q 97 75 217 117 q 119 43 251 43 q 146 0 276 -51 q 130 -51 231 -141 q 101 -90 168 -212 q 66 -121 85 -262 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1946 410 v 512 h -512 v -103 h 329 q -34 -121 -104 -225 q -70 -103 -167 -178 q -97 -75 -216 -118 q -120 -42 -252 -42 q -146 0 -276 51 q -130 51 -231 141 q -101 90 -167 211 q -67 122 -86 263 h -104 q 13 -108 51 -207 q 38 -99 97 -185 q 58 -85 136 -155 q 77 -69 169 -118 q 92 -49 196 -76 q 104 -27 215 -27 q 142 0 271 43 q 129 43 236 120 q 107 77 187 183 q 80 107 125 233 v -323 m 45 716 q -13 108 -51 207 q -38 99 -96 184 q -59 86 -136 155 q -78 70 -170 119 q -92 49 -196 76 q -104 27 -215 27 q -142 0 -271 -43 q -129 -43 -236 -120 q -107 -77 -187 -184 q -80 -106 -125 -232 v 323 h -103 v -512 h 512 v 103 h -329 q 34 122 104 225 q 70 103 167 178 q 97 75 217 117 q 119 43 251 43 q 146 0 276 -51 q 130 -51 231 -141 q 101 -90 168 -212 q 66 -121 85 -262 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Delete_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1096 1024 l 645 645 l -73 72 l -644 -645 l -645 645 l -72 -72 l 645 -645 l -645 -644 l 72 -73 l 645 645 l 644 -645 l 73 73 z"},{"type":"path","className":"OfficeIconColors_m213","d":"M 1096 1024 l 645 645 l -73 72 l -644 -645 l -645 645 l -72 -72 l 645 -645 l -645 -644 l 72 -73 l 645 645 l 644 -645 l 73 73 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Paste_24","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 427 1877 h 682 v 86 h -768 v -1622 h 427 v -21 q 0 -48 21 -91 q 20 -42 55 -74 q 35 -32 82 -51 q 46 -19 98 -19 q 52 0 99 19 q 46 19 81 51 q 35 32 56 74 q 20 43 20 91 v 21 h 427 v 512 h -86 v -426 h -170 v 256 h -854 v -256 h -170 m 256 170 h 682 v -170 h -170 v -107 q 0 -33 -15 -61 q -15 -27 -39 -47 q -24 -19 -54 -30 q -31 -11 -63 -11 q -32 0 -62 11 q -31 11 -55 30 q -24 20 -39 47 q -15 28 -15 61 v 107 h -170 m 1365 512 v 1109 h -853 v -1109 m 768 85 h -683 v 939 h 683 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1109 1920 h -725 v -1536 h 427 v -64 q 0 -39 17 -74 q 17 -35 46 -61 q 29 -26 68 -42 q 38 -15 82 -15 q 43 0 82 15 q 39 16 68 42 q 29 26 46 61 q 17 35 17 74 v 64 h 427 v 469 h -555 z"},{"type":"path","className":"OfficeIconColors_m212","d":"M 640 512 h -128 v 1280 h 597 v 128 h -729 v -1536 h 260 m 1022 0 v 469 h -126 v -341 h -128 v -128 z"},{"type":"path","className":"OfficeIconColors_m211","d":"M 1621 427 h -213 v -86 h 299 v 512 h -86 m -512 1110 h -768 v -1622 h 299 v 86 h -213 v 1450 h 682 z"},{"type":"path","className":"OfficeIconColors_m23","d":"M 597 341 h 171 v -21 q 0 -48 21 -91 q 20 -42 55 -74 q 35 -32 82 -51 q 46 -19 98 -19 q 52 0 99 19 q 46 19 81 51 q 35 32 56 74 q 20 43 20 91 v 21 h 171 v 342 h -854 m 86 -256 v 170 h 682 v -170 h -170 v -107 q 0 -33 -15 -61 q -15 -27 -39 -47 q -24 -19 -54 -30 q -31 -11 -63 -11 q -32 0 -62 11 q -31 11 -55 30 q -24 20 -39 47 q -15 28 -15 61 v 107 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 2005 2005 h -768 v -1024 h 768 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 2048 939 v 1109 h -853 v -1109 m 768 85 h -683 v 939 h 683 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"EditGeneric_24","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1895 176 q 68 71 68 156 q 0 43 -14 81 q -15 38 -33 66 q -18 29 -33 46 q -16 18 -17 19 l -1268 1268 l -513 151 l 151 -513 l 1268 -1268 q 97 -97 199 -97 q 101 0 192 91 m -1357 1329 q 65 62 77 168 l 1084 -1084 l -241 -241 l -1084 1084 q 40 5 84 21 q 43 17 80 52 m 1326 -1111 q 13 -27 13 -61 q 0 -35 -19 -65 q -19 -30 -46 -52 q -27 -21 -57 -34 q -30 -12 -52 -12 q -67 0 -139 72 l -46 46 l 242 241 l 46 -46 q 14 -14 29 -36 q 15 -21 29 -53 m -1674 1464 l 343 -115 v -17 q 0 -50 -12 -85 q -12 -35 -31 -59 q -20 -24 -44 -38 q -25 -13 -50 -20 q -26 -7 -50 -9 q -24 -2 -41 -2 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1534 212 q 35 -35 78 -60 q 42 -24 91 -24 q 27 0 65 15 q 37 16 71 43 q 34 27 58 64 q 23 38 23 83 q 0 51 -23 95 q -23 45 -61 85 l -1261 1261 l -453 151 l 151 -452 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1895 176 q 68 71 68 156 q 0 43 -14 81 q -15 38 -33 66 q -18 29 -33 46 q -16 18 -17 19 l -1268 1268 l -513 151 l 151 -513 l 1268 -1268 q 97 -97 199 -97 q 101 0 192 91 m -1357 1329 q 65 62 77 168 l 1084 -1084 l -241 -241 l -1084 1084 q 40 5 84 21 q 43 17 80 52 m 1326 -1111 q 13 -27 13 -61 q 0 -35 -19 -65 q -19 -30 -46 -52 q -27 -21 -57 -34 q -30 -12 -52 -12 q -67 0 -139 72 l -46 46 l 242 241 l 46 -46 q 14 -14 29 -36 q 15 -21 29 -53 m -1674 1464 l 343 -115 v -17 q 0 -50 -12 -85 q -12 -35 -31 -59 q -20 -24 -44 -38 q -25 -13 -50 -20 q -26 -7 -50 -9 q -24 -2 -41 -2 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Copy_24","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1963 853 v 1110 h -1280 v -1622 h 768 m 0 512 h 384 l -384 -384 m 426 470 h -512 v -512 h -597 v 1450 h 1109 m -1706 -256 h 426 v 86 h -512 v -1622 h 768 l 170 171 h -128 l -85 -85 h -639 m 1536 1024 h -768 v -86 h 768 m 0 342 h -768 v -86 h 768 m 0 342 h -768 v -86 h 768 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 725 1920 v -1536 h 708 l 487 487 v 1049 m -1323 -256 h -469 v -1536 h 708 l 128 128 h -367 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1963 853 v 1110 h -1280 v -1622 h 768 m 0 512 h 384 l -384 -384 m 426 470 h -512 v -512 h -597 v 1450 h 1109 m -1706 -256 h 426 v 86 h -512 v -1622 h 768 l 170 171 h -128 l -85 -85 h -639 z"},{"type":"path","className":"OfficeIconColors_m23","d":"M 1707 1195 h -768 v -86 h 768 m 0 342 h -768 v -86 h 768 m 0 342 h -768 v -86 h 768 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Filter_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 205 205 v 239 l 614 614 v 785 h 307 v -785 l 615 -614 v -239 m 102 281 l -614 615 v 845 h -512 v -845 l -615 -615 v -384 h 1741 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 768 1894 v -814 l -614 -615 v -311 h 1638 v 311 l -614 615 v 814 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 205 205 v 239 l 614 614 v 785 h 307 v -785 l 615 -614 v -239 m 102 281 l -614 615 v 845 h -512 v -845 l -615 -615 v -384 h 1741 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"AddAPlace_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1920 1024 h -896 v 896 h -128 v -896 h -896 v -128 h 896 v -896 h 128 v 896 h 896 z"},{"type":"path","className":"OfficeIconColors_m27","d":"M 1920 1024 h -896 v 896 h -128 v -896 h -896 v -128 h 896 v -896 h 128 v 896 h 896 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Checkmark_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 704 1690 l -702 -702 l 90 -90 l 612 612 l 1253 -1254 l 91 91 z"},{"type":"path","className":"OfficeIconColors_m27","d":"M 704 1690 l -702 -702 l 90 -90 l 612 612 l 1253 -1254 l 91 91 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"DeleteHover_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1115 1024 l 677 677 l -91 91 l -677 -677 l -677 677 l -91 -91 l 677 -677 l -677 -677 l 91 -91 l 677 677 l 677 -677 l 91 91 z"},{"type":"path","className":"OfficeIconColors_m213","d":"M 1115 1024 l 677 677 l -91 91 l -677 -677 l -677 677 l -91 -91 l 677 -677 l -677 -677 l 91 -91 l 677 677 l 677 -677 l 91 91 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"Table_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 102 102 h 1844 v 1844 h -1844 m 103 -1741 v 205 h 1638 v -205 m -1024 1126 h 410 v -307 h -410 m 410 410 h -410 v 409 h 410 m -512 -512 v -307 h -512 v 307 m 1024 -819 h -410 v 410 h 410 m 102 102 v 307 h 512 v -307 m -512 -102 h 512 v -410 h -512 m -614 0 h -512 v 410 h 512 m -512 512 v 409 h 512 v -409 m 614 409 h 512 v -409 h -512 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1894 1894 h -1740 v -1433 h 1740 z"},{"type":"path","className":"OfficeIconColors_m21","d":"M 1894 461 h -1740 v -307 h 1740 z"},{"type":"path","className":"OfficeIconColors_m23","d":"M 1894 1024 h -563 v 307 h 563 v 103 h -563 v 460 h -102 v -460 h -410 v 460 h -102 v -460 h -563 v -103 h 563 v -307 h -563 v -102 h 563 v -461 h 102 v 461 h 410 v -461 h 102 v 461 h 563 m -665 409 v -307 h -410 v 307 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 102 102 h 1844 v 1844 h -1844 m 1741 -103 v -1331 h -1638 v 1331 m 1638 -1433 v -205 h -1638 v 205 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"EditQuery_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1988 674 q 30 30 45 68 q 15 38 15 77 q 0 40 -15 77 q -15 38 -45 68 l -917 910 l -454 167 l 183 -468 l 898 -899 q 30 -30 68 -45 q 38 -14 77 -14 q 39 0 77 15 q 38 15 68 44 m -1005 1124 q -43 -76 -119 -119 l -71 188 m 1034 -887 l -144 -145 l -760 760 q 92 54 145 144 m 848 -847 q 15 -15 23 -34 q 7 -18 7 -38 q 0 -21 -8 -40 q -8 -18 -22 -33 q -15 -14 -33 -22 q -19 -8 -40 -8 q -20 0 -38 7 q -19 8 -34 23 l -16 16 l 145 144 m -1695 936 h 325 l -40 103 h -388 v -1844 h 1844 v 375 q -25 -7 -50 -12 q -26 -4 -53 -4 q -49 0 -94 13 q -46 13 -88 38 h -330 v 313 l -199 199 h -313 v 307 h 6 l -108 108 v -5 h -512 m 512 -410 h -512 v 307 h 512 m 512 -819 h -410 v 410 h 410 m -1024 -512 h 1638 v -205 h -1638 m 0 307 v 410 h 512 v -410 z"},{"type":"path","className":"OfficeIconColors_m21","d":"M 154 461 v -307 h 1740 v 307 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 154 461 h 1689 q -73 0 -137 27 q -65 27 -116 78 l -921 921 l -159 407 h -356 z"},{"type":"path","className":"OfficeIconColors_m23","d":"M 1331 461 v 364 l -199 199 h -313 v 307 h 6 l -108 108 v -5 h -563 v -103 h 563 v -307 h -563 v -102 h 563 v -461 h 102 v 461 h 410 v -461 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 490 1946 h -388 v -1844 h 1844 v 375 q -25 -7 -50 -12 q -26 -4 -53 -4 q -49 0 -94 13 q -46 13 -88 38 h -1456 v 1331 h 325 m -325 -1433 h 1638 v -205 h -1638 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 819 1634 q 240 -270 448 -482 q 59 -60 119 -120 q 60 -59 118 -113 q 57 -53 111 -99 q 53 -46 99 -80 q 46 -33 83 -52 q 36 -19 60 -19 q 8 0 12 1 q 41 11 68 28 q 26 17 41 37 q 15 20 21 41 q 6 22 6 42 q 0 17 -3 32 q -3 16 -7 27 q -4 13 -9 25 l -958 950 z"},{"type":"path","className":"OfficeIconColors_m26","d":"M 836 1609 q 77 27 134 84 q 56 57 83 133 l -362 145 z"},{"type":"path","className":"OfficeIconColors_m24","d":"M 1988 674 q 30 30 45 68 q 15 38 15 77 q 0 40 -15 77 q -15 38 -45 68 l -917 910 l -454 167 l 183 -468 l 898 -899 q 30 -30 68 -45 q 38 -14 77 -14 q 39 0 77 15 q 38 15 68 44 m -1065 921 q 92 54 145 144 l 759 -759 l -144 -145 m -890 1032 l 190 -69 q -43 -76 -119 -119 m 1052 -787 q 15 -15 23 -34 q 7 -18 7 -38 q 0 -21 -8 -40 q -8 -18 -22 -33 q -15 -14 -33 -22 q -19 -8 -40 -8 q -20 0 -38 7 q -19 8 -34 23 l -16 16 l 145 144 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"AddQueryGroup_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M2048 1085h-963v963h-120v-963h-965v-120h965v-965h120v965h963v120z"},{"type":"path","className":"OfficeIconColors_m22","d":"M2048 1085h-963v963h-120v-963h-965v-120h965v-965h120v965h963v120z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"RefreshConnection_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M1946 410v512h-512v-103h329q-34-121-104-225-70-103-167-178-97-75-216-118-120-42-252-42-146 0-276 51-130 51-231 141-101 90-167 211-67 122-86 263h-104q13-108 51-207 38-99 97-185 58-85 136-155 77-69 169-118 92-49 196-76 104-27 215-27 142 0 271 43 129 43 236 120 107 77 187 183 80 107 125 233v-323m45 716q-13 108-51 207-38 99-96 184-59 86-136 155-78 70-170 119-92 49-196 76-104 27-215 27-142 0-271-43-129-43-236-120-107-77-187-184-80-106-125-232v323h-103v-512h512v103h-329q34 122 104 225 70 103 167 178 97 75 217 117 119 43 251 43 146 0 276-51 130-51 231-141 101-90 168-212 66-121 85-262h104z"},{"type":"path","className":"OfficeIconColors_m22","d":"M1946 410v512h-512v-103h329q-34-121-104-225-70-103-167-178-97-75-216-118-120-42-252-42-146 0-276 51-130 51-231 141-101 90-167 211-67 122-86 263h-104q13-108 51-207 38-99 97-185 58-85 136-155 77-69 169-118 92-49 196-76 104-27 215-27 142 0 271 43 129 43 236 120 107 77 187 183 80 107 125 233v-323m45 716q-13 108-51 207-38 99-96 184-59 86-136 155-78 70-170 119-92 49-196 76-104 27-215 27-142 0-271-43-129-43-236-120-107-77-187-184-80-106-125-232v323h-103v-512h512v103h-329q34 122 104 225 70 103 167 178 97 75 217 117 119 43 251 43 146 0 276-51 130-51 231-141 101-90 168-212 66-121 85-262h104z"},{"type":"path","className":"OfficeIconColors_m22","d":"M1946 410v512h-512v-103h329q-34-121-104-225-70-103-167-178-97-75-216-118-120-42-252-42-146 0-276 51-130 51-231 141-101 90-167 211-67 122-86 263h-104q13-108 51-207 38-99 97-185 58-85 136-155 77-69 169-118 92-49 196-76 104-27 215-27 142 0 271 43 129 43 236 120 107 77 187 183 80 107 125 233v-323m45 716q-13 108-51 207-38 99-96 184-59 86-136 155-78 70-170 119-92 49-196 76-104 27-215 27-142 0-271-43-129-43-236-120-107-77-187-184-80-106-125-232v323h-103v-512h512v103h-329q34 122 104 225 70 103 167 178 97 75 217 117 119 43 251 43 146 0 276-51 130-51 231-141 101-90 168-212 66-121 85-262h104z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"DataCleaning_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 614 1280 q 102 -52 154 -154 q 51 104 154 155 q -103 51 -154 153 q -50 -103 -154 -154 m 308 -307 q 102 -54 153 -154 q 51 104 154 155 q -103 49 -153 152 q -51 -102 -154 -153 m -191 870 l 307 103 h -936 v -1844 h 1497 l -34 103 h -131 v 393 l -94 281 l -9 -9 v -153 h -614 v 256 l -103 102 v -358 h -409 v 614 h 256 l 102 103 h -358 v 409 h 409 v -358 l 103 102 v 256 m 614 -1638 h -600 v 409 h 600 m -1126 -409 v 409 h 409 v -409 m 1434 -42 q 0 37 -12 73 l -355 1067 l 9 3 q 32 11 58 30 q 26 19 44 44 q 18 26 28 56 q 10 31 10 63 q 0 17 -3 35 l -85 512 l -868 -290 l 230 -460 q 26 -54 77 -84 q 50 -30 107 -29 q 16 0 32 2 q 16 3 32 8 l 16 5 l 363 -1087 q 17 -50 59 -81 q 42 -30 95 -30 q 34 0 64 13 q 29 13 51 35 q 22 22 35 51 q 13 30 13 64 m -345 1494 l -570 -190 l -115 229 l 643 214 m 278 -1706 q 3 -11 5 -21 q 2 -9 2 -20 q 0 -26 -17 -44 q -18 -17 -44 -17 q -20 0 -35 11 q -16 12 -22 31 l -395 1184 l -113 -38 q -18 -5 -32 -5 q -29 0 -54 15 q -25 15 -39 42 l -16 32 l 541 181 l 6 -38 q 1 -5 1 -9 q 0 -3 0 -8 q 0 -32 -18 -59 q -19 -27 -51 -38 l -107 -36 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 154 154 h 1428 l -242 725 l -162 -162 h -205 l -563 563 l 372 373 l -65 131 v 55 l 167 55 h -730 m 1843 -1731 q 0 29 -9 57 l -372 1115 l 58 19 q 48 16 77 56 q 28 41 28 90 q 0 7 0 13 q -1 6 -2 12 l -17 97 l -653 -218 l 43 -85 q 20 -40 57 -63 q 37 -22 80 -22 q 23 0 49 8 l 65 21 l 378 -1135 q 11 -35 41 -56 q 29 -21 65 -21 q 23 0 44 9 q 20 9 35 24 q 15 15 24 35 q 9 21 9 44 z"},{"type":"path","className":"OfficeIconColors_m23","d":"M 717 1894 h -103 v -409 l 103 102 m -154 -153 h -409 v -103 h 307 m 973 -1177 v 444 l -94 281 l -9 -9 v -153 h -614 v 256 l -103 102 v -358 h -460 v -103 h 460 v -460 h 103 v 460 h 614 v -460 z"},{"type":"path","className":"OfficeIconColors_m26","d":"M 1760 1622 l -59 356 l -755 -252 l 161 -322 z"},{"type":"path","className":"OfficeIconColors_m25","d":"M 1742 2046 l -868 -290 l 187 -375 l 92 46 l -135 269 l 643 214 l 49 -296 l 101 17 z"},{"type":"path","className":"OfficeIconColors_m24","d":"M 614 1280 q 102 -52 154 -154 q 51 104 154 155 q -103 51 -154 153 q -50 -103 -154 -154 m 462 -154 q -51 -102 -154 -153 q 102 -54 153 -154 q 51 104 154 155 q -103 49 -153 152 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1801 1690 l -766 -256 l 69 -138 q 26 -54 77 -84 q 50 -30 107 -29 q 16 -1 32 2 q 16 3 32 8 l 16 5 l 363 -1087 q 17 -50 59 -81 q 42 -30 95 -30 q 34 0 64 13 q 29 13 51 35 q 22 22 35 51 q 13 30 13 64 q 0 37 -12 73 l -355 1067 l 9 3 q 32 11 58 30 q 26 19 44 44 q 18 26 28 56 q 10 31 10 63 q 0 17 -3 35 m -648 -160 l 541 181 l 6 -38 q 1 -5 1 -9 q 0 -3 0 -8 q 0 -32 -18 -59 q -19 -27 -51 -38 l -107 -36 l 388 -1163 q 3 -10 5 -20 q 2 -10 2 -21 q 0 -26 -17 -44 q -18 -17 -44 -17 q -20 0 -35 11 q -16 12 -22 31 l -395 1184 l -113 -38 q -18 -5 -32 -5 q -29 0 -54 15 q -25 15 -39 42 m -157 604 h -936 v -1844 h 1497 l -34 103 h -1360 v 1638 h 526 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"JotNewWindow_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 2048 128 v 1792 h -2048 v -1280 h 128 v 1152 h 1792 v -1280 h -896 v -128 h 896 v -128 h -896 v -128 m -128 384 h -384 v 384 h -128 v -384 h -384 v -128 h 384 v -384 h 128 v 384 h 384 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1984 448 v 1408 h -1920 v -1216 h 192 v 384 h 384 v -384 h 384 v -192 z"},{"type":"path","className":"OfficeIconColors_m21","d":"M 1984 169 v 279 h -960 v -279 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 2048 128 v 1792 h -2048 v -1280 h 128 v 1152 h 1792 v -1280 h -896 v -128 h 896 v -128 h -896 v -128 z"},{"type":"path","className":"OfficeIconColors_m27","d":"M 896 512 h -384 v 384 h -128 v -384 h -384 v -128 h 384 v -384 h 128 v 384 h 384 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"OLDeleteHover_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 717 1638 h -103 v -1024 h 103 m 307 1024 h -102 v -1024 h 102 m 307 1024 h -102 v -1024 h 102 m 410 -204 h -103 v 1365 q 0 35 -13 66 q -14 32 -37 55 q -23 23 -54 36 q -31 14 -66 14 h -990 q -35 0 -66 -14 q -32 -13 -55 -36 q -23 -23 -36 -55 q -14 -31 -14 -66 v -1365 h -102 v -103 h 512 q 0 -42 16 -80 q 16 -37 44 -65 q 28 -28 66 -44 q 37 -16 79 -16 h 102 q 42 0 80 16 q 37 16 65 44 q 28 28 44 65 q 16 38 16 80 h 512 m -819 -102 q -21 0 -40 8 q -19 8 -33 22 q -14 14 -22 32 q -8 19 -8 40 h 307 q 0 -21 -8 -40 q -8 -18 -22 -32 q -14 -14 -32 -22 q -19 -8 -40 -8 m 512 205 h -1126 v 1365 q 0 29 20 48 q 19 20 48 20 h 990 q 28 0 48 -20 q 20 -19 20 -48 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 478 1894 q -25 0 -46 -10 q -22 -9 -38 -25 q -17 -16 -26 -38 q -10 -21 -10 -46 v -1417 h 1229 v 1417 q 0 25 -9 46 q -10 22 -26 38 q -16 16 -37 25 q -22 10 -47 10 z"},{"type":"path","className":"OfficeIconColors_m213","d":"M 717 1638 h -103 v -1024 h 103 m 307 1024 h -102 v -1024 h 102 m 307 1024 h -102 v -1024 h 102 m 410 -204 h -103 v 1365 q 0 35 -13 66 q -14 32 -37 55 q -23 23 -54 36 q -31 14 -66 14 h -990 q -35 0 -66 -14 q -32 -13 -55 -36 q -23 -23 -36 -55 q -14 -31 -14 -66 v -1365 h -102 v -103 h 512 q 0 -42 16 -80 q 16 -37 44 -65 q 28 -28 66 -44 q 37 -16 79 -16 h 102 q 42 0 80 16 q 37 16 65 44 q 28 28 44 65 q 16 38 16 80 h 512 m -819 -102 q -21 0 -40 8 q -19 8 -33 22 q -14 14 -22 32 q -8 19 -8 40 h 307 q 0 -21 -8 -40 q -8 -18 -22 -32 q -14 -14 -32 -22 q -19 -8 -40 -8 m 512 205 h -1126 v 1365 q 0 29 20 48 q 19 20 48 20 h 990 q 28 0 48 -20 q 20 -19 20 -48 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"ellipsis_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 192 768 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 m 768 0 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 m 768 0 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 192 768 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 m 768 0 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 m 768 0 q 40 0 75 15 q 35 15 61 41 q 26 26 41 61 q 15 35 15 75 q 0 40 -15 75 q -15 35 -41 61 q -26 26 -61 41 q -35 15 -75 15 q -40 0 -75 -15 q -35 -15 -61 -41 q -26 -26 -41 -61 q -15 -35 -15 -75 q 0 -40 15 -75 q 15 -35 41 -61 q 26 -26 61 -41 q 35 -15 75 -15 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"MultiSelect_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1701 1536 l 188 397 l -247 115 l -189 -405 l -301 301 v -1244 l 896 836 m -549 -128 h 224 l -443 -413 v 640 l 212 -212 l 209 455 l 17 -7 m -1334 -719 h -384 v -1152 h 1152 v 256 h -128 v -128 h -896 v 896 h 256 m 1280 -21 l -640 -597 v 1130 h -512 v -1152 h 1152 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 1473 1533 l -257 257 v -943 l 670 625 h -286 l 204 430 l -131 61 m -1289 -1707 v 832 h -320 v -1024 h 1024 v 192 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 384 1152 h -384 v -1152 h 1152 v 256 h -128 v -128 h -896 v 896 h 256 z"},{"type":"path","className":"OfficeIconColors_m26","d":"M 1600 448 v 495 l -531 -495 m -493 0 h 448 v 1024 h -448 z"},{"type":"path","className":"OfficeIconColors_m25","d":"M 1664 384 v 619 l -128 -120 v -371 h -398 l -114 -106 v 106 h -384 v 896 h 384 v 128 h -512 v -1152 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1701 1536 l 188 397 l -247 115 l -189 -405 l -301 301 v -1244 l 896 836 m -549 -128 h 224 l -443 -413 v 640 l 212 -212 l 209 455 l 17 -7 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"DataTypeText_20","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1002 1638 l -146 -409 h -485 l -145 409 h -124 l 458 -1228 h 112 l 454 1228 m -512 -1100 h -3 q -5 22 -10 43 q -6 22 -14 44 l -183 501 h 425 l -192 -501 q -9 -23 -14 -45 q -6 -21 -9 -42 m 615 1100 v -1228 h 331 q 73 0 133 20 q 60 20 103 57 q 43 37 67 89 q 24 52 24 116 q 0 107 -54 180 q -55 73 -166 98 q 65 6 117 33 q 52 28 88 70 q 36 43 55 97 q 19 55 19 116 q 0 78 -28 143 q -29 65 -79 111 q -50 47 -120 72 q -70 26 -152 26 m -226 -1124 v 407 h 157 q 15 0 39 -2 q 23 -1 50 -6 q 26 -4 53 -14 q 26 -9 47 -24 q 22 -15 37 -36 q 15 -21 25 -44 q 10 -22 15 -44 q 4 -21 4 -37 q 0 -200 -244 -200 m -183 510 v 511 h 209 q 134 0 206 -64 q 72 -64 72 -181 q 0 -59 -19 -108 q -20 -49 -59 -84 q -40 -35 -99 -55 q -60 -19 -139 -19 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1002 1638 l -146 -409 h -485 l -145 409 h -124 l 458 -1228 h 112 l 454 1228 m -512 -1100 h -3 q -5 22 -10 43 q -6 22 -14 44 l -183 501 h 425 l -192 -501 q -9 -23 -14 -45 q -6 -21 -9 -42 m 615 1100 v -1228 h 331 q 73 0 133 20 q 60 20 103 57 q 43 37 67 89 q 24 52 24 116 q 0 107 -54 180 q -55 73 -166 98 q 65 6 117 33 q 52 28 88 70 q 36 43 55 97 q 19 55 19 116 q 0 78 -28 143 q -29 65 -79 111 q -50 47 -120 72 q -70 26 -152 26 m -226 -1124 v 407 h 157 q 15 0 39 -2 q 23 -1 50 -6 q 26 -4 53 -14 q 26 -9 47 -24 q 22 -15 37 -36 q 15 -21 25 -44 q 10 -22 15 -44 q 4 -21 4 -37 q 0 -200 -244 -200 m -183 510 v 511 h 209 q 134 0 206 -64 q 72 -64 72 -181 q 0 -59 -19 -108 q -20 -49 -59 -84 q -40 -35 -99 -55 q -60 -19 -139 -19 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"EditFilter_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1987 833 q 29 29 44 65 q 14 37 14 75 q 0 38 -14 74 q -15 37 -44 66 l -798 797 l -412 128 l 132 -408 l 797 -797 q 28 -28 65 -43 q 36 -14 75 -14 q 39 0 76 14 q 36 15 65 43 m -884 783 q 29 21 53 47 q 24 26 44 56 l 569 -570 l -99 -99 m -695 793 l 126 -39 q -30 -57 -84 -91 m 879 -690 q 21 -21 21 -50 q 0 -29 -21 -50 q -21 -20 -50 -20 q -29 0 -49 20 l -37 36 l 100 100 m -1092 93 l -768 -720 v -432 h 2048 v 432 l -166 156 q -9 -1 -18 -3 q -9 -1 -18 -1 q -58 0 -113 16 q -55 17 -103 49 l 290 -273 v -248 h -1792 v 248 l 768 720 v 275 l -128 128 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 832 1124 l -768 -720 v -340 h 1920 v 340 l -198 186 q -62 10 -117 36 q -55 27 -99 71 l -738 738 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 768 1152 l -768 -720 v -432 h 2048 v 432 l -166 156 q -9 -1 -18 -3 q -9 -1 -18 -1 q -58 0 -113 16 q -55 17 -103 49 l 290 -273 v -248 h -1792 v 248 l 768 720 v 275 l -128 128 z"},{"type":"path","className":"OfficeIconColors_m20","d":"M 950 1686 q 210 -236 392 -422 q 77 -79 156 -155 q 79 -76 149 -136 q 69 -59 125 -96 q 56 -36 87 -36 q 7 0 10 1 q 36 10 59 25 q 23 15 36 32 q 13 18 18 36 q 5 19 5 37 q 0 16 -2 29 q -3 13 -6 23 q -4 11 -8 22 l -838 830 z"},{"type":"path","className":"OfficeIconColors_m26","d":"M 965 1664 q 67 24 117 73 q 50 50 73 117 l -265 76 z"},{"type":"path","className":"OfficeIconColors_m24","d":"M 1987 833 q 29 29 44 65 q 14 37 14 75 q 0 38 -14 74 q -15 37 -44 66 l -798 797 l -412 128 l 132 -408 l 797 -797 q 28 -29 65 -43 q 37 -14 75 -14 q 39 0 76 14 q 36 15 65 43 m -884 783 q 29 21 53 47 q 24 26 44 56 l 569 -570 l -99 -99 m -695 793 l 126 -39 q -30 -57 -84 -91 m 879 -690 q 21 -21 21 -50 q 0 -29 -21 -50 q -21 -20 -50 -20 q -27 0 -49 20 l -37 36 l 100 100 z"}],"viewBox":"0,0,2048,2048"},{"type":"svg","id":"CommonControlChevronUp_16","children":[{"type":"path","className":"OfficeIconColors_HighContrast","d":"M 1747 1453 l -787 -787 l -787 787 l -90 -90 l 877 -877 l 877 877 z"},{"type":"path","className":"OfficeIconColors_m22","d":"M 1747 1453 l -787 -787 l -787 787 l -90 -90 l 877 -877 l 877 877 z"}],"viewBox":"0,0,2048,2048"}]}
|
combined_dataset/train/non-malicious/sample_6_74.ps1
|
sample_6_74.ps1
|
ConvertFrom-StringData @'
id_Files=Collecting Log Files
ID_FilesCab=Cabinet Files
ID_FilesLogs=Log Files
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDKiarm2hfOtuog
# rmyXB7vnzx4f/Qs3D2cTsUvJHLjIL6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHJa
# R4oakb1sYLWFJEMwPy06bDqSvkWJsUWMrr8K8VhaMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAanL9tienCIOGDDF54ZgwK1UwdZA39+BPzDNi
# UzDrXrC0d5wbbmnUdRnQWVmscCEo2YGfguB8DUX970lF0E/sSues/GHyvYoqgZZN
# TAyXhDT390Ic9/U6BX6AAOABWl1YY9o60yp7HmzZWIr/Z9gBFJ91K5S0yG6LjLUW
# U1Fob5DUxoYnhurrh+dy5gfjRQWpEhS6znTmr387PSgD3u+hKDQzenKjRKvP0KaS
# PEDzKWoL+Vym9tPK67ZhBq2EJUgQ6LY6gfv7JLtFDZHciJnprwxA6uLGEG5fNrAK
# iGjFFmHC7BZV9HExIyGaw3Hj2pkFjGB+ku9Xb8qihx/R77CVD6GCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCDt/5g1dVPQttuBvf3s6VlFdvY+TeR67yz
# 4mzXB64d4QIGZusiCs7NGBMyMDI0MTAyODExNDA0Mi42OTVaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg
# dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3
# k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW
# 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8
# U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH
# TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn
# 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE
# 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX
# D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI
# vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ
# QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G
# qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb
# QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL
# zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0
# G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt
# qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b
# a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB
# VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM
# H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N
# iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG
# 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V
# VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB
# jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0
# MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA
# AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd
# uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0
# GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578
# OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI
# /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN
# ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgk7FtE90dAUYPinci7nVu8g7psawaF/oN81lMb+zHNQcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So
# IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b
# gvEVMA0GCSqGSIb3DQEBCwUABIICAD1UYk0AUXGzVmiAUjSqOAUcoF/uPpoHnWu0
# pD1oXsUdajV1T2A3Oan+PiJHXrRsJ3XFuhEgMvfNZIcqxUFtrf/OZ8drriUEVrer
# e0P7UeNJswinlJpDb8/DslDiCJ8pEUqsbehZYRiENwLzMCLdVNKJcyCiaD3XkPq1
# 3PwngCctdty30Wk8wkgbJdA53Xu+0aA+Lcy3l2cnDb/lz3AGUdH4Fw09RylEO46Z
# MeYiJ5KvRiAJy+9UG/ve6txrvxux5O0ZrSbF/7bJpEBNsHPBNGeps9YQtFi0RVjg
# j1HY5k51JAQUg/qkTaLWPub+FiE+iqe6UlmOm8vZK9ag3SfTSY+3tbCIilbAOAz+
# UHK0rOJm+MmWiUZDLTmD9/Kaclz7cAtWHctr8NAvrCrQU6ww3mcvAcW5blwcGOl9
# 5Z2Po3PXRtIRdA1YsPfNxxliwlO2aKGDHJXqU1kUYIcQwBsxln5FLi/yUHXnVtKo
# 1fFiX4zRuwXwvVH7HcXMAIkcxnl66TCcra6eL98MXbCU9+0VhXo/mxDwaBuQ2QrN
# Q6csdFTN+Gpuoi0k2ZybB+dnvU961Lm0OQHNxXw9qKxziw8weaK9v6fH4Fp9DWGs
# F5o23MpJNS91qVWO9I5GKq58bUcKRs6DFD+kIIob+lI+IEGnge1cikD4XdP049/n
# CJ7Y/HDK
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-DellWarranty.ps1
|
Get-DellWarranty.ps1
|
function Get-DellWarranty {
<#
.Synopsis
Provides warranty information for one or more Dell service tags.
.Description
Queries the Dell Website for a list of service tags and returns the warranty information as a custom object.
If a service tag has multiple warranties, they are returned as multiple separate objects.
If no service tag is specified, it will attempt to retrieve and lookup the local system's service tag.
The service tag can be provided to the command in several ways:
1. Using the -servicetag parameter
2. By passing one or more Service Tags via the pipeline
3. By passing objects that have either servicetag or serialnumber defined as a property, such as win32_bios WMI objects
See examples for details.
.Parameter ServiceTag
ALIAS: serialnumber
The Dell service tag you wish to query. Example: XYZ12A3
.Example
C:\\PS> Get-DellWarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
If no service tags are provided, the script retrieves the local computer's serial number from WMI and queries for it.
.Example
C:\\PS> Get-DellWarranty -ServiceTag XXXX123
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
You can pass the service tag as a parameter, or as the first positional parameter (e.g. Get-DellWarranty XXXX123)
.Example
C:\\PS> "XXXX123","XXXX124","XXXX125" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can pass serial numbers via the pipeline either directly or as a variable.
.Example
C:\\PS> get-wmiobject win32_bios -computername "computer1","computer2","1.2.3.4" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can also pass any object that has a "serialnumber" or "servicetag" property. In this example, we query computers directly for their serial numbers,
and pass those results (which are WMI objects that have a serialnumber property) via pipeline directly to the command to obtain warranty information.
.Notes
AUTHOR: Justin Grote <jgrote NOSPAM-AT allieddigital NOSPAM-DOT net>
WARNING: Since Dell does not provide a formal API, this script works by screen-scraping the HTML from the Dell product support site.
Any future change to the layout or logic of this site will break the script or cause unpredictable results.
HISTORY: v1.0 [31 Jan 2011] - Initial Module Creatio
.Link
http://support.dell.com/support/topics/global.aspx/support/my_systems_info
#>
[CmdletBinding()]
param(
[Parameter(Mandatory=$False,Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)]
[alias("serialnumber")]
[string[]]$ServiceTag
)
PROCESS {
# If nothing was passed, retrieve the local system service tag
if ($ServiceTag -eq $null) {
write-verbose "No Service Tags provided. Using Local Computer's Service Tag"
write-verbose "START Obtaining Serial number via WMI for localhost"
$ServiceTag = (get-wmiobject win32_bios).SerialNumber
write-verbose "SUCCESS Obtaining Serial number via WMI for localhost - $ServiceTag"
}
# Detect if an array of service tags were passed via parameter and unwind them.
foreach ($strServicetag in $servicetag) {
write-verbose "START Querying Dell for Service Tag $_"
Get-DellWarrantyWorker $strServicetag
write-verbose "SUCCESS Querying Dell for Service Tag $_"
}
}
}
Function Get-DellWarrantyWorker {
Param(
[String]$serviceTag
)
#Dell Warranty URL Path
$URL = "http://support.dell.com/support/topics/global.aspx/support/my_systems_info/details?c=us&l=en&s=gen&ServiceTag=$serviceTag"
trap [System.FormatException] {
write-error -category invalidresult "The service tag $serviceTag was not found. This is either because you entered the tag incorrectly, it is not present in Dell's database, or Dell changed the format of their website causing this search to fail." -recommendedaction "Please check that you entered the service tag correctly"
return;
}
#Screenscrape the HTML for the warranty Table
$HTML = (New-Object Net.WebClient).DownloadString($URL)
If ($HTML -Match '<table[\\w\\s\\d"=%]*contract_table">.+?</table>') {
$htmltable = $Matches[0]
} else {
throw (New-Object System.FormatException)
}
$HtmlLines = $htmltable -Split "<tr" | Where-Object { $_ -Match '<td' }
$Header = ($HtmlLines[0] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*' | Where-Object { $_ -ne '' }
#Convert the warranty table fields into a powershell object
For ($i = 1; $i -lt $HtmlLines.Count; $i++) {
$Output = New-Object PSObject
$Output | Add-Member NoteProperty "Service Tag" -value $serviceTag
$Values = ($HtmlLines[$i] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*|<a.+?>'
For ($j = 1; $j -lt $Values.Count; $j++) {
$Output | Add-Member NoteProperty $Header[$j - 1] -Value $Values[$j]
}
#Minor formatting fix if days remaining on warranty is zero
if ($output.'Days Left' -match '<<0') {write-host -fore darkgreen "match!";$output.'Days Left' = 0}
return $Output
}
}
|
combined_dataset/train/non-malicious/sample_47_52.ps1
|
sample_47_52.ps1
|
#
# Module manifest for module 'OCI.PSModules.Managementagent'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Managementagent.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2f5c5edb-5a3f-40c3-bf5b-eb95bc0d12aa'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Managementagent Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementagent.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIManagementagent',
'Get-OCIManagementagentAutoUpgradableConfig',
'Get-OCIManagementagentAvailabilityHistoriesList',
'Get-OCIManagementagentDataSource',
'Get-OCIManagementagentDataSourcesList',
'Get-OCIManagementagentImagesList',
'Get-OCIManagementagentInstallKey',
'Get-OCIManagementagentInstallKeyContent',
'Get-OCIManagementagentInstallKeysList',
'Get-OCIManagementagentPluginsList', 'Get-OCIManagementagentsList',
'Get-OCIManagementagentWorkRequest',
'Get-OCIManagementagentWorkRequestErrorsList',
'Get-OCIManagementagentWorkRequestLogsList',
'Get-OCIManagementagentWorkRequestsList',
'Invoke-OCIManagementagentDeployPlugins',
'Invoke-OCIManagementagentSetAutoUpgradableConfig',
'Invoke-OCIManagementagentSummarizeManagementAgentCounts',
'Invoke-OCIManagementagentSummarizeManagementAgentPluginCounts',
'New-OCIManagementagentDataSource',
'New-OCIManagementagentInstallKey', 'Remove-OCIManagementagent',
'Remove-OCIManagementagentDataSource',
'Remove-OCIManagementagentInstallKey',
'Remove-OCIManagementagentWorkRequest', 'Update-OCIManagementagent',
'Update-OCIManagementagentDataSource',
'Update-OCIManagementagentInstallKey'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementagent'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3289.ps1
|
3289.ps1
|
enum DiscordGatewayEventCode {
UnknownError = 4000
UnknownOpcode = 4001
DocodeError = 4002
NotAuthenticated = 4003
AuthenticationFailed = 4004
AlreadyAuthenticated = 4005
InvalidSeq = 4007
RateLimited = 4008
SessionTimeout = 4009
InvalidShard = 4010
ShardingRequired = 4011
}
|
combined_dataset/train/non-malicious/finddupe_12.ps1
|
finddupe_12.ps1
|
function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null)
{
$stream.Close();
}
break;
}
foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }}
return [string]$result;
}
write-host "Usage: finddupe.ps1 <directory/file #1> <directory/file #2> ... <directory/file #N> [-delete] [-noprompt]"
$matches = 0 # initialize number of matches for summary.
$filesdeleted = 0 # number of files deleted.
$bytesrec = 0 # Number of bytes recovered.
$files=@()
$del = $false # delete duplicates
$noprompt = $false # delete without prompting toggle
$currentdir = $true # work on current directory by default
for ($i=0;$i -ne $args.count; $i++)
{
if ($args[$i] -eq "-delete")
{
$del=$true;continue
}
else
{
if ($args[$i] -eq "-noprompt")
{
$noprompt=$true;continue
}
else
{
$files+=(dir $args[$i] -recurse | ? {$_.psiscontainer -ne $true})
$currentdir=$false
}
}
}
if ($currentdir -eq $true) { $files=(dir -recurse | ? {$_.psiscontainer -ne $true})}
if ($files -eq $null) {write-host "No files found."; exit}
for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files
{
if ($files[$i] -eq $null) {continue}
$md5 = $null
$filecheck = $files[$i]
$files[$i] = $null
for ($c=0;$c -ne $files.count; $c++)
{
if ($files[$c] -eq $null) {continue}
# write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline
if ($filecheck.length -eq $files[$c].length)
{
#write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline
if ($md5 -eq $null) {$md5 = (get-md5 $filecheck)}
if ($md5 -eq (get-md5 $files[$c]))
{
write-host "Size and MD5 match: " -fore red -nonewline
write-host "`"$($filecheck.fullname)`"" -nonewline
write-host " and " -nonewline
write-host "`"$($files[$c].fullname)`""
$matches++
if ($del -eq $true)
{
if ($noprompt -eq $true)
{
del $files[$c].fullname
write-host "Deleted duplicate: " -f red -nonewline
write-host "$($files[$c].fullname)."
}
else
{
del $files[$c].fullname -confirm
}
if ((get-item -ea 0 $files[$c].fullname) -eq $null)
{
$filesdeleted += 1
$bytesrec += $files[$c].length
}
}
$files[$c] = $null
}
}
}
}
write-host ""
write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found.
write-host "Number of matches found: $matches."
Write-host "Number of duplicates deleted: $filesdeleted." # Display number of duplicate files deleted and bytes recovered.
write-host "$bytesrec bytes recovered."
write-host ""
|
combined_dataset/train/non-malicious/sample_8_39.ps1
|
sample_8_39.ps1
|
ConvertFrom-StringData @'
id_scheduletasks=Schedule Tasks Information
id_scheduletasksobtaining=Obtaining information about schedule tasks
id_scheduletaskssection=Schedule Tasks Information
id_scheduletasksoutput=Schedule Tasks List
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDa8I2wY7e33LcG
# o2sWcFTnGT5Ri9BTdNJPmnW7YlDl4qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM4H4GNSVHm8nLGTgW2oiU9n
# Vp/lstMUqDk+JZlcBrxBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUgDZnmydxNk+20locvR1NuC4IxKbjVSe619Od10M3yGLcM7pvfDSTQZV
# YKbmXnAbgyY/jx6m9VXppgajXVOdW1VKms+AimkjVytFVulh6JTC5Bx85ylpWAdE
# ZQtJ+16cOAQwzOxYxPqR7u4tcCT3jIpAtVDkaV6YZcQYqnkIvTTC8pgF7vE8P42L
# Q0VFdEu1dQVdOvTYWe22OkymW5jKCNwgQIUaCwFWg6JZolLxRpY1p69lHQntTKGX
# CspQoLjdDP1mO7olXBJB9vF2rzPD/TBSZDgnokv3UjdLbJLgsJY7EQmV2DDbig+g
# B4Ffgx4CvygIi4gvtxqSQlMLO+/qC6GCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCChfMYQGaOQ8KJ5uH7aYlm3cMFBDtE0lcTPe1WTYo75QIGZut+oGF9
# GBMyMDI0MTAyODExNDA0MS40MzFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Bigr8xpWoc6AAEAAAH8MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZGMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp1DAKLxpbQcPVYPHlJHy
# W7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EFRQcmM8BypwjhWP8F7x4i
# O88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7ytsurZ9xocbuEL7+P7EkIwo
# OuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF5lk3AePJ78OL3aw/Ndlk
# vdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ837GXXITshd2Mfs6oYfxXE
# tmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZt94rn/ey2ynvunlx0R6/
# b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0lRtSz+4TdpUU/oAZSB+Y+
# s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pTshl/Wf8OOuPQRiA+stTs
# g89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+vZz6E0Zsenzi0OtMf5RC
# a2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk78V63yoPBffJEAu+B5xlT
# PYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9ASMF3Os1jrogCHGiykfp1
# dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSY8aUrsUaz
# hxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAT7ss/ZAZ0bTa
# FsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGtweRChC2lJ8GVRHgrFkBx
# ACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnscD98DZi6WNTAymnaS7it5
# qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL6TTFMtFYJrpK9TM5Ryh5
# eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZORvM3k9V8Yn3JI5YLPuLs
# o2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6HWVsCeySetrqfsDyYWStw
# L96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPnjnLk7ypJW29t17Yya4V+
# Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Vaiz+iewWrIJZ4tXkDMmL2
# 1nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC6hGdliiEBpyYeUF0ohZF
# n7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1KtNoWpq7VuJqapckYsmvm
# mYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uWwUCaj0uZlah/RGSYMd84
# y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2wfqBsw4NLVwqYqqqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0MTAyOTAxMTg1NFowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEAAgIj+QIB/zAHAgEAAgIV
# OjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAqtLGFlstr
# sb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6leM9y61oAgIF33fHJalc0
# m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5LfvMp3a2pIDntcYlMbl2o
# yGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32MCwxu4PiML3KP595ks9mt
# 6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+atWpPKH7AHBCaUnoWAwdk
# m5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao2+coyd9IdOXkz3f7u7vY
# B3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgqfhXmbZ0
# xdsVdG111aIaiaWI8Zx8KexT93LHLwE9L7wwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3d5MCaNEtYjCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/Bigr8xpWoc6AAEA
# AAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBUR/vJ4UAWMA0GCSqGSIb3
# DQEBCwUABIICAAFTYXwhM6ibWooQGZS8da09w+GOxBCckAfhGlcv6wdd4zx5Z/zi
# dZfv6S/Q8yLES/YutbBIOjYMxpahdUbI2IP6wskB3lD1IMSy4Uxsw/WvMHkjXmMJ
# Ksesf9alpf1S/S4ezxkW3GhE+3pcczLHjIgeurisEOvxWvbL20OI89b3p7WmDOUC
# jC7BBVfOXEdpYexQtKbM6JfqTgS8qHNvbBfWHzbj2cn5i0Bdzf7OL6oXOjZCuO/q
# bq5cve8ZNNrGA3SMG3/buhlXjn82rsGC3ikxp4MRPBm/9gZADF9YsKUrEX61Z9Jw
# MsyeMMjmGFHx5MNILms9A5Lyecn/VlvZ+RWQnhyDEiE52IcgqoRQbG/+ocf8exww
# x8Ull8ZMxiOC5zlcDv2AeBe55WEo8OvWKcJlRhTgHwGQI1kDKp2s5kBQDBIIHUYZ
# ivBJtJGA8RmONMNQGzck0cDgD67Q3BsQ7C8JKdbyDCmswdlWNVs0aB2A1fvO3sbb
# v5iDR81rMNses6eSsLSHNPkZdT3vLumwTJX/T3NQ6QFfCpiXDgBuwdiQRWD6mW4V
# uKXJgjuIF9s48dpZr0aUfOnqNRwVe1GVn7A4iaxplkbDGQ61Wdbguj6XYZma7jni
# 1ii7/ZmdsT6c1hEvAxQUdBSAOnwT42HFHFllg9zW3jbiDMx3+CK/Hp3a
# SIG # End signature block
|
combined_dataset/train/non-malicious/754.ps1
|
754.ps1
|
[CmdletBinding(DefaultParameterSetName='Increment')]
param(
[Parameter(ParameterSetName='Increment')]
[ValidateSet('Major', 'Minor', 'Patch', 'Preview')]
[string]
$IncrementLevel = 'Preview',
[Parameter(Mandatory, ParameterSetName='SetVersion')]
[semver]
$NewVersion,
[Parameter(Mandatory)]
[string]
$GitHubToken,
[Parameter()]
[string]
$TargetFork = 'PowerShell',
[Parameter()]
[string]
$BranchName,
[Parameter()]
[string]
$PRDescription
)
Import-Module -Force "$PSScriptRoot/../FileUpdateTools.psm1"
Import-Module -Force "$PSScriptRoot/../GitHubTools.psm1"
function FindPackageJsonVersionSpan
{
param(
[Parameter(Mandatory)]
[string]
$PackageJsonContent
)
try
{
$reader = [System.IO.StringReader]::new($PackageJsonContent)
$jsonReader = [Newtonsoft.Json.JsonTextReader]::new($reader)
$depth = 0
$seenVersion = $false
$versionStartOffset = -1
$versionStartColumn = -1
while ($jsonReader.Read())
{
switch ($jsonReader.TokenType)
{
'StartObject'
{
$depth++
continue
}
'EndObject'
{
$depth--
continue
}
'PropertyName'
{
if ($depth -ne 1)
{
continue
}
$seenVersion = $jsonReader.Value -eq 'version'
if (-not $seenVersion)
{
continue
}
$currIndex = Get-StringOffsetFromSpan -String $PackageJsonContent -EndLine $jsonReader.LineNumber -Column $jsonReader.LinePosition
$versionStartOffset = $PackageJsonContent.IndexOf('"', $currIndex) + 1
$versionStartColumn = $jsonReader.LinePosition + $versionStartOffset - $currIndex
continue
}
'String'
{
if (-not $seenVersion -or $depth -ne 1)
{
continue
}
return @{
Start = $versionStartOffset
End = $versionStartOffset + $jsonReader.LinePosition - $versionStartColumn
}
continue
}
}
}
}
finally
{
$reader.Dispose()
$jsonReader.Dispose()
}
throw 'Did not find package.json version field'
}
function FindRequiredPsesVersionSpan
{
param(
[Parameter(Mandatory)]
[string]
$MainTsContent
)
$pattern = [regex]'const\s+requiredEditorServicesVersion\s+=\s+"(.*)"'
$versionGroup = $pattern.Match($MainTsContent).Groups[1]
return @{
Start = $versionGroup.Index
End = $versionGroup.Index + $versionGroup.Length
}
}
function FindVstsBuildVersionSpan
{
param(
[Parameter(Mandatory)]
[string]
$DockerFileContent
)
$pattern = [regex]'ENV VSTS_BUILD_VERSION=(.*)'
$versionGroup = $pattern.Match($DockerFileContent).Groups[1]
return @{
Start = $versionGroup.Index
End = $versionGroup.Index + $versionGroup.Length
}
}
function UpdateMainTsPsesVersion
{
param(
[Parameter(Mandatory)]
[string]
$MainTsPath,
[Parameter(Mandatory)]
[version]
$Version
)
$mainTsContent = Get-Content -Raw $MainTsPath
$mainTsVersionSpan = FindRequiredPsesVersionSpan $mainTsContent
$newMainTsContent = New-StringWithSegment -String $mainTsContent -NewSegment $Version -StartIndex $mainTsVersionSpan.Start -EndIndex $mainTsVersionSpan.End
if ($newMainTsContent -ne $mainTsContent)
{
Set-Content -Path $MainTsPath -Value $newMainTsContent -Encoding utf8NoBOM -NoNewline
}
}
function UpdateDockerFileVersion
{
param(
[Parameter(Mandatory)]
[string]
$DockerFilePath,
[Parameter(Mandatory)]
[version]
$Version
)
$vstsDockerFileContent = Get-Content -Raw $DockerFilePath
$vstsDockerFileVersionSpan = FindVstsBuildVersionSpan -DockerFileContent $vstsDockerFileContent
$newDockerFileContent = New-StringWithSegment -String $vstsDockerFileContent -NewSegment $Version -StartIndex $vstsDockerFileVersionSpan.Start -EndIndex $vstsDockerFileVersionSpan.End
Set-Content -Path $DockerFilePath -Value $newDockerFileContent -Encoding utf8NoBOM -NoNewline
}
function GetMarketplaceVersionFromSemVer
{
[OutputType([version])]
param(
[Parameter(Mandatory)]
[semver]
$SemVer
)
if (-not $SemVer.PreReleaseLabel)
{
return [version]($SemVer.ToString())
}
return [version]::new($NewVersion.Major, $NewVersion.Minor, $NewVersion.PreReleaseLabel.Substring(8)-1)
}
$repoLocation = Join-Path ([System.IO.Path]::GetTempPath()) 'vscps-updateversion-temp'
$paths = @{
packageJson = "$repoLocation/package.json"
mainTs = "$repoLocation/src/main.ts"
vstsDockerFile = "$repoLocation/tools/releaseBuild/Image/DockerFile"
}
$cloneParams = @{
OriginRemote = 'https://github.com/rjmholt/vscode-powershell'
Destination = $repoLocation
Clobber = $true
Remotes = @{
upstream = 'https://github.com/PowerShell/vscode-powershell'
}
}
Copy-GitRepository @cloneParams
$packageJson = Get-Content -Raw $paths.packageJson
$pkgJsonVersionOffsetSpan = FindPackageJsonVersionSpan -PackageJsonContent $packageJson
if ($IncrementLevel)
{
$version = [semver]$packageJson.Substring($pkgJsonVersionOffsetSpan.Start, $pkgJsonVersionOffsetSpan.End - $pkgJsonVersionOffsetSpan.Start)
$NewVersion = Get-IncrementedVersion -Version $version -IncrementLevel $IncrementLevel
}
if (-not $BranchName)
{
$BranchName = "update-version-$NewVersion"
}
if (-not $PRDescription)
{
$PRDescription = "Updates version strings in vscode-PowerShell to $NewVersion.`n**Note**: This is an automated PR."
}
$psesVersion = Get-VersionFromSemVer -SemVer $NewVersion
$marketPlaceVersion = GetMarketplaceVersionFromSemVer -SemVer $NewVersion
$newPkgJsonContent = New-StringWithSegment -String $packageJson -NewSegment $NewVersion -StartIndex $pkgJsonVersionOffsetSpan.Start -EndIndex $pkgJsonVersionOffsetSpan.End
Set-Content -Path $paths.packageJson -Value $newPkgJsonContent -Encoding utf8NoBOM -NoNewline
UpdateMainTsPsesVersion -MainTsPath $paths.mainTs -Version $psesVersion
UpdateDockerFileVersion -DockerFilePath $paths.vstsDockerFile -Version $marketPlaceVersion
$commitParams = @{
Message = "[Ignore] Increment version to $NewVersion"
Branch = $branchName
RepositoryLocation = $repoLocation
File = @(
'package.json'
'src/main.ts'
'tools/releaseBuild/Image/DockerFile'
)
}
Submit-GitChanges @commitParams
$prParams = @{
Organization = $TargetFork
Repository = 'vscode-PowerShell'
Branch = $branchName
Title = "Update version to v$NewVersion"
Description = $PRDescription
GitHubToken = $GitHubToken
FromOrg = 'rjmholt'
}
New-GitHubPR @prParams
|
combined_dataset/train/non-malicious/SharePoint UserID grab.ps1
|
SharePoint UserID grab.ps1
|
## .\\SharePoint_Users_Read.ps1 "http://some.urlname.com/" "User Information List" ""
## .\\SharePoint_Users_Read.ps1 "http://some.urlname.com/" "User Information List" "user, someone"
param(
[string] $rqurdstrPath = $(Throw "--SharePoint Core Path required."), #required parameter
[string] $rqurdstrListName = $(Throw "--SharePoint List Name required."), #required parameter
[string] $strTargetUser = "" #non-required user name for ID Return
)
Write-Host "Beginning Processing--`n"
## Global Variables ##
$strUserIDReturn = ""
write-host "rqurdstrPath: $rqurdstrPath "
write-host "rqurdstrListName: $rqurdstrListName "
## Load SharePoint .NET Libraries ##
[void][System.reflection.Assembly]::LoadWithPartialName("Microsoft.SharePoint")
$site = new-object Microsoft.SharePoint.SPSite($rqurdstrPath)
$userlist = $site.RootWeb.Lists[$rqurdstrListName]
write-host "site: $site "
write-host "userlist: $userlist`n"
# Print the ID and Title of each list item #$userlist.Items | Format-List -property ID, Title
if($strTargetUser -eq "") {
Write-Host "--Displaying all Portal Users"
foreach($strItem in $userlist.Items) {
[string]$strItem.ID + "--"+$strItem.Title
}
}
else {
write-host "--Targeting specific user to return ID"
$intUserIDReturn = -1
foreach($strItem in $userlist.Items) {
$intUserID=[int]$strItem.ID
$strUserName=$strItem.Title
if($strUserName -eq $strTargetUser) {
$intUserIDReturn = $intUserID
break;
}
}
$intUserIDReturn
}
## NOTE: don't forget to dispose your .NET objects! ##
$site.RootWeb.Dispose()
$site.Dispose()
## End Processing ##
Write-Host "`nEnd Processing--`n"
|
combined_dataset/train/non-malicious/sample_46_35.ps1
|
sample_46_35.ps1
|
<#
.Synopsis
Activate a Python virtual environment for the current PowerShell session.
.Description
Pushes the python executable for a virtual environment to the front of the
$Env:PATH environment variable and sets the prompt to signify that you are
in a Python virtual environment. Makes use of the command line switches as
well as the `pyvenv.cfg` file values present in the virtual environment.
.Parameter VenvDir
Path to the directory that contains the virtual environment to activate. The
default value for this is the parent of the directory that the Activate.ps1
script is located within.
.Parameter Prompt
The prompt prefix to display when this virtual environment is activated. By
default, this prompt is the name of the virtual environment folder (VenvDir)
surrounded by parentheses and followed by a single space (ie. '(.venv) ').
.Example
Activate.ps1
Activates the Python virtual environment that contains the Activate.ps1 script.
.Example
Activate.ps1 -Verbose
Activates the Python virtual environment that contains the Activate.ps1 script,
and shows extra information about the activation as it executes.
.Example
Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv
Activates the Python virtual environment located in the specified location.
.Example
Activate.ps1 -Prompt "MyPython"
Activates the Python virtual environment that contains the Activate.ps1 script,
and prefixes the current prompt with the specified string (surrounded in
parentheses) while the virtual environment is active.
.Notes
On Windows, it may be required to enable this Activate.ps1 script by setting the
execution policy for the user. You can do this by issuing the following PowerShell
command:
PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
For more information on Execution Policies:
https://go.microsoft.com/fwlink/?LinkID=135170
#>
Param(
[Parameter(Mandatory = $false)]
[String]
$VenvDir,
[Parameter(Mandatory = $false)]
[String]
$Prompt
)
<# Function declarations --------------------------------------------------- #>
<#
.Synopsis
Remove all shell session elements added by the Activate script, including the
addition of the virtual environment's Python executable from the beginning of
the PATH variable.
.Parameter NonDestructive
If present, do not remove this function from the global namespace for the
session.
#>
function global:deactivate ([switch]$NonDestructive) {
# Revert to original values
# The prior prompt:
if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) {
Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt
Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT
}
# The prior PYTHONHOME:
if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) {
Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME
Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME
}
# The prior PATH:
if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) {
Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH
Remove-Item -Path Env:_OLD_VIRTUAL_PATH
}
# Just remove the VIRTUAL_ENV altogether:
if (Test-Path -Path Env:VIRTUAL_ENV) {
Remove-Item -Path env:VIRTUAL_ENV
}
# Just remove VIRTUAL_ENV_PROMPT altogether.
if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) {
Remove-Item -Path env:VIRTUAL_ENV_PROMPT
}
# Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether:
if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) {
Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force
}
# Leave deactivate function in the global namespace if requested:
if (-not $NonDestructive) {
Remove-Item -Path function:deactivate
}
}
<#
.Description
Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the
given folder, and returns them in a map.
For each line in the pyvenv.cfg file, if that line can be parsed into exactly
two strings separated by `=` (with any amount of whitespace surrounding the =)
then it is considered a `key = value` line. The left hand string is the key,
the right hand is the value.
If the value starts with a `'` or a `"` then the first and last character is
stripped from the value before being captured.
.Parameter ConfigDir
Path to the directory that contains the `pyvenv.cfg` file.
#>
function Get-PyVenvConfig(
[String]
$ConfigDir
) {
Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg"
# Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue).
$pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue
# An empty map will be returned if no config file is found.
$pyvenvConfig = @{ }
if ($pyvenvConfigPath) {
Write-Verbose "File exists, parse `key = value` lines"
$pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath
$pyvenvConfigContent | ForEach-Object {
$keyval = $PSItem -split "\s*=\s*", 2
if ($keyval[0] -and $keyval[1]) {
$val = $keyval[1]
# Remove extraneous quotations around a string value.
if ("'""".Contains($val.Substring(0, 1))) {
$val = $val.Substring(1, $val.Length - 2)
}
$pyvenvConfig[$keyval[0]] = $val
Write-Verbose "Adding Key: '$($keyval[0])'='$val'"
}
}
}
return $pyvenvConfig
}
<# Begin Activate script --------------------------------------------------- #>
# Determine the containing directory of this script
$VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition
$VenvExecDir = Get-Item -Path $VenvExecPath
Write-Verbose "Activation script is located in path: '$VenvExecPath'"
Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)"
Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)"
# Set values required in priority: CmdLine, ConfigFile, Default
# First, get the location of the virtual environment, it might not be
# VenvExecDir if specified on the command line.
if ($VenvDir) {
Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values"
}
else {
Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir."
$VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/")
Write-Verbose "VenvDir=$VenvDir"
}
# Next, read the `pyvenv.cfg` file to determine any required value such
# as `prompt`.
$pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir
# Next, set the prompt from the command line, or the config file, or
# just use the name of the virtual environment folder.
if ($Prompt) {
Write-Verbose "Prompt specified as argument, using '$Prompt'"
}
else {
Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value"
if ($pyvenvCfg -and $pyvenvCfg['prompt']) {
Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'"
$Prompt = $pyvenvCfg['prompt'];
}
else {
Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)"
Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'"
$Prompt = Split-Path -Path $venvDir -Leaf
}
}
Write-Verbose "Prompt = '$Prompt'"
Write-Verbose "VenvDir='$VenvDir'"
# Deactivate any currently active virtual environment, but leave the
# deactivate function in place.
deactivate -nondestructive
# Now set the environment variable VIRTUAL_ENV, used by many tools to determine
# that there is an activated venv.
$env:VIRTUAL_ENV = $VenvDir
if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) {
Write-Verbose "Setting prompt to '$Prompt'"
# Set the prompt to include the env name
# Make sure _OLD_VIRTUAL_PROMPT is global
function global:_OLD_VIRTUAL_PROMPT { "" }
Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT
New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt
function global:prompt {
Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) "
_OLD_VIRTUAL_PROMPT
}
$env:VIRTUAL_ENV_PROMPT = $Prompt
}
# Clear PYTHONHOME
if (Test-Path -Path Env:PYTHONHOME) {
Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME
Remove-Item -Path Env:PYTHONHOME
}
# Add the venv to the PATH
Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH
$Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH"
# SIG # Begin signature block
# MIIvJAYJKoZIhvcNAQcCoIIvFTCCLxECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBnL745ElCYk8vk
# dBtMuQhLeWJ3ZGfzKW4DHCYzAn+QB6CCE8MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw
# CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x
# IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ
# eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7
# uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx
# xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb
# D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA
# GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm
# SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA
# LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1
# HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc
# eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w
# tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B
# Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj
# ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E
# FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM
# MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI
# QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex
# LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v
# d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI
# hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N
# s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA
# 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2
# de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O
# q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd
# I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50
# jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU
# 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq
# rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs
# M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa
# 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa
# tzCCGrMCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT
# QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl
# AwQCAQUAoIHIMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC
# AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBnAZ6P7YvTwq0fbF62
# o7E75R0LxsW5OtyYiFESQckLhjBcBgorBgEEAYI3AgEMMU4wTKBGgEQAQgB1AGkA
# bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAxAC4AOABfADIAMAAyADQA
# MAAyADAANgAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIADnAr0mBnpSQshcvb
# heUYhuL+Zw+As+KzbU0/onLW+f2snIyPi0L8M+ivZDE0eEkEK4s5gCigAnLy3gLI
# dJobJ8LDzJutQ/Oy22PNdfLTZPDKBXmDePJF7yAJ3dYTcmVey/DW056gM2gNk9Rs
# MINw01Q0FnWq2EdZ1mFHqhKhrucNIH5YxiDRUC1/khyrO40Vm5Byux/dSIlik4Rm
# TVKnl+atMtC1MJsccvQHOH5NeqO4huuWWIDzaQqq1DXeZITZvNHANqJ9oqiENy5v
# R3i+tjQX8aQreVFcIFAXSU2JGw0SZJCtQ6phm6/uMV11PVLr1pN8NgNfVwhNAHaX
# xnDbRTUh3E+zoNd8+aN60Vm/JzaREjwaMRMGjQ97ntREKbuRb8R+0cbfzRF2Pp9k
# 1ypb2gXPl8jAP0w0J8lzoZV28qb39AoP/uanYLB59vKlUxdNB3mGyGlWfu3SEJw5
# ha7Pbc8uYMBu7Zn3lM/ZTrbx5P0ay1xngifWEoVSQTfB9TVeSKqUIrUw92oEMRA4
# ezVSNGs0w1SALmCkOHIGNW/ynA7FF7rj1lGe71OR8B5DlHe9fsg/a7+JqTqY87ua
# SK4oaONbyZhjAZm1Epv47ZT/wvV3BGY033UzBqBjn0ZTDkJzDJ+01q6LX4EDfSkd
# TKma4k0EiRn/j97yiQkvyrWqOmehghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghco
# BgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3
# DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgqV0Q
# MCSfxogSBrE/2Jtt0SbA9y8jfJrkQeSm3dNpsXcCEQCJ9ksSNefY1I5FCP7QplMI
# GA8yMDI0MDIwNjIyMzcwMFqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/
# X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAx
# MzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMu
# MSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOX
# ejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbj
# aedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7
# ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PB
# uOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu
# 6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769Sg
# LDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUG
# FOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZc
# ClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmh
# cbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U2
# 0clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qD
# y0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAW
# BgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglg
# hkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0O
# BBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6
# Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEy
# NTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZT
# SEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6g
# qbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s
# 1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0q
# BXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp4
# 4pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6w
# QSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4Z
# iQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wn
# LEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5Adza
# ROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy
# 0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDA
# dwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2Xl
# G3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRU
# fNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UE
# ChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYD
# VQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcN
# MzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs
# IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy
# NTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC
# AgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+k
# iPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+va
# PcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RB
# idx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn
# 7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAx
# E6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB
# 3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNC
# aJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklS
# UPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP
# 015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXi
# YKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZ
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCP
# nshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQE
# AwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYB
# BQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0
# cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5j
# cnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJ
# YIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULh
# sBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAl
# NDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XN
# Q1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ
# 8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDn
# mPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsd
# CEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcm
# a+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+
# 8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6
# KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAj
# fwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucT
# Dh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJ
# KoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IElu
# YzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQg
# QXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1
# OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UE
# CxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBS
# b290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+Rd
# SjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20d
# q7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7f
# gvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRA
# X7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raR
# mECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzU
# vK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2
# mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkr
# fsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaA
# sPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxf
# jT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEe
# xcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQF
# MAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaA
# FEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcB
# AQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggr
# BgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNz
# dXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5k
# aWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQK
# MAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3
# v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy
# 3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cn
# RNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3
# WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2
# zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGC
# A3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ
# bmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2
# IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEF
# AKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8X
# DTI0MDIwNjIyMzcwMFowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+C
# Xc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEIP3CVflgfyYCpuc6KYJIRj93U8EY
# Y31YCwfzWAlsRsj8MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRA
# V2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICACy9XR4vL0AD
# nXdZ3nkMxqSLbMDznrzCsJ2lg8tZpdyrr2cfzBv8oSoR0LIfj1l/4AvghwQOnBQY
# peAi4htRIBph93IsDTBmzry1pUt25ZQVGL4bH8oNCdbNjYusrHiFsmHb9awCZ83Y
# Z/qJkC3M1tmg7RDeddQ0MXzeYoXzN6Xf+TqbRj8Ti4y8luPDi6PUO4Qz1TRznTYj
# ULRQJ8DHPaIF+XWMvEA4CFZQTeNej2aJg0TSC9fRWHRVc0TJ7HKQBJT9sDdf9EO7
# iw0wd4j5TjLYdl5yxIkKkgVkqCZgmwSAPumb7q2e1B/PGjJPnWcydJRxtH5t6ZZh
# u0R916vYMrjpI3qgPUL/kYuiXnJ4VefN64ocB7SqdBp+LDXPXYU01SVbim/OPjxN
# KSJRoGn1/6CBbT/22xWjj3O9ebIEeZivM5utRitsePPE81vIQ9Zc5j2DxMYUwxHg
# C3cBv6eoqruDbzi6xKpGtVsJxXgIfYidg6m5VZFk7BgNJCiyGDfCl3+OsG3lSt6Z
# /Ed1P5wE4LHwp1tAzvwZ/kWfL1Vilq2/UJtfivxR863/wHSr9n6Pzq63mfcdKxH7
# 6rMakA2CXnKZrCcmeqh6c1dsAJRH3UE2jtAF7Ckei7OxJyxcr1IUjYynqKUObDK1
# eorpTzvx7xgHeYHRMQvZhz2W0c0QQWRZ
# SIG # End signature block
|
combined_dataset/train/non-malicious/831.ps1
|
831.ps1
|
$cred = Get-Credential
New-AzVmss `
-ResourceGroupName "myResourceGroup" `
-VMScaleSetName "myScaleSet" `
-Location "EastUS" `
-VirtualNetworkName "myVnet" `
-SubnetName "mySubnet" `
-PublicIpAddressName "myPublicIPAddress" `
-LoadBalancerName "myLoadBalancer" `
-Credential $cred `
-UpgradePolicyMode "Automatic" `
-DataDiskSizeInGb 64,128
$vmss = Get-AzVmss `
-ResourceGroupName "myResourceGroup" `
-VMScaleSetName "myScaleSet"
$publicSettings = @{
"fileUris" = (,"https://raw.githubusercontent.com/Azure-Samples/compute-automation-configurations/master/prepare_vm_disks.ps1");
"commandToExecute" = "powershell -ExecutionPolicy Unrestricted -File prepare_vm_disks.ps1"
}
Add-AzVmssExtension -VirtualMachineScaleSet $vmss `
-Name "customScript" `
-Publisher "Microsoft.Compute" `
-Type "CustomScriptExtension" `
-TypeHandlerVersion 1.8 `
-Setting $publicSettings
Update-AzVmss `
-ResourceGroupName "myResourceGroup" `
-Name "myScaleSet" `
-VirtualMachineScaleSet $vmss
|
combined_dataset/train/non-malicious/2967.ps1
|
2967.ps1
|
$nugetBinPath = Join-Path -Path $env:ChocolateyInstall -ChildPath 'bin'
$packageBatFileName = Join-Path -Path $nugetBinPath -ChildPath 'psake.bat'
Remove-Module -Name [p]sake -Verbose:$false
Remove-Item -Path $packageBatFileName -Force -Confirm:$false
Write-Host 'PSake has been uninstalled'
|
combined_dataset/train/non-malicious/sample_57_98.ps1
|
sample_57_98.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $Force,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $NoCleanupOnFailure,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $BypassUpgradeStateValidation,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $FabricIsPreInstalled,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[int] $TimeoutInSeconds,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`""
# special case for older powershell versions < 5
if ($PSVersionTable.PSVersion.Major -lt 5)
{
$DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`""
}
Write-Host "running autoextractor command: $DCAutoExtractorCommand"
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if ((Test-Path variable:FabricRuntimePackagePath) `
-and ![string]::IsNullOrEmpty($FabricRuntimePackagePath))
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath"
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath"
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
if (!(Test-Path variable:TimeoutInSeconds) `
-or ($TimeoutInSeconds -le 0))
{
$TimeoutInSeconds = 300
Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds."
}
$parentVerbosePreference = $VerbosePreference
# Invoke in separate AppDomain
if($X509Credential)
{
Write-Verbose "X509Credential: $X509Credential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $false;
"X509Credential" = $true;
"ServerCertThumbprint" = $ServerCertThumbprint;
"StoreLocation" = $StoreLocation;
"StoreName" = $StoreName;
"FindValueThumbprint" = $FindValueThumbprint;
}
}
else
{
if($WindowsCredential)
{
Write-Verbose "WindowsCredential: $WindowsCredential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $true;
}
}
else
{
Write-Verbose "Not X509Credential nor WindowsCredential."
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
}
}
}
if ($parentVerbosePreference -ne "SilentlyContinue")
{
$argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" }
}
$standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt"
if (Test-Path $standaloneArgsFilepath)
{
Remove-Item $standaloneArgsFilepath -Force 2> $null
}
$argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" }
$standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath
$shelloutArgs = @( $standaloneArgsFilepath )
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $ParamFilepath
)
Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object {
$var = $_.Split('=')
if ($var.Length -eq 2)
{
New-Variable -Name $var[0] -Value $var[1] -Force
}
}
Remove-Item $ParamFilepath -Force 2> $null
if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false}
if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false}
if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false}
if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false}
if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false}
if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false}
if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); }
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint"
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
}
Catch
{
Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
if ($ClusterConnection -eq $null) {
Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($FabricIsPreInstalled)
{
Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine."
}
elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) `
-or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath))
{
Try
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
}
Catch
{
Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
if ($BypassUpgradeStateValidation)
{
Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red
}
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
Try
{
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if (!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if ($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
}
#Add Node to an existing cluster
Try
{
$AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds)
$AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration
Get-ServiceFabricNode | ft
$VerbosePreference = $parentVerbosePreference
$params = @{
'NodeName' = $NodeName;
'NodeType' = $NodeType;
'IpAddressOrFQDN' = $NodeIpAddressOrFQDN;
'UpgradeDomain' = $UpgradeDomain;
'FaultDomain' = $FaultDomain;
'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath;
'NoCleanupOnFailure' = $NoCleanupOnFailure;
'Force' = $Force;
'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation;
'FabricIsPreInstalled' = $FabricIsPreInstalled;
}
if ((Test-Path variable:TimeoutInSeconds) `
-and ($TimeoutInSeconds -gt 0))
{
$params += @{'TimeoutSec' = $TimeoutInSeconds;}
}
Write-Host "Adding Node $NodeName"
Add-ServiceFabricNode @params
Write-Host "Waiting for node to join cluster." -NoNewline
$nodeJoined=$false
$firstRun=$true
do
{
if (!$nodeJoined -and !$firstRun)
{
Write-Host "." -NoNewline
Start-Sleep -s 10
}
$result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 }
$nodeJoined=$result.Count -gt 0
$firstRun=$false
} while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout))
Write-Host "" # Newline
if(-not $nodeJoined)
{
Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red
exit 1
}
Get-ServiceFabricNode | ft
Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green
}
Catch
{
if($VerbosePreference -eq "SilentlyContinue")
{
Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red
}
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $shelloutArgs -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr
# XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF
# cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAd907ALwOFz+0066D2KBDUMbSKEoiRB+FPi9NTiYmG0UF2TEruWymfGb2
# LvNdYA3CyRrokT6Ob7RyJcxExpdSjC7NGHtrrnM12f3k0mDVKXYC38xRoXxBZmV8
# f8cNjg0CFFCqVv5hWq5XoGDgJY1GR6hwq2WCU8yWyQ3dooH6kvlgwkgC7scTjAFh
# 8RXE7Mty1KDDfW0ab34oPrYDZ4O9wa4U8zcjHxnkXFscmvlNGudcr787FNzGIIrk
# G0UYXbh1eA1aASAXMcbIiPL6/uJwFr2NOPrazyWeeX7/ID578XgJI82KQGd8hwxk
# XF3kMnMFTx81GneYWWhWviue7iCnF6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCknY32Zz9RgMMmrp2e08tIikHcxjgKrRHYDwgfXUfzbwIGZhfuHMxP
# GBMyMDI0MDQyNjAxNTIzMy41NDVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dTgTDAiGA8yMDI0MDQyNTEzNTk0
# MFoYDzIwMjQwNDI2MTM1OTQwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp1OBM
# AgEAMAcCAQACAhnNMAcCAQACAhNSMAoCBQDp1jHMAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAB3+2BIQ+5QNhlR/FpnbO7ZRVa0GEUCYZdatfND5AT0OeybJ
# Ao7USU8bYIh625p6i+2XAE3NkyZJ9YdDjzTLDdWBvY2GrLzi66rcCrNO5bFmAS1w
# /MS4Mwx/vFUUu2AqL0ogerXlVaiW9QSUKK9W0xPyEx4oOHYUmZqvlUwRsiSQNrQz
# SuygEc4I3D33i+GKgNuA07rx/MOH+VCEmW+fNHas2Y9L+w4bFhZsGjeuLJRMZC3B
# qkUvcu6fzGpZRXouOUqgcuO4kZqa5XBEm73inAno84k3jKTFgWtoiIUDJuUA+Y3P
# 7nM5H6kPO/iN4FqVFQI09L8LaslsWM/OjW4yTDsxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCACb8xzT68o1zEDTDQ2oPD6dA6fvceURlwPLYICgdj7tjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib
# t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgez2VZNV79jt3XboGQdmOW5Q/+jKS
# ck2vsYS8iZLC8a8wDQYJKoZIhvcNAQELBQAEggIAGCozgrT6IS/YZf4RF5z7gAjv
# 5NqD6uCbg92Q6efjJ4Rr8YZnLXeeTfdY7kwxyXPf1jfpTkw58CBp/VTDK14DJzh9
# BuLHFnyURjozlPghnG0dAuOzRVpKyG0Lgs3fUj+T8jZDdvfh6jpWnvFCr4YTZeQk
# wJTjJGKKO9xcyeeNf+L/EWWxp5L1vHcXeVQzV66gcWEbwIh1Z22NWFDfGHmI6VaS
# KGu70psOIzeSwEfMTbxMeJBgMwDYB7kcstZf4DheApJ5kPq6KFf1wGEWy37YwneM
# diX/u42wnNaVcCWlaftpjd2zHlOCFyF9L9ARh7YzfpVp1YNTMcj75qZQ5b84CE72
# g9p8uMpXuNbmr2NTk/n7Gm8WI6Ni4PQl76m8i/wBNUTdIjDq/CNVBesvnGDn+Gl/
# siam19tnZ6IRX92yRyqhxfoPsMSoZCfoDUv5yey/LtR7OW0CGb4BsFmibflXbSHI
# IiEoCFVSLWMqrK+2TJ+5FG5kwB9xRYV9R7ad8ephu+/XAjqmwu3kJ9q5He+vtP+P
# t5QxeAqpo1zyEWu/bIytFBqnBECNlnFILssvdQKhqi0htUkkOy3LZfnktNEE5m7t
# HduB3HDy+nhjeDyLFxi5noDMq4R70ZPFQn8OMGI3iVf7RfzQSGov5V7Kid+ekSNF
# s+XvpwSmaWxStQ4jtGY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_13_28.ps1
|
sample_13_28.ps1
|
ConvertFrom-StringData @'
id_dirs=Collecting Directory Output
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDRy8kiReDoGdLC
# nmSgV1SViLYbdod1BeCf8iKRZsAJtqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBwB
# ZDzd/IrSeeruLyCzZiqCAvZKGi1ApCKiuD7chcsIMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAZtGcrd0+tY4usurqqCX+xfKvLXHtdQSQnTFP
# m7u6E/v1izNTFC7ZjhQZjd/L9mbXmCjb4f+9wDLCdGR4QQoePp5kyMLkmcy2GWbo
# AGQJgunjdS3Twv2UhfZmWpe7TkQxydZuck5xd4EX1r8g0zdVBc9bMlPplVNftOLy
# tuDEr6MQWh4z4I2diFtgtdwqlAywDJAthsVXgqU1RaG8iF0E9Sb94KOuMr2yIROf
# 43hEtGSe3HnHkoKKi4dbF2qHNQIfJ0b6dz0Si8a7PDaGTHtBh0sATGMkzJ0p93lS
# uFQxg3qq43RNIQiB8q2OqIz/cIwNRX5W1GarvXFU49luMB0tYqGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCm5CJj8meudkiiZ+1tUol6WZsmMR1Dn49u
# vGi6ufHIfwIGZut+oGF8GBMyMDI0MTAyODExNDA0MS40MjZaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big
# r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF
# RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts
# urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF
# 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83
# 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ
# t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l
# RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT
# shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+
# vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7
# 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A
# SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt
# weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc
# D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL
# 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO
# RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H
# WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn
# jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va
# iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC
# 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K
# tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW
# wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w
# fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0
# MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA
# AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l
# eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L
# fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M
# Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a
# tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao
# 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgQAEbR2o6Z0O2ZqRgmkfVo836d1HJm1HoCWlGfuvKOGMwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3
# d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU
# R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAIaHRV5jbKejQs0Y+CU8XmdbyojZOL0e
# E81EkTTvayD7SzrYEVzdp4gjlgrfjY49YrdFvP53p73VpwWBK/YhOV4Ii0iSXWDF
# XLKsb93aduoCEiFpOdsv6jBrDJB61zG5WQxDoS2hIuvFW5W3Lgj2oEgRWsK9FdV6
# dTWQgcadz7HBzEvVf3nNVXUi6uaSCrGsFIrwkfSpYJywj4CWa1mNRlz8FmU4AZzp
# m9JDWYKDzjCjvB56KbM0IvkQtAm3e6XQPNtpy6+iWT/3ESkFvp7Wd4R78zRMmIEk
# rfEfQB6nVhhn0KZNUe/fBYpfvOd9ncDzzMr6aQ93JiLmkbi6KqzcApHjTSR/NC/p
# mbz6sAjTBYxLTRZHMpRT0kFQzhqmadp1Nl/STWXlGVOwtRIs0qBv5lwYQ41JkD5u
# 4nQG1IorPHEzEryB3rhmWWDMCbp1WNc+pET3j9qmiAGdLvXe+RpxbnJ+8k1NgQsg
# vH7qWc41fEv4TuVXhUaew8p5srBFSyeCC1cA8BWqbB3ynroVRaBMuLZo/9FirCK0
# kklZfBiTbW2/wLY9dXtO7W/k89a6/waZOv5X6MsYELuODCDAlheVDMcq/t38h7Gm
# QXwTQ6PDV0Bn10S+YoBLLj1uWNOaO7ZzjoUl4HctXBlTzzKiqvqr3NgktSbuab/T
# oldl5wZYej3h
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_14_17.ps1
|
sample_14_17.ps1
|
#************************************************
# DC_Setup_AppCompat.ps1
# Version 1.0
# Date: 2009-2019
# Author: Walter Eder (waltere@microsoft.com)
# Description: Collects additional AppCompat information.
# Called from: TS_AutoAddCommands_Setup.ps1
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $ScriptVariable.ID_CTSAddonsDescription
$sectionDescription = "Additional Components"
# detect OS version
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
function isOSVersionAffected
{
if ([int]$bn -gt [int](9600))
{
return $true
}
else
{
return $false
}
}
function RunNet ([string]$NetCommandToExecute="")
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSSMBClient -Status "net $NetCommandToExecute"
$NetCommandToExecuteLength = $NetCommandToExecute.Length + 6
"`n`n`n" + "=" * ($NetCommandToExecuteLength) + "`r`n" + "net $NetCommandToExecute" + "`r`n" + "=" * ($NetCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c net.exe " + $NetCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
"`n`n`n" | Out-File -FilePath $OutputFile -append
}
function RunPS ([string]$RunPScmd="", [switch]$ft)
{
$RunPScmdLength = $RunPScmd.Length
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
"$RunPScmd" | Out-File -FilePath $OutputFile -append
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
if ($ft)
{
# This format-table expression is useful to make sure that wide ft output works correctly
Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append
}
else
{
Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append
}
"`n`n`n" | Out-File -FilePath $OutputFile -append
}
<#----------Copy Components Registry hive -- done in DC_ServicingLogs.ps1
# $ComponentsHivOutputFileName = Join-Path $pwd.path ($ComputerName + "_reg_Components.HIV")
# copy $ENV:windir\system32\config\components $ComponentsHivOutputFileName /y
$sectionDescription = "Additional Components Registry hive"
$OutputFile = $ComputerName + "_reg_Components.HIV"
$ComponentsHiv = "$ENV:windir\system32\config\components"
if (test-path $ComponentsHiv)
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Copy $ComponentsHiv"
Copy-Item -Path $ComponentsHiv -Destination $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "Components Registry hive file" -SectionDescription $sectionDescription
}
else
{
"$ComponentsHiv Does not exist" | WriteTo-StdOut
}
#>
#--- Section for things that need to be started early, will check at end of this script if Process has terminated
if (isOSVersionAffected)
{ #write-host -fore cyan "BN=$bn isOSVersionAffected2=True "
$sectionDescription = "Additional Components DXdiag"
$dxdiagOutputFileName = Join-Path $pwd.path ($ComputerName + "_dxdiag.txt")
$CommandToRun = "dxdiag /t $dxdiagoutputFileName"
RunCMD -commandToRun $CommandToRun -collectFiles $true
#dxdiag takes some number of seconds to write output after completion. -- will check at end
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "...running: dxdiag /t "
#$dxdiagID = (Get-Process dxdiag).id
<# $i = 0
$maxWasitSec=40
while (-not (Test-Path $dxdiagOutputFileName))
{
$i++
if ($i -ge $maxWasitSec)
{
"[error]: waited for $maxWasitSec seconds for dxdiag output, giving up." | WriteTo-StdOut
break
}
Start-Sleep 1
}
collectfiles -filesToCollect $dxdiagOutputFileName -fileDescription "dxdiag output" -sectionDescription "Additional Components DXdiag"
#>
}
#--- Section for App Compat Info Only run if flag set
Write-Host "$(Get-Date -UFormat "%R:%S") : Compress App Compat AppPatch Log files"
# Command: All logs in %windir%\AppPatch*\CompatAdmin.log
$sectiondescription = "Compress AppPatch files"
$logFilePath = (join-path $env:SystemRoot "AppPatch\CompatAdmin.log")
if (test-path $logFilePath)
{ Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $sectiondescription
CompressCollectFiles -filesToCollect $logFilePath -Recursive -fileDescription "App Compat Log Files" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_logs.zip" -RenameOutput $true
}
else
{
"$logFilePath Does not exist" | WriteTo-StdOut
}
$sectiondescription = "Compress AppPatch64 files"
$logFilePath = (join-path $env:SystemRoot "AppPatch64\CompatAdmin.log")
if (test-path $logFilePath)
{ Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $sectiondescription
CompressCollectFiles -filesToCollect $logFilePath -Recursive -fileDescription "App Compat 64 Log Files" -sectionDescription $sectiondescription -DestinationFileName "AppCompat64_logs.zip" -RenameOutput $true
}
else
{
"$logFilePath Does not exist" | WriteTo-StdOut
}
#----------Event Logs
Write-Host "$(Get-Date -UFormat "%R:%S") : App Compat EventLogs"
$sectiondescription = "Get EventLog files"
# Command: All App Compat EventLogs in %windir%\System32\Winevt\Logs
# OutputFileName: AppCompat_*_EventLogs.zip
if (test-path $env:SystemRoot\System32\Winevt\Logs\*compatibility*.evtx)
{ Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription compatibility*.evtx"
CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*compatibility*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_compatibility_EventLogs.zip" -RenameOutput $true
}
if (test-path $env:SystemRoot\System32\Winevt\Logs\*inventory*.evtx)
{ Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription *inventory*.evtx"
CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*inventory*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_inventory_EventLogs.zip" -RenameOutput $true
}
if (test-path $env:SystemRoot\System32\Winevt\Logs\*program-telemetry*.evtx)
{ Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription *program-telemetry*.evtx"
CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*program-telemetry*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_program-telemetry_EventLogs.zip" -RenameOutput $true
}
#----------Dir Outputs
Write-Host "$(Get-Date -UFormat "%R:%S") : Directory outputs"
$sectionDescription = "Dir C:\Program Files\"
$OutputFile = Join-Path $pwd.path ($ComputerName + "_AppCompat_Dir_ProgramFiles.txt")
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription"
# RunPS "get-Childitem $ENV:Programfiles -recurse -Exclude *Defender*,*ScriptStore*,*CSC*,*RtBackup* -ErrorAction SilentlyContinue"
$CommandToExecute = 'dir /a /s "C:\Program Files\" '
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
collectfiles -filesToCollect $OutputFile -fileDescription "App Compat: Dir C:\Program Files\ output" -sectionDescription $sectionDescription
$sectionDescription = "Dir C:\Program Files (x86)\"
$OutputFile = Join-Path $pwd.path ($ComputerName + "_AppCompat_Dir_ProgramFilesx86.txt")
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription"
$CommandToExecute = 'dir /a /s "C:\Program Files (x86)" '
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
collectfiles -filesToCollect $OutputFile -fileDescription "App Compat: Dir C:\Program Files (x86)\ output" -sectionDescription $sectionDescription
#----------Registry
Write-Host "$(Get-Date -UFormat "%R:%S") : Registry outputs, will take minutes..."
$AppCompatFlagsKeyHKLM = 'HKLM\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags'
$OutputFile= $ComputerName + "_AppCompatFlags_Reg_HKLM.txt"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get AppCompatFlags_Reg_HKLM file"
RegQuery -RegistryKeys $AppCompatFlagsKeyHKLM -OutputFile $OutputFile -fileDescription "AppCompatFlags HKLM Reg key" -Recursive $true
$AppCompatFlagsKeyHKCU = 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags'
$OutputFile= $ComputerName + "_AppCompatFlags_Reg_HKCU.txt"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get AppCompatFlags_Reg_HKCU file"
RegQuery -RegistryKeys $AppCompatFlagsKeyHKCU -OutputFile $OutputFile -fileDescription "AppCompatFlags HKCU Reg key" -Recursive $true
$InstallerKey = 'HKLM\Software\Microsoft\Windows\CurrentVersion\Installer'
$OutputFile= $ComputerName + "_AppCompat_Reg_WindowsInstaller.txt"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg_WindowsInstaller file"
RegQuery -RegistryKeys $Installerkey -OutputFile $OutputFile -fileDescription "Installer Reg key" -Recursive $true
<# $HKCUsoftwareKey = 'HKCU\Software'
$OutputFile= $ComputerName + "_reg_HKCU_CurrentUser-Software.txt"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get HKCU\Software TXT file"
RegQuery -RegistryKeys $HKCUsoftwareKey -OutputFile $OutputFile -fileDescription "Reg_CurrentUser-Software Hive TXT file" -Recursive $true
$HKLMsoftwareKey = 'HKLM\Software'
$OutputFile= $ComputerName + "_reg_HKLM_LocalMachine-Software.txt"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get HKLM\Software TXT file"
RegQuery -RegistryKeys $HKLMsoftwareKey -OutputFile $OutputFile -fileDescription "Reg_LocalMachine-Software Hive TXT file" -Recursive $true
#>
# much faster to collect .HIV instead of RegQuery / REG EXPORT
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg Software-User.HIV"
$OutputFile= $MachineName + "__reg_HKCU-Software-User.HIV"
RegSave -RegistryKey "HKCU\Software" -OutputFile $OutputFile -fileDescription "HKCU-Software-User Hive"
Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg Software.HIV"
$OutputFile= $MachineName + "__reg_HKLM-Software.HIV"
RegSave -RegistryKey "HKLM\Software" -OutputFile $OutputFile -fileDescription "HKLM-Software Hive"
#----------End section
Write-Host "$(Get-Date -UFormat "%R:%S") : App Compat end section"
# Waiting until Process DXdiag completes
if (Get-Process -Name DXdiag -EA SilentlyContinue) {
Write-Host "$(Get-Date -UFormat "%R:%S") ...waiting max 40 seconds on DXdiag $dxdiagID to complete"
#Wait-Process -Id $dxdiagID -Timeout 40 -EA SilentlyContinue
Wait-Process -Name DXdiag -Timeout 40 -EA SilentlyContinue
collectfiles -filesToCollect $dxdiagOutputFileName -fileDescription "dxdiag output" -sectionDescription "Additional Components DXdiag"
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCznXlu9o0GFfxx
# 1e1OkTSbX89dXBQE9ROkiXgMVmGuV6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILz68MxFHsijqyhdgkQShjuu
# Pebt9FgNRMk8f1bqy2WuMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArJc2QRtVMZg0Xwj9ny2cTET+1ItMnWKju8F2Muf+MO06l1QHX6ElEfD2
# ZHu6WzM/8dbG04tSIPjyf9t+CjZOXhXDcKjcHxw+9AbZ7Vpy+gfejU2nLRExqanJ
# Gd/s+h6vS01cTj7uQ/5zjQP6SQAumqP7II02VHl/gux2pOTglOllAm3e4GH7/6+M
# o9YAwGquWSwrxM1zSDrtvoNl15t/QmEIoHdU7uGilK2QqVlXpoDGKBD6tx1TRdsN
# 9l9dB2AeHmUkXtr7/3t3mOPIo8Jw42lQ9JDALzAwhJvCrHQ4C69zjcweRUWCBFLS
# JmEKOydOmaLavIFfo/jB1soKEkvFwaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDpsueeEbDYwTyJLpYOni8uopWNHIVBEokYZL/YeLerjgIGZxpym1wP
# GBMyMDI0MTAyODExNDA0Mi41OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAiGA8yMDI0MTAyODA0MTQx
# N1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyY4Z
# AgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlmEUSqsB1JFEW74Yh1oAnU
# ZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apWF7OLJj+IzfERluG9wFcn
# KZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2JA5g0hP9oaR70WD/wOq0P
# R+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1vNThkBK0cQg8uhyBgCm7A
# sGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHSlmMTGuAFMVHbFFtVtBr3
# X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDZbGC1q166c4AiUTgQFWUXu37JMc63h5Riqa2y1BkU+TCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5TmSmMHedwiqAcbeNSpfnby
# e1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIATuThsm1Bqv7+rPoekoujar0S
# UcKNkkQiywyHKcACDSbBIwXS909N4bSsOAUfisIH+q/maK0H0n+Q1JfVo7U0x4bD
# /OUEAjLYahh0JZucIcOmNaiqMAH/BdFPZVFfETfU+E8GJ+89INyUm8sA6mUAjtj+
# iBTaebfrMTv6NQ5crG+udgY91qLZ12lshMNYfjexZSF1Qome0T5OHY2SyWy3r6f0
# 5NoroikKv/2bZpO3t2ARlcNTbbwSbWNQ6QNMhMpYVh1LHTqtUTovKOOqyMlTWs8l
# 4niWJnl0P880nymi9hpkuLq9Gd4la8+fHlNMi/66Ul56kuXa4RGbeF/UGv3K8xXW
# qAjdp+uyRNgMiOIravOegW+dcwJssX+mpQmOcrKiD43M6c7+QUd4ajtNTQwQL6Sn
# IcjginHrMSyNorxBH48rsxb+3PJeLp+/6c1A1tSEzdMJLh2Ov7AML10/AkZpkmlZ
# lP/OHiZtnK+It11efbS+C8cLi1YUYibKWXlZl8tDcYgORJ/LTZNFMufcARKClkbI
# AcmqJwtFRiyLRrSa2it8Ba8l6H1nLkYnw7lg62HRE0XifTZ7c/qiM1ZD43KsMbVw
# 7pP2utvd8kMVDUPKSFPLiNhJncE3CyqTLVOAoGXbB1ovt7Hdfis48ANguoZ/4VnA
# joKwuJjmYr1nI50MuyY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Check Server Health.ps1
|
Check Server Health.ps1
|
########################################################
# Created by Brian English
# Brian.English@charlottefl.com
# eddiephoenix@gmail.com
#
# for Charlotte County Government
# No warranty suggested or implied
########################################################
# Purpose: Check Server Service Health
########################################################
# Notes: For checking Vmware to work you must have the VMWare ToolKit for windows installed
# For checking Citrix to work you must have the MPSSDK intalled
# For checking DNS to work you must have dcdiag in your path
########################################################
#input params
param($Server)
#################
#other variables
#################
$GLOBAL:priority="normal"
$FreePercent = 5
$date = date
#################
#turn off error handling
#$SavedEA=$Global:ErrorActionPreference
#$Global:ErrorActionPreference="SilentlyContinue"
$inAry = @($input)
if($inAry.count -gt 0)
{$server = $inary}
#############
function checkSystem()
{ $status = "`nChecking Server Systems"
for($i = 0; $i -lt @($Server).count; $i++ )
{ $srv = @($Server)[$i]
$checkVMWare = $false
$checkDNS = $false
$checkDHCP = $false
$checkShares = $false
$checkExc = $false
$checkCitrix = $false
$checkIIS = $false
write-progress "Checking Server Systems: $srv "-> -perc ($i * (100/@($Server).count))
$status += "`n***$srv***"
$errcnt = 0
$error.clear()
if((ping-computer "$srv").protocoladdress -ne "")
{
if((gwmi -computername $srv win32_computersystem).dnshostname -ne $srv -or (gwmi -computername $srv win32_computersystem).name -ne $srv)
{ $status += "`n`t! ServerName does not match"
$errcnt += 1
}
foreach($drive in(gwmi win32_logicaldisk -computername $srv | where{$_.Drivetype -like "3"}))
{ if((($drive.freespace/1gb)/($drive.size/1gb) * 100 ) -lt $FreePercent)
{ $status += "`n`t! Drive: " + $drive.deviceid + " Free Space: " + ($drive.freespace/ 1GB) + "GB"
$priority = "high"
$errcnt += 1
}
}
foreach($svc in(gwmi win32_service -computername $srv | where{$_.StartMode -like "Auto" -and $_.name -ne "SysmonLog"}))
{ if($svc.state -ne "Running")
{ $status += "`n`t! Service: " + $svc.DisplayName + " is " + $svc.state
$errcnt += 1
}
if($svc.name -eq "vpxd" -and $svc.state -eq "Running")
{$checkVMWare = $true}
if($svc.name -eq "DNS" -and $svc.state -eq "Running")
{$checkDNS = $true}
if($svc.name -eq "DHCPServer" -and $svc.state -eq "Running")
{$checkDHCP = $true}
if($svc.name -eq "lanmanserver" -and $svc.state -eq "Running")
{$checkShares = $true}
if($svc.name -eq "MSExchangeIS" -and $svc.state -eq "Running")
{$checkExc = $true}
if($svc.name -eq "cpsvc" -and $svc.state -eq "Running")
{$checkCitrix = $true}
if($svc.name -eq "IISADMIN" -and $svc.state -eq "Running")
{$checkIIS = $true}
}
if($checkVMWare)
{ $vi = get-esx $srv
$status += "`nHosts"
foreach($vmh in get-vmhost)
{ if($vmh.state -ne "Connected")
{ $status += "`n`t! Host: " + $vmh.Name + "; State: " + $vmh.state }
}
$status += "`nVMs"
$vms = (get-vm -server $vi)
$greenvms = 0
$status += "`n`tTotal VMs: " + $vms.count
$status += "`n`tVMs powered Off: " + ($vms | where{$_.PowerState -eq "PoweredOff"}).count
$status += "`n`tVMs powered On: " + ($vms | where{$_.PowerState -eq "PoweredOn"}).count
foreach($vm in ($vms | where{$_.PowerState -eq "PoweredOn"}))
{ $vmv = get-view $vm.id
if($vmv.Overallstatus -ne "green" -or $vmv.configstatus -ne "green") # -or $vmv.guestheartbeatstatus -ne "green")
{ $status += "`n`t`t" + $vm.name + " Overall: " + $vmv.overallStatus
$status += "`n`t`t" + $vm.name + " Config: " + $vmv.configStatus
$status += "`n`t`t" + $vm.name + " Heartbeat: " + $vmv.GuestHeartbeatStatus
foreach($alrm in $vmv.triggeredAlarmState)
{ $av = get-view $alrm.alarm
$status += "`n`t`t " + $vm.name + " Triggered: " + $av.info.Name
}
$priority = "high"
}
else
{$greenvms += 1}
}#for
$status += "`n`tGreen VMs: " + $greenvms + "`n"
}
if($checkDNS)
{ foreach($ln in (dcdiag /test:DNS /s:$srv /v))
{ if( $ln -like "*warning:*" -or $ln -like "*error:*")
{$status += "`n`t" + $ln.trim()}
}
foreach($ln in (dcdiag /test:CheckSecurityError /s:$srv /v))
{ if($ln -like "*warning:*" -or $ln -like "*error:*")
{$status += "`n`t" + $ln.trim()}
}
}#checkdns
if($checkDHCP)
{
##########################
#add code to check DHCP data
}#checkDHCP
if($checkShares)
{ foreach($share in (gwmi win32_share -computername $srv | where {$_.status -ne "OK"}))
{ $status += "`n`t! Share: " + $share.Name + " is " + $share.status
$errcnt += 1
}
}#checkShares
if($checkExc)
{ foreach($exc in (gwmi ExchangeConnectorState -namespace "root\\cimv2\\applications\\exchange" -computername $srv | where {$_.IsUp -ne $true}))
{ $status += "`n`t! Exchange Connector: " + $exc.Name + " is DOWN"
$errcnt += 1
}
foreach($exc in (gwmi ExchangeQueue -namespace "root\\cimv2\\applications\\exchange" -computername $srv | where {$_.NumberOfMessages -gt 1}))
{ $status += "`n`t! Exchange Queue: " + $exc.QueueName + " has " + $exc.NumberofMessages
$errcnt += 1
}
foreach($exc in (gwmi Exchange_Logon -namespace "root\\microsoftexchangev2" -computername $srv | where {$_.Latency -gt 60000}))
{ $status += "`n`t! Exchange Logons: " + $exc.MailboxDisplayName + " in Store " + $exc.StoreName + " has a latency of " + $exc.Latency
$errcnt += 1
}
}#checkExc
if($checkCitrix)
{ $mfserver = New-Object -com "MetaframeCom.MetaFrameServer"
$mfserver.initialize(6,$srv)
$status += "`n`t Sesion Count " + $mfserver.SessionCount
switch($mfserver.WinServerObject.EnableLogon)
{
"0" { $status += "`n`t! Not Allowing Connections"
$errcnt += 1
}
"1" {}
}
}#checkCitrix
if($checkIIS)
{ $pathToTest = "\\\\$srv\\c$\\windows\\system32\\inetsrv\\metabase.xml"
if(test-path $pathToTest)
{ $mb=[xml](get-content $pathToTest)
$WebSites = $mb.configuration.MBProperty.IIsWebServer
$WebVDirs = $mb.configuration.MBProperty.IIsWebVirtualDir
If(!($mb.configuration.MBProperty.IIsWebService.Custom | where {$_.name -eq "ServerComment"}).value)
{ $WebServerName = "[UNKNOWN]" }
Else
{ $WebServerName = ($mb.configuration.MBProperty.IIsWebService.Custom | where {$_.name -eq "ServerComment"}).value }
If($WebServerName -ne $srv)
{ $status += "`n`t! WebServer Name Mismatch $WebServerName, $srv"
$errcnt += 1
}
ForEach ($Site in $WebSites)
{ if($Site.ServerComment -notlike "Allows*")
{ $sitePath = "$srv" + ($site.location -replace "/LM","")
$siteState = ([ADSI]("IIS://$sitepath")).serverstate
if($siteState -ne "2")
{ switch($sitestate)
{ "1" {$siteState = "starting"}
"2" {$siteState = "started"}
"3" {$siteState = "stopping"}
"4" {$siteState = "stopped"}
"5" {$siteState = "pausing"}
"6" {$siteState = "paused"}
"7" {$siteState = "continuing"}
}
$status += "`n`t! " + $Site.ServerComment + " is not running: state " + $sitestate
$errcnt += 1
}
}
}
}
else
{ $status += "`n`t! Unable to verify IIS Metabase"
$errcnt += 1
}
}#checkIIS
}
else
{ $status += "`n`t! Server Unreachable"
$errcnt += 1
}
if($error[0])
{ $status += "`n`t Errors Occured: "
foreach($err in $error)
{ $status += "`n`t`!" + $err }
}
elseif($errCnt -eq 0)
{$status += "`n***$srv*** Healthy" }
else
{$status += "`n***$srv*** Unhealthy"}
$status
$status = ""
}#for
}#checkSystem
#############
########################################################
#Execute script
############
checkSystem
########################################################
#reset error handling
#$Global:ErrorActionPreference=$SavedEA
|
combined_dataset/train/non-malicious/sample_36_77.ps1
|
sample_36_77.ps1
|
#
# Module manifest for module 'OCI.PSModules.Rover'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Rover.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b3a22b9-6905-4ece-936d-982335059f13'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Rover Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Rover.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRoverCluster', 'Get-OCIRoverClusterCertificate',
'Get-OCIRoverClusterRoverBundleRequestsList',
'Get-OCIRoverClustersList', 'Get-OCIRoverEntitlement',
'Get-OCIRoverEntitlementsList', 'Get-OCIRoverNode',
'Get-OCIRoverNodeCertificate', 'Get-OCIRoverNodeEncryptionKey',
'Get-OCIRoverNodeGetRpt', 'Get-OCIRoverNodeRoverBundleRequestsList',
'Get-OCIRoverNodesList', 'Get-OCIRoverShapesList',
'Get-OCIRoverWorkRequest', 'Get-OCIRoverWorkRequestErrorsList',
'Get-OCIRoverWorkRequestLogsList', 'Get-OCIRoverWorkRequestsList',
'Invoke-OCIRoverRequestAdditionalNodes',
'Invoke-OCIRoverRequestBundleRoverCluster',
'Invoke-OCIRoverRequestBundleRoverNode',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverCluster',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverNode',
'Invoke-OCIRoverRetrieveBundleStatusRoverCluster',
'Invoke-OCIRoverRetrieveBundleStatusRoverNode',
'Invoke-OCIRoverRoverNodeActionRetrieveCaBundle',
'Invoke-OCIRoverRoverNodeActionSetKey',
'Invoke-OCIRoverRoverNodeGenerateCertificate',
'Invoke-OCIRoverRoverNodeRenewCertificate',
'Invoke-OCIRoverRoverNodeReplaceCertificateAuthority',
'Invoke-OCIRoverRoverNodeRetrieveLeafCertificate',
'Move-OCIRoverClusterCompartment',
'Move-OCIRoverEntitlementCompartment',
'Move-OCIRoverNodeCompartment', 'New-OCIRoverCluster',
'New-OCIRoverEntitlement', 'New-OCIRoverNode',
'Remove-OCIRoverCluster', 'Remove-OCIRoverEntitlement',
'Remove-OCIRoverNode', 'Stop-OCIRoverWorkRequest',
'Update-OCIRoverCluster', 'Update-OCIRoverEntitlement',
'Update-OCIRoverNode'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Rover'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3817.ps1
|
3817.ps1
|
function Test-AvailabilitySet
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$asetName = 'avs' + $rgname;
$nonDefaultUD = 2;
$nonDefaultFD = 3;
$job = New-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc -PlatformUpdateDomainCount $nonDefaultUD -PlatformFaultDomainCount $nonDefaultFD -Sku 'Classic' -Tag @{"a"="b"} -AsJob;
$result = $job | Wait-Job;
Assert-AreEqual "Completed" $result.State;
for($i = 0; $i -lt 200; $i++)
{
$avsetname = $asetName + $i;
New-AzAvailabilitySet -ResourceGroupName $rgname -Name $avsetname -Location $loc -PlatformUpdateDomainCount $nonDefaultUD -PlatformFaultDomainCount $nonDefaultFD -Sku 'Classic' -Tag @{"a"="b"};
}
$wildcardRgQuery = ($rgname -replace ".$") + "*"
$wildcardNameQuery = ($asetName -replace ".$") + "*"
$asets = Get-AzAvailabilitySet;
Assert-NotNull $asets;
Assert-True {$asets.Count -gt 200}
$asets = Get-AzAvailabilitySet -ResourceGroupName $rgname;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -ResourceGroupName $wildcardRgQuery;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -Name $wildcardNameQuery;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -Name $asetName;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -ResourceGroupName $wildcardRgQuery -Name $asetName;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -ResourceGroupName $wildcardRgQuery -Name $wildcardNameQuery;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$asets = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $wildcardNameQuery;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$aset = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-NotNull $aset;
Assert-AreEqual $aset.Name $asetName;
Assert-AreEqual $nonDefaultUD $aset.PlatformUpdateDomainCount;
Assert-AreEqual $nonDefaultFD $aset.PlatformFaultDomainCount;
Assert-AreEqual 'Classic' $aset.Sku;
Assert-AreEqual "b" $aset.Tags["a"];
$job = $aset | Update-AzAvailabilitySet -Sku 'Aligned' -AsJob;
$result = $job | Wait-Job;
Assert-AreEqual "Completed" $result.State;
$aset = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-NotNull $aset;
Assert-AreEqual $aset.Name $asetName;
Assert-AreEqual $nonDefaultUD $aset.PlatformUpdateDomainCount;
Assert-AreEqual $nonDefaultFD $aset.PlatformFaultDomainCount;
Assert-AreEqual 'Aligned' $aset.Sku;
$aset | Update-AzAvailabilitySet -Sku 'Aligned';
$aset = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-NotNull $aset;
Assert-AreEqual $aset.Name $asetName;
Assert-AreEqual $nonDefaultUD $aset.PlatformUpdateDomainCount;
Assert-AreEqual $nonDefaultFD $aset.PlatformFaultDomainCount;
Assert-AreEqual 'Aligned' $aset.Sku;
$job = Remove-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Force -AsJob;
$result = $job | Wait-Job;
Assert-AreEqual "Completed" $result.State;
$st = $job | Receive-Job;
$id = New-Object System.Guid;
Assert-True { [System.Guid]::TryParse($st.RequestId, [REF] $id) };
Assert-AreEqual "OK" $st.StatusCode;
Assert-AreEqual "OK" $st.ReasonPhrase;
Assert-True { $st.IsSuccessStatusCode };
$asets = Get-AzAvailabilitySet -ResourceGroupName $rgname;
$avset = $asets | ? {$_.Name -eq $asetName};
Assert-Null $avset;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-AvailabilitySetVM
{
$rgname = Get-ComputeTestResourceName
$passed = $false;
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$asetName = 'aset' + $rgname;
New-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc;
$aset = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
$vmsize = 'Standard_DS1_v2';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize -AvailabilitySetId $aset.Id;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage -DiskSizeInGB 200;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.OSDisk.DiskSizeGB 200;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = Set-AzVMSourceImage -VM $p -PublisherName $imgRef.PublisherName -Offer $imgRef.Offer -Skus $imgRef.Skus -Version $imgRef.Version;
Assert-NotNull $p.StorageProfile.ImageReference;
Assert-Null $p.StorageProfile.SourceImageId;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname;
Assert-AreEqual $vm.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $vm.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $vm.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $vm.StorageProfile.OSDisk.DiskSizeGB 200;
$aset = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-NotNull $aset.VirtualMachinesReferences;
Assert-True { $aset.VirtualMachinesReferences.Count -gt 0 };
Assert-AreEqual $vm.Id $aset.VirtualMachinesReferences[0].Id;
$asets = Get-AzAvailabilitySet -ResourceGroupName $rgname;
Assert-NotNull ($asets | ? {($_.VirtualMachinesReferences -ne $null) -and ($_.VirtualMachinesReferences[0].Id -eq $vm.Id)});
$asets = Get-AzAvailabilitySet;
Assert-NotNull ($asets | ? {($_.VirtualMachinesReferences -ne $null) -and ($_.VirtualMachinesReferences[0].Id -eq $vm.Id)});
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_31_56.ps1
|
sample_31_56.ps1
|
#!powershell
# Copyright: (c) 2015, Jon Hawkesworth (@jhawkesworth) <jhawkesworth@protonmail.com>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
#Requires -Module Ansible.ModuleUtils.ArgvParser
#Requires -Module Ansible.ModuleUtils.CommandUtil
#Requires -Module Ansible.ModuleUtils.Legacy
[System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSCustomUseLiteralPath', '',
Justification = 'This module has supported wildcard comparison since it was created')]
param()
Function Convert-RegistryPath {
Param (
[parameter(Mandatory = $True)]
[ValidateNotNullOrEmpty()]$Path
)
$output = $Path -replace "HKLM:", "HKLM"
$output = $output -replace "HKCU:", "HKCU"
Return $output
}
$result = @{
changed = $false
}
$params = Parse-Args $args
$path = Get-AnsibleParam -obj $params -name "path" -type "path" -resultobj $result
$content = Get-AnsibleParam -obj $params -name "content" -type "str" -resultobj $result
$compare_to = Get-AnsibleParam -obj $params -name "compare_to" -type "str" -resultobj $result
if ( !$path -and !$content ) {
Fail-Json -obj $result -message "Missing required arguments: path or content. At lease one must be provided."
}
if ( $path -and $content ) {
Fail-Json -obj $result -message "Extra arguments: path or content. Only one must be provided."
}
if ( $content ) {
$path = [System.IO.Path]::GetTempFileName()
Set-Content -LiteralPath $path -Value $content
$remove_path = $True
}
# check it looks like a reg key, warn if key not present - will happen first time
# only accepting PS-Drive style key names (starting with HKLM etc, not HKEY_LOCAL_MACHINE etc)
$do_comparison = $False
If ( $compare_to ) {
$compare_to_key = $params.compare_to.ToString()
If (Test-Path $compare_to_key -PathType container ) {
$do_comparison = $True
}
Else {
$result.compare_to_key_found = $false
}
}
If ( $do_comparison -eq $True ) {
$guid = [guid]::NewGuid()
$exported_path = $env:TEMP + "\" + $guid.ToString() + 'ansible_win_regmerge.reg'
$expanded_compare_key = Convert-RegistryPath ($compare_to_key)
# export from the reg key location to a file
$reg_args = Argv-ToString -Arguments @("reg.exe", "EXPORT", $expanded_compare_key, $exported_path)
$res = Run-Command -command $reg_args
if ($res.rc -ne 0) {
$result.rc = $res.rc
$result.stdout = $res.stdout
$result.stderr = $res.stderr
Fail-Json -obj $result -message "error exporting registry '$expanded_compare_key' to '$exported_path'"
}
# compare the two files
$comparison_result = Compare-Object -ReferenceObject $(Get-Content $path) -DifferenceObject $(Get-Content $exported_path)
If ($null -ne $comparison_result -and (Get-Member -InputObject $comparison_result -Name "count" -MemberType Properties )) {
# Something is different, actually do reg merge
$reg_import_args = Argv-ToString -Arguments @("reg.exe", "IMPORT", $path)
$res = Run-Command -command $reg_import_args
if ($res.rc -ne 0) {
$result.rc = $res.rc
$result.stdout = $res.stdout
$result.stderr = $res.stderr
Fail-Json -obj $result -message "error importing registry values from '$path'"
}
$result.changed = $true
$result.difference_count = $comparison_result.count
}
Else {
$result.difference_count = 0
}
Remove-Item $exported_path
$result.compared = $true
}
Else {
# not comparing, merge and report changed
$reg_import_args = Argv-ToString -Arguments @("reg.exe", "IMPORT", $path)
$res = Run-Command -command $reg_import_args
if ($res.rc -ne 0) {
$result.rc = $res.rc
$result.stdout = $res.stdout
$result.stderr = $res.stderr
Fail-Json -obj $result -message "error importing registry value from '$path'"
}
$result.changed = $true
$result.compared = $false
}
if ( $remove_path ) {
Remove-Item $path
}
Exit-Json $result
|
combined_dataset/train/non-malicious/3608.ps1
|
3608.ps1
|
function Get-StorageAccountCredentialName
{
return getAssetName
}
function Test-GetStorageAccountCredentialNonExistent
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$staname = Get-StorageAccountCredentialName
Assert-ThrowsContains { Get-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname } "not find"
}
function Test-CreateStorageAccountCredential
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$staname = Get-StorageAccountCredentialName
$encryptionKeyString = Get-EncryptionKey
$encryptionKey = ConvertTo-SecureString $encryptionKeyString -AsPlainText -Force
$storageAccountType = 'GeneralPurposeStorage'
$storageAccountSkuName = 'Standard_LRS'
$storageAccountLocation = 'WestUS'
$storageAccount = New-AzStorageAccount $rgname $staname $storageAccountSkuName -Location $storageAccountLocation
$storageAccountKeys = Get-AzStorageAccountKey $rgname $staname
$storageAccountKey = ConvertTo-SecureString $storageAccountKeys[0] -AsPlainText -Force
try
{
$expected = New-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname -StorageAccountType $storageAccountType -StorageAccountAccessKey $storageAccountKey -EncryptionKey $encryptionKey
Assert-AreEqual $expected.Name $staname
}
finally
{
Remove-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname
Remove-AzStorageAccount $rgname $staname
}
}
function Test-RemoveStorageAccountCredential
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$staname = Get-StorageAccountCredentialName
$encryptionKeyString = Get-EncryptionKey
$encryptionKey = ConvertTo-SecureString $encryptionKeyString -AsPlainText -Force
$storageAccountType = 'GeneralPurposeStorage'
$storageAccountSkuName = 'Standard_LRS'
$storageAccountLocation = 'WestUS'
$storageAccount = New-AzStorageAccount $rgname $staname $storageAccountSkuName -Location $storageAccountLocation
$storageAccountKeys = Get-AzStorageAccountKey $rgname $staname
$storageAccountKey = ConvertTo-SecureString $storageAccountKeys[0] -AsPlainText -Force
try
{
New-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname -StorageAccountType $storageAccountType -StorageAccountAccessKey $storageAccountKey -EncryptionKey $encryptionKey
Remove-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname
}
finally
{
Assert-ThrowsContains { Get-AzDataBoxEdgeStorageAccountCredential $rgname $dfname $staname } "not find"
Remove-AzStorageAccount $rgname $staname
}
}
|
combined_dataset/train/non-malicious/4078.ps1
|
4078.ps1
|
Clear-Host
Set-Variable -Name a -Scope Global -Force
Set-Variable -Name SMSCli -Scope Global -Force
$SMSCli = [wmiclass] "root\ccm:SMS_Client"
$a = $SMSCli.TriggerSchedule("{00000000-0000-0000-0000-000000000001}")
If ($a.__PROPERTY_COUNT -eq 1) {
$SMSCli.Dispose
Remove-Variable -Name a -Scope Global -Force
Remove-Variable -Name SMSCli -Scope Global -Force
exit 0
} else {
$SMSCli.Dispose
Remove-Variable -Name a -Scope Global -Force
Remove-Variable -Name SMSCli -Scope Global -Force
exit 1
}
|
combined_dataset/train/non-malicious/3542.ps1
|
3542.ps1
|
function Test-AzureSqlGetItems
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "sqlpaasrg" -Name "sqlpaasrn";
$namedContainer = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "AzureSQL" `
-BackupManagementType "AzureSQL" `
-Name "Sql;sqlpaasrg;sqlpaasserver";
Assert-AreEqual $namedContainer.Name "Sql;sqlpaasrg;sqlpaasserver";
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $namedContainer `
-WorkloadType "AzureSQLDatabase";
Assert-AreEqual $item.Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $namedContainer `
-WorkloadType "AzureSQLDatabase" `
-Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
Assert-AreEqual $item.Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
}
function Test-AzureSqlDisableProtection
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "sqlpaasrg" -Name "sqlpaasrn";
$namedContainer = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "AzureSQL" `
-BackupManagementType "AzureSQL" `
-Name "Sql;sqlpaasrg;sqlpaasserver";
Assert-AreEqual $namedContainer.Name "Sql;sqlpaasrg;sqlpaasserver";
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $namedContainer `
-WorkloadType "AzureSQLDatabase" `
-Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
Assert-AreEqual $item.Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
$job = Disable-AzRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Item $item `
-RemoveRecoveryPoints `
-Force;
}
function Test-AzureSqlGetRPs
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "sqlpaasrg" -Name "sqlpaasrn";
$namedContainer = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "AzureSQL" `
-BackupManagementType "AzureSQL" `
-Name "Sql;sqlpaasrg;sqlpaasserver";
Assert-AreEqual $namedContainer.Name "Sql;sqlpaasrg;sqlpaasserver";
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $namedContainer `
-WorkloadType "AzureSQLDatabase" `
-Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
Assert-AreEqual $item.Name "dsName;satyay-sea-d1-fc1-catalog-2016-11-11-17-20;661f0942-d5b7-486a-b3cb-68f97d325a3c";
$fixedStartDate = Get-Date -Date "2016-06-13 16:30:00Z"
$startDate = $fixedStartDate.ToUniversalTime()
$fixedEndDate = Get-Date -Date "2016-06-18 10:30:00Z"
$endDate = $fixedEndDate.ToUniversalTime()
$recoveryPoints = Get-AzRecoveryServicesBackupRecoveryPoint `
-VaultId $vault.ID `
-Item $item[0] `
-StartDate $startDate `
-EndDate $endDate
if (!($recoveryPoints -eq $null))
{
foreach($recoveryPoint in $recoveryPoints)
{
Assert-NotNull $recoveryPoint.RecoveryPointTime 'RecoveryPointTime should not be null'
Assert-NotNull $recoveryPoint.RecoveryPointType 'RecoveryPointType should not be null'
Assert-NotNull $recoveryPoint.Name 'RecoveryPointId should not be null'
}
}
}
|
combined_dataset/train/non-malicious/sample_24_11.ps1
|
sample_24_11.ps1
|
#
# Module manifest for module 'OCI.PSModules.Mediaservices'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Mediaservices.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c1b780bd-0bdf-4759-a6cb-6edb4ac392d6'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Mediaservices Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mediaservices.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIMediaservicesMediaAssetLock',
'Add-OCIMediaservicesMediaWorkflowConfigurationLock',
'Add-OCIMediaservicesMediaWorkflowJobLock',
'Add-OCIMediaservicesMediaWorkflowLock',
'Add-OCIMediaservicesStreamCdnConfigLock',
'Add-OCIMediaservicesStreamDistributionChannelLock',
'Add-OCIMediaservicesStreamPackagingConfigLock',
'Get-OCIMediaservicesMediaAsset',
'Get-OCIMediaservicesMediaAssetDistributionChannelAttachment',
'Get-OCIMediaservicesMediaAssetDistributionChannelAttachmentsList',
'Get-OCIMediaservicesMediaAssetsList',
'Get-OCIMediaservicesMediaWorkflow',
'Get-OCIMediaservicesMediaWorkflowConfiguration',
'Get-OCIMediaservicesMediaWorkflowConfigurationsList',
'Get-OCIMediaservicesMediaWorkflowJob',
'Get-OCIMediaservicesMediaWorkflowJobsList',
'Get-OCIMediaservicesMediaWorkflowsList',
'Get-OCIMediaservicesMediaWorkflowTaskDeclarationsList',
'Get-OCIMediaservicesStreamCdnConfig',
'Get-OCIMediaservicesStreamCdnConfigsList',
'Get-OCIMediaservicesStreamDistributionChannel',
'Get-OCIMediaservicesStreamDistributionChannelsList',
'Get-OCIMediaservicesStreamPackagingConfig',
'Get-OCIMediaservicesStreamPackagingConfigsList',
'Get-OCIMediaservicesSystemMediaWorkflowsList',
'Invoke-OCIMediaservicesIngestStreamDistributionChannel',
'Move-OCIMediaservicesMediaAssetCompartment',
'Move-OCIMediaservicesMediaWorkflowCompartment',
'Move-OCIMediaservicesMediaWorkflowConfigurationCompartment',
'Move-OCIMediaservicesMediaWorkflowJobCompartment',
'Move-OCIMediaservicesStreamDistributionChannelCompartment',
'New-OCIMediaservicesMediaAsset',
'New-OCIMediaservicesMediaWorkflow',
'New-OCIMediaservicesMediaWorkflowConfiguration',
'New-OCIMediaservicesMediaWorkflowJob',
'New-OCIMediaservicesPlaylist', 'New-OCIMediaservicesSessionToken',
'New-OCIMediaservicesStreamCdnConfig',
'New-OCIMediaservicesStreamDistributionChannel',
'New-OCIMediaservicesStreamPackagingConfig',
'Remove-OCIMediaservicesMediaAsset',
'Remove-OCIMediaservicesMediaAssetDistributionChannelAttachment',
'Remove-OCIMediaservicesMediaAssetLock',
'Remove-OCIMediaservicesMediaWorkflow',
'Remove-OCIMediaservicesMediaWorkflowConfiguration',
'Remove-OCIMediaservicesMediaWorkflowConfigurationLock',
'Remove-OCIMediaservicesMediaWorkflowJob',
'Remove-OCIMediaservicesMediaWorkflowJobLock',
'Remove-OCIMediaservicesMediaWorkflowLock',
'Remove-OCIMediaservicesStreamCdnConfig',
'Remove-OCIMediaservicesStreamCdnConfigLock',
'Remove-OCIMediaservicesStreamDistributionChannel',
'Remove-OCIMediaservicesStreamDistributionChannelLock',
'Remove-OCIMediaservicesStreamPackagingConfig',
'Remove-OCIMediaservicesStreamPackagingConfigLock',
'Update-OCIMediaservicesMediaAsset',
'Update-OCIMediaservicesMediaWorkflow',
'Update-OCIMediaservicesMediaWorkflowConfiguration',
'Update-OCIMediaservicesMediaWorkflowJob',
'Update-OCIMediaservicesStreamCdnConfig',
'Update-OCIMediaservicesStreamDistributionChannel',
'Update-OCIMediaservicesStreamPackagingConfig'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mediaservices'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2291.ps1
|
2291.ps1
|
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[parameter(Mandatory = $true, ParameterSetName = "DefaultSet", HelpMessage = "Specify the type of object to query for")]
[parameter(Mandatory = $true, ParameterSetName = "CriteriaSet")]
[ValidateNotNullOrEmpty()]
[ValidateSet("User")]
[string]$ObjectClass,
[parameter(Mandatory = $true, ParameterSetName = "DefaultSet", HelpMessage = "Specify the criteria to validate object against")]
[parameter(Mandatory = $true, ParameterSetName = "CriteriaSet")]
[ValidateNotNullOrEmpty()]
[ValidateSet("NullOrEmpty", "NotMatch", "Duplicate")]
[string]$Criteria,
[parameter(Mandatory = $true, ParameterSetName = "CriteriaSet", HelpMessage = "Pattern to validate for when using NotMatched criteria")]
[ValidateNotNullOrEmpty()]
[string]$Pattern,
[parameter(Mandatory = $true, ParameterSetName = "DefaultSet", HelpMessage = "Specify the userPrincipleName attribute used to match for Azure Active Directory to check for sync eligibility")]
[parameter(Mandatory = $true, ParameterSetName = "CriteriaSet")]
[ValidateNotNullOrEmpty()]
[ValidateSet("UserPrincipleName","Mail")]
[string]$Attribute,
[parameter(Mandatory = $false, ParameterSetName = "DefaultSet", HelpMessage = "Use a specific search base when querying for objects")]
[parameter(Mandatory = $false, ParameterSetName = "CriteriaSet")]
[ValidateNotNullOrEmpty()]
[string]$SearchBase,
[parameter(Mandatory = $false, ParameterSetName = "DefaultSet", HelpMessage = "Show a progressbar displaying the current operation")]
[parameter(Mandatory = $false, ParameterSetName = "CriteriaSet")]
[switch]$ShowProgress
)
Begin {
$CurrentLocation = Split-Path -Parent -Path $MyInvocation.MyCommand.Definition
if (-not(Get-Module -Name ActiveDirectory)) {
try {
Import-Module ActiveDirectory -ErrorAction Stop -Verbose:$false
}
catch [Exception] {
Write-Warning -Message "Unable to load the Active Directory PowerShell module" ; break
}
}
Set-Location -Path AD: -Verbose:$false
}
Process {
function Write-CustomOutput {
param(
[parameter(Mandatory = $true)]
$InputObject,
[parameter(Mandatory = $true)]
[ValidateSet("Normal", "Duplicate")]
$Type
)
if ($Type -eq "Normal") {
$PSObject = [PSCustomObject]@{
Name = $InputObject.Name
DistinguishedName = $InputObject.DistinguishedName
}
Write-Output $PSObject
}
if ($Type -eq "Duplicate") {
$PSObject = [PSCustomObject]@{
samAccountName = $InputObject.Name
AttributeValue = $InputObject.Value
}
Write-Output $PSObject
}
}
if ($PSBoundParameters["ShowProgress"]) {
$ProgressCount = 0
}
$ADObjectsArgumentList = @{
LDAPFilter = "(&(objectclass=$($ObjectClass))(objectcategory=$($ObjectClass))(!useraccountcontrol:1.2.840.113556.1.4.803:=2))"
Properties = $Attribute, "samAccountName", "DistinguishedName"
ErrorAction = "Stop"
}
if ($PSBoundParameters["SearchBase"]) {
$ADObjectsArgumentList.Add("SearchBase", $SearchBase)
}
try {
$DuplicateHashTable = New-Object -TypeName System.Collections.Hashtable
Write-Verbose -Message "Querying for all '$($ObjectClass)' objects"
$Objects = Get-ADObject @ADObjectsArgumentList
$ObjectCount = ($Objects | Measure-Object).Count
foreach ($Object in $Objects) {
if ($PSBoundParameters["ShowProgress"]) {
$ProgressCount++
Write-Progress -Activity "Enumerating Active Directory $($ObjectClass) objects" -Id 1 -Status "$($ProgressCount) / $($ObjectCount)" -CurrentOperation "Current object: $($Object.samAccountName)" -PercentComplete (($ProgressCount / $ObjectCount) * 100)
}
if ($Criteria -eq "NullOrEmpty") {
if ($Object.$Attribute -eq $null) {
Write-CustomOutput -InputObject $Object -Type Normal
}
}
if ($Criteria -eq "NotMatch") {
if ($Object.$Attribute -notmatch $Pattern) {
Write-CustomOutput -InputObject $Object -Type Normal
}
}
if ($Criteria -eq "Duplicate") {
Write-Verbose -Message "Preparing duplicate list"
$DuplicateHashTable.Add($Object.samAccountName, $Object.$Attribute)
}
}
if ($Criteria -eq "Duplicate") {
$DuplicateObjects = $DuplicateHashTable.GetEnumerator() | Group-Object -Property Value | Where-Object { $_.Count -gt 1 }
if (($DuplicateObjects | Measure-Object).Count -ge 1) {
foreach ($DuplicateObject in $DuplicateObjects.Group) {
Write-CustomOutput -InputObject $DuplicateObject -Type Duplicate
}
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch [System.Exception] {
Write-Warning -Message $_.Exception.Message ; break
}
}
End {
if ($PSBoundParameters["ShowProgress"]) {
Write-Progress -Activity "Enumerating Active Directory $($ObjectClass) objects" -Id 1 -Completed
}
Set-Location -Path $CurrentLocation
}
|
combined_dataset/train/non-malicious/8480db1c-b0f9-4a82-aa9a-17edc18cae00.ps1
|
8480db1c-b0f9-4a82-aa9a-17edc18cae00.ps1
|
<#
Author: Matt Schmitt
Date: 11/29/12
Version: 1.0
From: USA
Email: ithink2020@gmail.com
Website: http://about.me/schmittmatt
Twitter: @MatthewASchmitt
Description
A script for checking the status of a service on a group of servers, from a list in a file.
#>
$serverList = Import-Csv 'c:\\serverList.csv'
"Server" +"`t" + "Status" | Out-File c:\\ServerService.csv
foreach ($element in $serverList)
{
$sStatus = get-service -Name "CPSVS" | Select-Object -expand Status
$server = $element | Select-Object -expand Server
$server + "`t" + $sStatus | Out-File -append c:\\ServerServiceStatus.csv
}
Send-MailMessage -From donotreply@test.com -To recipient@domain.com -subject "Spooler Service Report" -Body "Attached is Server Service report." -Attachments "c:\\ServerServiceStatus.csv" -SmtpServer "xxx.xxx.xxx.xxx"
|
combined_dataset/train/non-malicious/LookUp-WirelessLocation.ps1
|
LookUp-WirelessLocation.ps1
|
function LookUp-Location {
param([String] $mac)
$mac = $mac.Replace(":","").Replace("-","")
$wClient = New-Object System.Net.WebClient
$body = "<?xml version='1.0'?><LocationRQ xmlns='http://skyhookwireless.com/wps/2005' version='2.6' street-address-lookup='full'><authentication version='2.0'><simple><username>beta</username><realm>js.loki.com</realm></simple></authentication><access-point><mac>#{mac}</mac><signal-strength>-50</signal-strength></access-point></LocationRQ>"
$url = "https://api.skyhookwireless.com/wps2/location"
$wClient.Headers.Add("Content-Type:text/xml")
$body = $body.Replace("#{mac}", $mac)
$response = $wClient.UploadString($url, $body)
return $response
}
|
combined_dataset/train/non-malicious/Get-ShortURL.ps1
|
Get-ShortURL.ps1
|
Function Get-ShortURL {
Param($longURL, $login, $apiKey)
$url = "http://api.bit.ly/shorten?version=2.0.1&format=xml&longUrl=$longURL&login=$login&apiKey=$apikey"
$request = [net.webrequest]::Create($url)
$responseStream = new-object System.IO.StreamReader($request.GetResponse().GetResponseStream())
$response = $responseStream.ReadToEnd()
$responseStream.Close()
$result = [xml]$response
Write-Output $result.bitly.results.nodeKeyVal.shortUrl
}
|
combined_dataset/train/non-malicious/2970.ps1
|
2970.ps1
|
$dotnetCLIChannel = 'Current'
$dotnetCLIRequiredVersion = 'latest'
$NoSudo = $false
. "$PSScriptRoot/tools.ps1"
$DotnetArguments = @{ Channel = $dotnetCLIChannel; Version = $dotnetCLIRequiredVersion; NoSudo = $NoSudo }
Install-Dotnet @DotnetArguments
$Env:PATH += "$([IO.Path]::PathSeparator)$Env:HOME/.dotnet"
dotnet build -version -nologo
|
combined_dataset/train/non-malicious/sample_59_39.ps1
|
sample_59_39.ps1
|
qيحتوي العمود '%{oii_groupedColumn/}' على مرجع GroupByColumn غير صالح عُيَّن على المعّرف '%I64u{groupByColumnId/}'dالعمود '%{oii_groupedColumn/}' مجموع بواسطة العمود '%{oii_groupByColumn/}' الذي ينتمي إلى جدول مختلف1لا يجوز تعيين اسم الدور إلى '*' أو '*SharePoint'.Kتشير العلاقة '%{ccon_relname/}' إلى عمود من النوع رقم صف، هذا غير مسموح به.Aيجب أن يحتوي الجدول '%{oii_table/}' على 0 أقسام لأنه يضم 0 أعمدة.قاعدة البيانات '%{db_name/}' هي قاعدة بيانات "جدولي جديد" ولا يمكن تغييرها لتحتوي على كائنات بيانات تعريف UDM كالمكعبات، والأبعاد.قاعدة البيانات '%{db_name/}' هي قاعدة بيانات "جدولي جديد" ولا يمكن إنشاؤها باستخدام كائنات بيانات تعريف UDM كالمكعبات، والأبعاد.¾تم استيراد قاعدة البيانات '%{db_name/}' من ملف PBIX، لكن لا يزال هناك بعض عمليات التحويل اللازم إكمالها قبل أن تتمكن من استخدامها. يمكن تنفيذ العملية RefreshCalculate فقط حتى اكتمال التحويل.ªيتعذر إنشاء العلاقة '%{ccon_name/}' بين العمودين '%{oii_fromTable/}[%{oii_fromColumn/}]' و'%{oii_toTable/}[%{oii_toColumn/}]' لأنهما ليسا من مصدر بيانات DirectQuery نفسه.¼يتعذر إنشاء العلاقة '%{ccon_name/}' بين العمودين '%{oii_fromTable/}[%{oii_fromColumn/}]' و'%{oii_toTable/}[%{oii_toColumn/}]' لأن أحدهما في وضع DirectQuery لكن يتواجد الآخر في وضع استيراد.Ûالعلاقة '%{ccon_name/}' بين العمودين '%{oii_fromTable/}[%{oii_fromColumn/}]' و'%{oii_toTable/}[%{oii_toColumn/}]' لها إحدى القيم الأساسية النهائية المعينة على بلا. يجب تعيين العلاقة الأساسية للنهاية دائمًا إلى One/Many.ýالعلاقة '%{ccon_name/}' بين العمودين '%{oii_fromTable/}[%{oii_fromColumn/}]' و'%{oii_toTable/}[%{oii_toColumn/}]' جرى تعيين العلاقة الأساسية من النهاية فيها على واحد. يجب تعيين العلاقة الأساسية من النهاية إلى Many، إلا إذا كانت العلاقة من واحد إلى واحد. ýتتضمن مجموعة الحساب '%{ccon_calculationGroupName/}' عنصر الحساب '%{ccon_calculationItemName/}' بعدد ترتيبي غير صالح = '%d{calculationItemOrdinal/}'. يجب أن يكون العدد الترتيبي لعنصر الحساب أكبر من صفر أو يساويه، كما يجب أن يكون فريدًا ضمن مجموعة الحساب.Ýيتضمن النموذج '%{modelName/}' مجموعة الحساب '%{ccon_calculationGroupName/}' بأسبقية غير صالحة = '%d{calculationGroupPrecedence/}'. يجب أن تكون أسبقية مجموعة الحساب أكبر من صفر أو تساويه، كما يجب أن تكون فريدة ضمن النموذج.
|
combined_dataset/train/non-malicious/sample_30_50.ps1
|
sample_30_50.ps1
|
#
# Module manifest for module 'OCI.PSModules.Cloudmigrations'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudmigrations.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b42be880-f45d-4128-a505-71c63f0f1b48'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudmigrations Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudmigrations.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCICloudmigrationsMigrationPlan',
'Get-OCICloudmigrationsAvailableShapesList',
'Get-OCICloudmigrationsMigration',
'Get-OCICloudmigrationsMigrationAsset',
'Get-OCICloudmigrationsMigrationAssetsList',
'Get-OCICloudmigrationsMigrationPlan',
'Get-OCICloudmigrationsMigrationPlansList',
'Get-OCICloudmigrationsMigrationsList',
'Get-OCICloudmigrationsReplicationProgress',
'Get-OCICloudmigrationsReplicationSchedule',
'Get-OCICloudmigrationsReplicationSchedulesList',
'Get-OCICloudmigrationsTargetAsset',
'Get-OCICloudmigrationsTargetAssetsList',
'Get-OCICloudmigrationsWorkRequest',
'Get-OCICloudmigrationsWorkRequestErrorsList',
'Get-OCICloudmigrationsWorkRequestLogsList',
'Get-OCICloudmigrationsWorkRequestsList',
'Import-OCICloudmigrationsMigrationPlan',
'Invoke-OCICloudmigrationsExecuteMigrationPlan',
'Invoke-OCICloudmigrationsRefreshMigration',
'Invoke-OCICloudmigrationsRefreshMigrationAsset',
'Invoke-OCICloudmigrationsRefreshMigrationPlan',
'Move-OCICloudmigrationsMigrationCompartment',
'Move-OCICloudmigrationsMigrationPlanCompartment',
'Move-OCICloudmigrationsReplicationScheduleCompartment',
'New-OCICloudmigrationsMigration',
'New-OCICloudmigrationsMigrationAsset',
'New-OCICloudmigrationsMigrationPlan',
'New-OCICloudmigrationsReplicationSchedule',
'New-OCICloudmigrationsTargetAsset',
'Remove-OCICloudmigrationsMigration',
'Remove-OCICloudmigrationsMigrationAsset',
'Remove-OCICloudmigrationsMigrationPlan',
'Remove-OCICloudmigrationsReplicationSchedule',
'Remove-OCICloudmigrationsTargetAsset',
'Start-OCICloudmigrationsAssetReplication',
'Start-OCICloudmigrationsMigrationReplication',
'Stop-OCICloudmigrationsWorkRequest',
'Update-OCICloudmigrationsMigration',
'Update-OCICloudmigrationsMigrationAsset',
'Update-OCICloudmigrationsMigrationPlan',
'Update-OCICloudmigrationsReplicationSchedule',
'Update-OCICloudmigrationsTargetAsset'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudmigrations'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1493.ps1
|
1493.ps1
|
function New-AssertionException
{
param(
[Parameter(Position=0)]
[string]
$Message
)
Set-StrictMode -Version 'Latest'
$scopeNum = 0
$stackTrace = @()
foreach( $item in (Get-PSCallStack) )
{
$invocationInfo = $item.InvocationInfo
$stackTrace += "$($item.ScriptName):$($item.ScriptLineNumber) $($invocationInfo.MyCommand)"
}
$ex = New-Object 'Blade.AssertionException' $message,$stackTrace
throw $ex
}
Set-Alias -Name 'Fail' -Value 'New-AssertionException'
|
combined_dataset/train/non-malicious/3389.ps1
|
3389.ps1
|
function Test-Image
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
if ($loc -eq $null)
{
$loc = Get-ComputeVMLocation;
}
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_LRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$imageName = 'image' + $rgname;
$imageConfig = New-AzureRmImageConfig -Location $loc;
Set-AzureRmImageOsDisk -Image $imageConfig -OsType 'Windows' -OsState 'Generalized' -BlobUri $osDiskVhdUri;
$imageConfig = Add-AzureRmImageDataDisk -Image $imageConfig -Lun 1 -BlobUri $dataDiskVhdUri1;
$imageConfig = Add-AzureRmImageDataDisk -Image $imageConfig -Lun 2 -BlobUri $dataDiskVhdUri2;
$imageConfig = Add-AzureRmImageDataDisk -Image $imageConfig -Lun 3 -BlobUri $dataDiskVhdUri2;
Assert-AreEqual 3 $imageConfig.StorageProfile.DataDisks.Count;
$imageConfig = Remove-AzureRmImageDataDisk -Image $imageConfig -Lun 3;
Assert-AreEqual 2 $imageConfig.StorageProfile.DataDisks.Count;
$createdImage = New-AzureRmImage -Image $imageConfig -ImageName $imageName -ResourceGroupName $rgname;
Assert-NotNull $createdImage.Id;
Assert-AreEqual $imageName $createdImage.Name;
Assert-AreEqual 2 $createdImage.StorageProfile.DataDisks.Count;
Assert-AreEqual "Succeeded" $createdImage.ProvisioningState;
Assert-AreEqual $osDiskVhdUri $createdImage.StorageProfile.OsDisk.BlobUri;
Assert-AreEqual $dataDiskVhdUri1 $createdImage.StorageProfile.DataDisks[0].BlobUri;
Assert-AreEqual $dataDiskVhdUri2 $createdImage.StorageProfile.DataDisks[1].BlobUri;
$images = Get-AzureRmImage -ResourceGroupName $rgname;
Assert-AreEqual 1 $images.Count;
Remove-AzureRmImage -ResourceGroupName $rgname -ImageName $imageName -Force;
$images = Get-AzureRmImage -ResourceGroupName $rgname;
Assert-AreEqual 0 $images.Count;
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ImageCapture
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
if ($loc -eq $null)
{
$loc = Get-ComputeVMLocation;
}
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_LRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Stop-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force;
Set-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Generalize;
$imageName = 'image' + $rgname;
$imageConfig = New-AzureRmImageConfig -Location $loc -SourceVirtualMachineId $vm.Id;
$createdImage = New-AzureRmImage -Image $imageConfig -ImageName $imageName -ResourceGroupName $rgname;
Assert-NotNull $createdImage.Id;
Assert-AreEqual $imageName $createdImage.Name;
Assert-AreEqual 2 $createdImage.StorageProfile.DataDisks.Count;
Assert-AreEqual "Succeeded" $createdImage.ProvisioningState;
Assert-AreEqual $osDiskVhdUri $createdImage.StorageProfile.OsDisk.BlobUri;
Assert-AreEqual $dataDiskVhdUri1 $createdImage.StorageProfile.DataDisks[0].BlobUri;
Assert-AreEqual $dataDiskVhdUri2 $createdImage.StorageProfile.DataDisks[1].BlobUri;
$images = Get-AzureRmImage -ResourceGroupName $rgname;
Assert-AreEqual 1 $images.Count;
Remove-AzureRmImage -ResourceGroupName $rgname -ImageName $imageName -Force;
$images = Get-AzureRmImage -ResourceGroupName $rgname;
Assert-AreEqual 0 $images.Count;
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_31_99.ps1
|
sample_31_99.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
The operation to update a logical network.
.Description
The operation to update a logical network.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ILogicalNetworks
.Link
https://learn.microsoft.com/powershell/module/az.stackhcivm/update-azstackhcivmlogicalnetwork
#>
function Update-AzStackHCIVMLogicalNetwork_ByResourceId {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ILogicalNetworks])]
[CmdletBinding(PositionalBinding=$false)]
param(
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')]
[System.String]
# The ARM Resource ID of the virtual network.
${ResourceId},
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ILogicalNetworksUpdateRequestTags]))]
[System.Collections.Hashtable]
# Resource tags
${Tag},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if ($ResourceId -match $lnetRegex){
$subscriptionId = $($Matches['subscriptionId'])
$resourceGroupName = $($Matches['resourceGroupName'])
$resourceName = $($Matches['logicalNetworkName'])
$null = $PSBoundParameters.Remove("ResourceId")
$PSBoundParameters.Add("Name", $resourceName)
$PSBoundParameters.Add("ResourceGroupName", $resourceGroupName)
$null = $PSBoundParameters.Remove("SubscriptionId")
$PSBoundParameters.Add("SubscriptionId", $subscriptionId)
try{
Az.StackHCIVM\Update-AzStackHCIVMLogicalNetwork -ErrorAction Stop @PSBoundParameters
} catch {
$e = $_
if ($e.FullyQualifiedErrorId -match "MissingAzureKubernetesMapping" ){
Write-Error "An older version of the Arc VM cluster extension is installed on your cluster. Please downgrade the Az.StackHCIVm version to 1.0.1 to proceed." -ErrorAction Stop
} else {
Write-Error $e.Exception.Message -ErrorAction Stop
}
}
} else {
Write-Error "Resource ID is invalid: $ResourceId"
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDux9MZWO4187bw
# cuKmn94TXvY/0K0sYY0LNY+UyX3XeaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICOddtmQOPNV0nCNkgmmg0HU
# BT7EIrHVHtdbhNcHxrnYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAtsKjNQbGV+3W3cfsnAtOjjwgenhgeeDP6SKHFuFN/XW5yh62igBgJTzg
# cbyE1p35qxPvaLjtZ2MzA8RXPMfZYjErfUtAAtw/Kb9YTbtu3OLSBOsWp94IvIcn
# /hQ5f0M5mQor9ndPkByPs3GRdEV2c6UlyQc6Uv6wNm+1ZUU446+x5PHiC03QDb3g
# 1e86353rtCtqMvw5t0VVFwNtSKIA8XXSRVGuwOj80QEaJ9B4sDUd9NezdBg/syTV
# eyqJvS4WQuBN5znhExNnwjfKzWaHisbGzjgrZ1JBC/pcYz8tLo3JYIVX57Ug6Rti
# URgW5QH5TXeUhRsPzZ2wsApBGqOJFKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCvCCpC3J9CMsBNUW/8xrZQhIOXUZsoJZ4kyXLAItQaogIGZjOahIKV
# GBMyMDI0MDUxNjA2NDIxMy4xNzZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/khTAiGA8yMDI0MDUxNjAxNDg1
# M1oYDzIwMjQwNTE3MDE0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7+SF
# AgEAMAcCAQACAhI8MAcCAQACAhLtMAoCBQDp8TYFAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAxEjKnSk7z0bXwcEuWQw97AgLqpP6QXnwEZM41HdkQ6IjWR
# 80WQra5fw3/m4qY8wuDmJtG7uCD/olcakGKUKmhwvb3cKYRsYimEb3p8Bs0pBosm
# 85tb23aIP6SaYP9RDzyFc0lbTZFgve3dvH5HBA05maKu/SGUwj6YFbCUwkePhxlc
# PwoJht+JDTulGIR60ACLGdEVDfcUZs7CEO4jApeHyK2003zb9kPdjogvdegfmIm3
# t2tuHLEv2/UsXl8nukg/Rp8Xg8xspddR3tZMT6xr/Kt2tdCzUQaW67J+MZBuX6cD
# +zcbEo8FH0fMF0WfCSvSurqFZiM/h6+6P21scbsxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCB9OExtc5dvRaT6GUhw/XhyqX2NpvVyn++yyOjiEvhQsDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o
# CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgrf1hyXgV+TDcVONGGqbNRYWZJ3gR
# eAJl4GXFk1yOgFkwDQYJKoZIhvcNAQELBQAEggIAb5AOthD1LuKtVVqDAs6Zhrmd
# oy3wQiAVneC9sMY2MeTEl5gTrW46ghx4ItWQBcAHQgIqiNVaGRuqehMKX9X0wRha
# 5ouw/ONMGRhya9QeqrtKPcYRIp9pu1LupKvJQPYQoE0NRxfhhc/4d4LwSU4P02xS
# /49jDirgKDzqx4tfCEBFC37t85xCS15i+8U/HHSvfz7/SXtnUvO9pa/uqo8SwA/8
# we+8/mURLTkn0Vi1oFCttO0mDCbFf13fcgsBLODneul0yKCdh8hK6NenXKUjQITC
# P4epRson8Ptsyfz+ojCsedzmG2HpK+cku2BlgkHl3XZRWUXIUx8dcbPfWOeJQJdb
# 6+nD1fuGZ97OZhEjHfi0511LYz224eWR9IPK6X5nnZZB8CT+E/gJvZNhQNFcC8ly
# R+OPEr3SEQdhZS+bWaeRCE/YNxgSPfnQDef2bPXEjPpjcJoAHsq02JvjTpk4zsmG
# QLSJPZu8ptMIRJVZdW85jl3fvBuKRM9zKbLvbjV6X8SJEJ80FeU1en4wLM7zfBw0
# HSA42kz3oIIsBhyNv4alczCwuEY4RlPgU58piiQ3o4YRmOJM0eWxnPuAahi0ngam
# aWxejPL8ISjOjE8Zh2XiTBrw+zZb8TU/kTZz1fuhYjMm6l56FDQPPpQ3q8TZzi17
# hP320oId9OEusFZKhUc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_33_53.ps1
|
sample_33_53.ps1
|
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Sì
PromptNoString=&No
BundleFound=Pacchetto trovato: {0}
PackageFound=Pacchetto trovato: {0}
EncryptedBundleFound=Bundle crittografato trovato: {0}
EncryptedPackageFound=Pacchetto crittografato trovato: {0}
CertificateFound=Certificato trovato: {0}
DependenciesFound=Pacchetti di dipendenza trovati:
GettingDeveloperLicense=Acquisizione della licenza per sviluppatori in corso...
InstallingCertificate=Installazione del certificato in corso...
InstallingPackage=\nInstallazione dell'applicazione in corso...
AcquireLicenseSuccessful=Acquisizione di una licenza per sviluppatori completata.
InstallCertificateSuccessful=Installazione del certificato completata.
Success=\nOperazione completata: l'applicazione è stata installata.
WarningInstallCert=\nVerrà installato un certificato digitale nell'archivio certificati Persone attendibili del computer. Questa operazione costituisce un grave rischio per la sicurezza e deve essere eseguita solo se si considera attendibile l'origine del certificato digitale.\n\nDopo aver terminato di usare l'app, è consigliabile rimuovere manualmente il certificato digitale associato. Le istruzioni necessarie sono disponibili all'indirizzo: http://go.microsoft.com/fwlink/?LinkId=243053\n\nContinuare?\n\n
ElevateActions=\nPrima di installare questa applicazione, è necessario eseguire quanto segue:
ElevateActionDevLicense=\t- Acquisire una licenza per sviluppatori
ElevateActionCertificate=\t- Installare il certificato di firma
ElevateActionsContinue=Per continuare sono necessarie credenziali di amministratore. Accettare l'avviso di Controllo dell'account utente e specificare, se richiesta, la password di amministratore.
ErrorForceElevate=Per continuare è necessario specificare credenziali di amministratore. Eseguire questo script senza il parametro -Force oppure da una finestra di PowerShell con privilegi elevati.
ErrorForceDeveloperLicense=L'acquisizione di una licenza per sviluppatori richiede l'intervento dell'utente. Eseguire di nuovo lo script senza il parametro -Force.
ErrorLaunchAdminFailed=Errore: impossibile avviare un nuovo processo come amministratore.
ErrorNoScriptPath=Errore: è necessario avviare questo script da un file.
ErrorNoPackageFound=Errore: nessun pacchetto trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il pacchetto da installare.
ErrorManyPackagesFound=Errore: più pacchetti trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il pacchetto da installare.
ErrorPackageUnsigned=Errore: il pacchetto non è provvisto di firma digitale oppure la firma è danneggiata.
ErrorNoCertificateFound=Errore: nessun certificato trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il certificato utilizzato per firmare il pacchetto da installare.
ErrorManyCertificatesFound=Errore: più certificati trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il certificato utilizzato per firmare il pacchetto da installare.
ErrorBadCertificate=Errore: il file "{0}" non è un certificato digitale valido. CertUtil terminato con codice di errore {1}.
ErrorExpiredCertificate=Errore: il certificato "{0}" dello sviluppatore è scaduto. È possibile che l'orologio di sistema non sia impostato sulla data e sull'ora corrette. Se le impostazioni di sistema sono corrette, contattare il proprietario dell'applicazione per ricreare un pacchetto con un certificato valido.
ErrorCertificateMismatch=Errore: il certificato non corrisponde a quello utilizzato per firmare il pacchetto.
ErrorCertIsCA=Errore: il certificato non può essere un'autorità di certificazione.
ErrorBannedKeyUsage=Errore: il certificato non può avere il seguente utilizzo chiavi: {0}. L'utilizzo chiavi deve essere non specificato o corrispondere a "DigitalSignature".
ErrorBannedEKU=Errore: il certificato non può avere il seguente utilizzo chiavi avanzato: {0}. Sono consentiti solo utilizzi chiavi avanzati (EKU) Firma codice e Firma definitiva.
ErrorNoBasicConstraints=Errore: il certificato non dispone dell'estensione Limitazioni di base.
ErrorNoCodeSigningEku=Errore: il certificato non dispone dell'utilizzo chiavi avanzato per Firma codice.
ErrorInstallCertificateCancelled=Errore: installazione del certificato annullata.
ErrorCertUtilInstallFailed=Errore: impossibile installare il certificato. CertUtil terminato con codice di errore {0}.
ErrorGetDeveloperLicenseFailed=Errore: impossibile acquisire una licenza per sviluppatori. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Errore: impossibile installare il certificato. Stato: {0}. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Errore: impossibile installare l'applicazione.
ErrorAddPackageFailedWithCert=Errore: impossibile installare l'applicazione. Per garantire la sicurezza, provare a disinstallare il certificato di firma finché non risulta possibile installare l'applicazione. Le istruzioni necessarie sono disponibili qui:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/Show-ColorizedContent.ps.ps1
|
Show-ColorizedContent.ps.ps1
|
##############################################################################\n##\n## Show-ColorizedContent\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nDisplays syntax highlighting, line numbering, and range highlighting for\nPowerShell scripts.\n\n.EXAMPLE\n\nPS >Show-ColorizedContent Invoke-MyScript.ps1\n\n001 | function Write-Greeting\n002 | {\n003 | param($greeting)\n004 | Write-Host "$greeting World"\n005 | }\n006 |\n007 | Write-Greeting "Hello"\n\n.EXAMPLE\n\nPS >Show-ColorizedContent Invoke-MyScript.ps1 -highlightRange (1..3+7)\n\n001 > function Write-Greeting\n002 > {\n003 > param($greeting)\n004 | Write-Host "$greeting World"\n005 | }\n006 |\n007 > Write-Greeting "Hello"\n\n#>\n\nparam(\n ## The path to colorize\n [Parameter(Mandatory = $true)]\n $Path,\n\n ## The range of lines to highlight\n $HighlightRange = @(),\n\n ## Switch to exclude line numbers\n [Switch] $ExcludeLineNumbers\n)\n\nSet-StrictMode -Version Latest\n\n## Colors to use for the different script tokens.\n## To pick your own colors:\n## [Enum]::GetValues($host.UI.RawUI.ForegroundColor.GetType()) |\n## Foreach-Object { Write-Host -Fore $_ "$_" }\n$replacementColours = @{\n 'Attribute' = 'DarkCyan'\n 'Command' = 'Blue'\n 'CommandArgument' = 'Magenta'\n 'CommandParameter' = 'DarkBlue'\n 'Comment' = 'DarkGreen'\n 'GroupEnd' = 'Black'\n 'GroupStart' = 'Black'\n 'Keyword' = 'DarkBlue'\n 'LineContinuation' = 'Black'\n 'LoopLabel' = 'DarkBlue'\n 'Member' = 'Black'\n 'NewLine' = 'Black'\n 'Number' = 'Magenta'\n 'Operator' = 'DarkGray'\n 'Position' = 'Black'\n 'StatementSeparator' = 'Black'\n 'String' = 'DarkRed'\n 'Type' = 'DarkCyan'\n 'Unknown' = 'Black'\n 'Variable' = 'Red'\n}\n\n$highlightColor = "Red"\n$highlightCharacter = ">"\n$highlightWidth = 6\nif($excludeLineNumbers) { $highlightWidth = 0 }\n\n## Read the text of the file, and tokenize it\n$file = (Resolve-Path $Path).Path\n$content = [IO.File]::ReadAllText($file)\n$parsed = [System.Management.Automation.PsParser]::Tokenize(\n $content, [ref] $null) | Sort StartLine,StartColumn\n\n## Write a formatted line -- in the format of:\n## <Line Number> <Separator Character> <Text>\nfunction WriteFormattedLine($formatString, [int] $line)\n{\n if($excludeLineNumbers) { return }\n\n ## By default, write the line number in gray, and use\n ## a simple pipe as the separator\n $hColor = "DarkGray"\n $separator = "|"\n\n ## If we need to highlight the line, use the highlight\n ## color and highlight separator as the separator\n if($highlightRange -contains $line)\n {\n $hColor = $highlightColor\n $separator = $highlightCharacter\n }\n\n ## Write the formatted line\n $text = $formatString -f $line,$separator\n Write-Host -NoNewLine -Fore $hColor -Back White $text\n}\n\n## Complete the current line with filler cells\nfunction CompleteLine($column)\n{\n ## Figure how much space is remaining\n $lineRemaining = $host.UI.RawUI.WindowSize.Width -\n $column - $highlightWidth + 1\n\n ## If we have less than 0 remaining, we've wrapped onto the\n ## next line. Add another buffer width worth of filler\n if($lineRemaining -lt 0)\n {\n $lineRemaining += $host.UI.RawUI.WindowSize.Width\n }\n\n Write-Host -NoNewLine -Back White (" " * $lineRemaining)\n}\n\n\n## Write the first line of context information (line number,\n## highlight character.)\nWrite-Host\nWriteFormattedLine "{0:D3} {1} " 1\n\n## Now, go through each of the tokens in the input\n## script\n$column = 1\nforeach($token in $parsed)\n{\n $color = "Gray"\n\n ## Determine the highlighting colour for that token by looking\n ## in the hashtable that maps token types to their color\n $color = $replacementColours[[string]$token.Type]\n if(-not $color) { $color = "Gray" }\n\n ## If it's a newline token, write the next line of context\n ## information\n if(($token.Type -eq "NewLine") -or ($token.Type -eq "LineContinuation"))\n {\n CompleteLine $column\n WriteFormattedLine "{0:D3} {1} " ($token.StartLine + 1)\n $column = 1\n }\n else\n {\n ## Do any indenting\n if($column -lt $token.StartColumn)\n {\n $text = " " * ($token.StartColumn - $column)\n Write-Host -Back White -NoNewLine $text\n $column = $token.StartColumn\n }\n\n ## See where the token ends\n $tokenEnd = $token.Start + $token.Length - 1\n\n ## Handle the line numbering for multi-line strings and comments\n if(\n (($token.Type -eq "String") -or\n ($token.Type -eq "Comment")) -and\n ($token.EndLine -gt $token.StartLine))\n {\n ## Store which line we've started at\n $lineCounter = $token.StartLine\n\n ## Split the content of this token into its lines\n ## We use the start and end of the tokens to determine\n ## the position of the content, but use the content\n ## itself (rather than the token values) for manipulation.\n $stringLines = $(\n -join $content[$token.Start..$tokenEnd] -split "`n")\n\n ## Go through each of the lines in the content\n foreach($stringLine in $stringLines)\n {\n $stringLine = $stringLine.Trim()\n\n ## If we're on a new line, fill the right hand\n ## side of the line with spaces, and write the header\n ## for the new line.\n if($lineCounter -gt $token.StartLine)\n {\n CompleteLine $column\n WriteFormattedLine "{0:D3} {1} " $lineCounter\n $column = 1\n }\n\n ## Now write the text of the current line\n Write-Host -NoNewLine -Fore $color -Back White $stringLine\n $column += $stringLine.Length\n $lineCounter++\n }\n }\n ## Write out a regular token\n else\n {\n ## We use the start and end of the tokens to determine\n ## the position of the content, but use the content\n ## itself (rather than the token values) for manipulation.\n $text = (-join $content[$token.Start..$tokenEnd])\n Write-Host -NoNewLine -Fore $color -Back White $text\n }\n\n ## Update our position in the column\n $column = $token.EndColumn\n }\n}\n\nCompleteLine $column\nWrite-Host
|
combined_dataset/train/non-malicious/sample_67_99.ps1
|
sample_67_99.ps1
|
#
# Module manifest for module 'Microsoft.Online.SharePoint.PowerShell'
#
# Generated by: Microsoft Corportation
#
# Generated on: 8/29/2011
#
@{
# Script module or binary module file associated with this manifest
ModuleToProcess = 'Microsoft.Online.SharePoint.PowerShell.dll'
# Version number of this module.
ModuleVersion = '16.0.24908.0'
# ID used to uniquely identify this module
GUID = 'adedde5f-e77b-4682-ab3d-a4cb4ff79b83'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft SharePoint Online Services Module for Windows PowerShell'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Name of the Windows PowerShell host required by this module
PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
PowerShellHostVersion = ''
# Minimum version of the .NET Framework required by this module
DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
CLRVersion = '4.0'
# Processor architecture (None, X86, Amd64, IA64) required by this module
ProcessorArchitecture = 'None'
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module
ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = @('Microsoft.Online.SharePoint.PowerShell.ps1xml')
# Modules to import as nested modules of the module specified in ModuleToProcess
NestedModules = @()
# Functions to export from this module
FunctionsToExport = '*'
# Cmdlets to export from this module
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module
AliasesToExport = '*'
# List of all modules packaged with this module
ModuleList = @()
# List of all files packaged with this module
FileList = @()
# Private data to pass to the module specified in ModuleToProcess
PrivateData = ''
}
|
combined_dataset/train/non-malicious/3793.ps1
|
3793.ps1
|
function Test-VirtualMachineExtension
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A2';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = 'csetest';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$extver = '1.1';
$settingstr = '{"fileUris":[],"commandToExecute":"powershell Get-Process"}';
$protectedsettingstr = '{"storageAccountName":"' + $stoname + '","storageAccountKey":"' + $stokey + '"}';
$job = Set-AzVMExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname -Name $extname -Publisher $publisher -ExtensionType $exttype -TypeHandlerVersion $extver -SettingString $settingstr -ProtectedSettingString $protectedsettingstr -AsJob
$job | Wait-Job
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
Assert-NotNull $ext.SubStatuses;
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname
Assert-True { $ext.Count -ge 1 }
Assert-Null $ext[0].Statuses
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Status
Assert-NotNull $ext.Statuses
$ext | Remove-AzVMExtension -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineExtensionUsingHashTable
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A2';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = $rgname + 'ext';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$extver = '1.1';
$settings = @{"fileUris" = @(); "commandToExecute" = "powershell Get-Process"};
$protectedsettings = @{"storageAccountName" = $stoname; "storageAccountKey" = $stokey};
Set-AzVMExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname -Name $extname -Publisher $publisher -ExtensionType $exttype -TypeHandlerVersion $extver -Settings $settings -ProtectedSettings $protectedsettings;
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Write-Verbose("Get-AzVM: ");
$a = $vm1 | Out-String;
Write-Verbose($a);
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
Remove-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtension
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = $rgname + 'ext';
$extver = '1.1';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$fileToExecute = 'a.exe';
$containerName = 'script';
Assert-ThrowsContains { `
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname `
-Name $extname -TypeHandlerVersion $extver -StorageAccountName $stoname -StorageAccountKey $stokey `
-FileName $fileToExecute -ContainerName $containerName; } `
"Failed to download all specified files";
$ext = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
$expCommand = 'powershell -ExecutionPolicy Unrestricted -file ' + $fileToExecute + ' ';
$expUri = $stoname + '.blob.core.windows.net/' + $containerName + '/' + $fileToExecute;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.CommandToExecute $expCommand;
Assert-NotNull $ext.ProvisioningState;
$ext = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.CommandToExecute $expCommand;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtensionPiping
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmname = 'vm' + $rgname;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
[string]$domainNameLabel = "$vmname-$vmname".tolower();
$vmobject = New-AzVm -Name $vmname -ResourceGroupName $rgname -Credential $cred -DomainNameLabel $domainNameLabel;
$csename = "myCustomExtension";
$fileUri = "https://raw.githubusercontent.com/neilpeterson/nepeters-azure-templates/master/windows-custom-script-simple/support-scripts/Create-File.ps1";
$runname = "Create-File.ps1";
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename `
-Location $loc -FileUri $fileUri -Run $runname;
$cseobject = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename;
Assert-NotNull $cseobject;
Assert-Match $runname $cseobject.CommandToExecute;
$argument = "-NonInteractive";
$cseobject | Set-AzVMCustomScriptExtension -Argument $argument;
$cseobject = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename;
Assert-NotNull $cseobject;
Assert-Match $runname $cseobject.CommandToExecute;
Assert-Match $argument $cseobject.CommandToExecute;
Set-AzVMCustomScriptExtension -ResourceId $cseobject.Id -Location $loc `
-FileUri $fileUri -Run $runname;
$cseobject = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename;
Assert-NotNull $cseobject;
Assert-Match $runname $cseobject.CommandToExecute;
Assert-NotMatch $argument $cseobject.CommandToExecute;
$vmobject | Set-AzVMCustomScriptExtension -Name $csename -Location $loc `
-FileUri $fileUri -Run $runname -Argument $argument;
$cseobject = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename;
Assert-NotNull $cseobject;
Assert-Match $runname $cseobject.CommandToExecute;
Assert-Match $argument $cseobject.CommandToExecute;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtensionWrongStorage
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = $rgname + 'ext';
$extver = '1.1';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$fileToExecute = 'a.exe';
$containerName = 'script';
Assert-ThrowsContains { `
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname `
-Name $extname -TypeHandlerVersion $extver -StorageAccountName "abc" `
-FileName $fileToExecute -ContainerName $containerName; } `
"not found";
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtensionSecureExecution
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = $rgname + 'ext';
$extver = '1.1';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$fileToExecute = 'a.exe';
$containerName = 'script';
Assert-ThrowsContains { `
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname `
-Name $extname -TypeHandlerVersion $extver `
-StorageAccountName $stoname -StorageAccountKey $stokey `
-FileName $fileToExecute -ContainerName $containerName -SecureExecution; } `
"Failed to download all specified files";
$ext = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
$expCommand = 'powershell -ExecutionPolicy Unrestricted -file ' + $fileToExecute + ' ';
$expUri = $stoname + '.blob.core.windows.net/' + $containerName + '/' + $fileToExecute;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-Null $ext.CommandToExecute;
Assert-NotNull $ext.ProvisioningState;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtensionFileUri
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = $rgname + 'ext';
$extver = '1.1';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$containerName = 'scripts';
$fileToExecute = 'test1.ps1';
$duration = New-Object -TypeName TimeSpan(2,0,0);
$type = [Microsoft.WindowsAzure.Storage.Blob.SharedAccessBlobPermissions]::Read;
$sasFile1 = Get-SasUri $stoname $stokey $containerName $fileToExecute $duration $type;
$sasFile2 = Get-SasUri $stoname $stokey $containerName $fileToExecute $duration $type;
Assert-ThrowsContains { `
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname `
-Name $extname -TypeHandlerVersion $extver -Run $fileToExecute -FileUri $sasFile1, $sasFile2; } `
"Failed to download all specified files";
$ext = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
$expCommand = 'powershell -ExecutionPolicy Unrestricted -file ' + $fileToExecute+ ' ';
$expUri = $stoname + '.blob.core.windows.net/' + $containerName + '/' + $fileToExecute;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.CommandToExecute $expCommand;
Assert-NotNull $ext.ProvisioningState;
$ext = Get-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.CommandToExecute $expCommand;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCustomScriptExtensionLinuxVM
{
$testMode = Get-ComputeTestMode
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_D2S_V3';
$vmname = 'vm' + $rgname;
$imagePublisher = "RedHat";
$imageOffer = "RHEL";
$imageSku = "7.5";
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'linuxOsDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/linuxos.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -Caching $osDiskCaching -CreateOption FromImage -Linux;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred;
$p = Set-AzVMSourceImage -VM $p -PublisherName $imagePublisher -Offer $imageOffer -Skus $imageSku -Version "latest"
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imageOffer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imagePublisher;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imageSku;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$csename = "myCustomExtension";
$fileUri = "https://raw.githubusercontent.com/neilpeterson/nepeters-azure-templates/master/windows-custom-script-simple/support-scripts/Create-File.ps1";
$runname = "Create-File.ps1";
Assert-ThrowsContains { `
Set-AzVMCustomScriptExtension -ResourceGroupName $rgname -VMName $vmname -Name $csename -Location $loc -FileUri $fileUri -Run $runname; } `
"The current VM is a Linux VM. Custom script extension can be set only to Windows VM.";
}
finally
{
Clean-ResourceGroup($rgname)
}
}
function Test-VirtualMachineAccessExtension
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = 'csetest';
$extver = '2.0';
$user2 = "Bar12";
$password2 = 'FoO@123' + $rgname;
$securePassword2 = ConvertTo-SecureString $password2 -AsPlainText -Force;
$cred2 = New-Object System.Management.Automation.PSCredential ($user2, $securePassword2);
Set-AzVMAccessExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname -Name $extname -TypeHandlerVersion $extver -Credential $cred2
$publisher = 'Microsoft.Compute';
$exttype = 'VMAccessAgent';
$ext = Get-AzVMAccessExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.UserName $user2;
Assert-NotNull $ext.ProvisioningState;
Assert-True {$ext.PublicSettings.Contains("UserName")};
$ext = Get-AzVMAccessExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
Assert-True {$ext.PublicSettings.Contains("UserName")};
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-AzureDiskEncryptionExtensionSinglePass
{
$resourceGroupName = Get-ComputeTestResourceName
try
{
$vm = Create-VirtualMachine $resourceGroupName
$kv = Create-KeyVault $vm.ResourceGroupName $vm.Location
Set-AzVMDiskEncryptionExtension `
-ResourceGroupName $vm.ResourceGroupName `
-VMName $vm.Name `
-DiskEncryptionKeyVaultUrl $kv.DiskEncryptionKeyVaultUrl `
-DiskEncryptionKeyVaultId $kv.DiskEncryptionKeyVaultId `
-Force
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted Encrypted
Assert-AreEqual $status.DataVolumesEncrypted Encrypted
$settings = $status.OsVolumeEncryptionSettings
Assert-NotNull $settings
Assert-NotNull $settings.DiskEncryptionKey.SecretUrl
Assert-AreEqual $settings.DiskEncryptionKey.SourceVault.Id $kv.DiskEncryptionKeyVaultId
}
finally
{
Clean-ResourceGroup($resourceGroupName)
}
}
function Test-AzureDiskEncryptionExtensionSinglePassRemove
{
$resourceGroupName = Get-ComputeTestResourceName
try
{
$vm = Create-VirtualMachineNoDataDisks $resourceGroupName
$kv = Create-KeyVault $vm.ResourceGroupName $vm.Location
Set-AzVMDiskEncryptionExtension `
-ResourceGroupName $vm.ResourceGroupName `
-VMName $vm.Name `
-DiskEncryptionKeyVaultUrl $kv.DiskEncryptionKeyVaultUrl `
-DiskEncryptionKeyVaultId $kv.DiskEncryptionKeyVaultId `
-Force
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted Encrypted
Assert-AreEqual $status.DataVolumesEncrypted NoDiskFound
$settings = $status.OsVolumeEncryptionSettings
Assert-NotNull $settings
Assert-NotNull $settings.DiskEncryptionKey.SecretUrl
Assert-AreEqual $settings.DiskEncryptionKey.SourceVault.Id $kv.DiskEncryptionKeyVaultId
Remove-AzVmDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -Force
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted Encrypted
Assert-AreEqual $status.DataVolumesEncrypted NoDiskFound
$settings = $status.OsVolumeEncryptionSettings
Assert-NotNull $settings
Assert-NotNull $settings.DiskEncryptionKey.SecretUrl
Assert-AreEqual $settings.DiskEncryptionKey.SourceVault.Id $kv.DiskEncryptionKeyVaultId
}
finally
{
Clean-ResourceGroup($resourceGroupName)
}
}
function Test-AzureDiskEncryptionExtensionSinglePassDisableAndRemove
{
$resourceGroupName = Get-ComputeTestResourceName
try
{
$vm = Create-VirtualMachine $resourceGroupName
$kv = Create-KeyVault $vm.ResourceGroupName $vm.Location
Set-AzVMDiskEncryptionExtension `
-ResourceGroupName $vm.ResourceGroupName `
-VMName $vm.Name `
-DiskEncryptionKeyVaultUrl $kv.DiskEncryptionKeyVaultUrl `
-DiskEncryptionKeyVaultId $kv.DiskEncryptionKeyVaultId `
-Force
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted Encrypted
Assert-AreEqual $status.DataVolumesEncrypted Encrypted
$settings = $status.OsVolumeEncryptionSettings
Assert-NotNull $settings
Assert-NotNull $settings.DiskEncryptionKey.SecretUrl
Assert-AreEqual $settings.DiskEncryptionKey.SourceVault.Id $kv.DiskEncryptionKeyVaultId
$status = Disable-AzVmDiskEncryption -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -Force
Assert-NotNull $status
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted NotEncrypted
Assert-AreEqual $status.DataVolumesEncrypted NotEncrypted
$settings = $status.OsVolumeEncryptionSettings
Assert-Null $settings
$status = Remove-AzVmDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -Force
Assert-NotNull $status
}
finally
{
Clean-ResourceGroup($resourceGroupName)
}
}
function Test-AzureDiskEncryptionExtensionNonDefaultParams
{
$resourceGroupName = Get-ComputeTestResourceName
try
{
$vm = Create-VirtualMachine $resourceGroupName
$kv = Create-KeyVault $vm.ResourceGroupName $vm.Location
$extensionPublisher = "Microsoft.Azure.Security.Edp";
$extensionName = "MyExtension";
Set-AzVMDiskEncryptionExtension `
-ResourceGroupName $vm.ResourceGroupName `
-VMName $vm.Name `
-DiskEncryptionKeyVaultUrl $kv.DiskEncryptionKeyVaultUrl `
-DiskEncryptionKeyVaultId $kv.DiskEncryptionKeyVaultId `
-ExtensionPublisherName $extensionPublisher `
-ExtensionName $extensionName `
-Force
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -ExtensionPublisherName $extensionPublisher -ExtensionName $extensionName
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted Encrypted
Assert-AreEqual $status.DataVolumesEncrypted Encrypted
$settings = $status.OsVolumeEncryptionSettings
Assert-NotNull $settings
Assert-NotNull $settings.DiskEncryptionKey.SecretUrl
Assert-AreEqual $settings.DiskEncryptionKey.SourceVault.Id $kv.DiskEncryptionKeyVaultId
$status = Disable-AzVmDiskEncryption -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -ExtensionPublisherName $extensionPublisher -ExtensionName $extensionName -Force
Assert-NotNull $status
$status = Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -ExtensionPublisherName $extensionPublisher -ExtensionName $extensionName
Assert-NotNull $status
Assert-AreEqual $status.OsVolumeEncrypted NotEncrypted
Assert-AreEqual $status.DataVolumesEncrypted NotEncrypted
}
finally
{
Clean-ResourceGroup($resourceGroupName)
}
}
function Test-AzureDiskEncryptionLnxManagedDisk
{
$testMode = Get-ComputeTestMode
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_D2S_V3';
$vmname = 'vm' + $rgname;
$imagePublisher = "RedHat";
$imageOffer = "RHEL";
$imageSku = "7.5";
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'linuxOsDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/linuxos.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -Caching $osDiskCaching -CreateOption FromImage -Linux;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred;
$p = Set-AzVMSourceImage -VM $p -PublisherName $imagePublisher -Offer $imageOffer -Skus $imageSku -Version "latest"
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imageOffer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imagePublisher;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imageSku;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$kv = Create-KeyVault $rgname $loc;
Assert-ThrowsContains { Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmname -DiskEncryptionKeyVaultUrl $kv.DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $kv.DiskEncryptionKeyVaultId -VolumeType "OS" -Force; } `
"skipVmBackup parameter is a required parameter for encrypting Linux VMs with managed disks";
}
finally
{
Clean-ResourceGroup($rgname)
}
}
function Test-AzureDiskEncryptionExtension
{
$aadAppName = "detestaadapp";
$rgName = Get-ComputeTestResourceName;
$loc = Get-ComputeVMLocation;
$adminUser = "Foo12";
$adminPassword = $PLACEHOLDER;
$vaultName = "detestvault";
$vault2Name = "detestvault2";
$kekName = "dstestkek";
$vmName = "detestvm";
$vmsize = 'Standard_DS2';
$imagePublisher = "MicrosoftWindowsServer";
$imageOffer = "WindowsServer";
$imageSku ="2012-R2-Datacenter";
$storageAccountName = "deteststore";
$stotype = 'Premium_LRS';
$vhdContainerName = "vhds";
$osDiskName = 'osdisk' + $vmName;
$dataDiskName = 'datadisk' + $vmName;
$osDiskCaching = 'ReadWrite';
$extraDataDiskName1 = $dataDiskName + '1';
$extraDataDiskName2 = $dataDiskName + '2';
$vnetName = "detestvnet";
$subnetName = "detestsubnet";
$publicIpName = 'pubip' + $vmName;
$nicName = 'nic' + $vmName;
$keyEncryptionAlgorithm = "RSA-OAEP";
$volumeType = "All";
try
{
New-AzResourceGroup -Name $rgName -Location $loc -Force;
$SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName);
if(-not $SvcPrincipals)
{
$identifierUri = [string]::Format("http://localhost:8080/{0}", $rgname);
$defaultHomePage = 'http://contoso.com';
$now = [System.DateTime]::Now;
$oneYearFromNow = $now.AddYears(1);
$aadClientSecret = Get-ResourceName;
$ADApp = New-AzADApplication -DisplayName $aadAppName -HomePage $defaultHomePage -IdentifierUris $identifierUri -StartDate $now -EndDate $oneYearFromNow -Password $aadClientSecret;
Assert-NotNull $ADApp;
$servicePrincipal = New-AzADServicePrincipal -ApplicationId $ADApp.ApplicationId;
$SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName);
Assert-NotNull $SvcPrincipals;
$aadClientID = $servicePrincipal.ApplicationId;
}
else
{
Assert-NotNull $aadClientSecret;
$aadClientID = $SvcPrincipals[0].ApplicationId;
}
$keyVault = New-AzKeyVault -VaultName $vaultName -ResourceGroupName $rgname -Location $loc -Sku standard;
$keyVault = Get-AzKeyVault -VaultName $vaultName -ResourceGroupName $rgname
Set-AzKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $rgname -EnabledForDiskEncryption;
Set-AzKeyVaultAccessPolicy -VaultName $vaultName -ServicePrincipalName $aadClientID -PermissionsToKeys all -PermissionsToSecrets all
$kek = Add-AzKeyVaultKey -VaultName $vaultName -Name $kekName -Destination "Software"
$diskEncryptionKeyVaultUrl = $keyVault.VaultUri;
$keyVaultResourceId = $keyVault.ResourceId;
$keyEncryptionKeyUrl = $kek.Key.kid;
$keyVault2 = New-AzKeyVault -VaultName $vault2Name -ResourceGroupName $rgname -Location $loc -Sku standard;
$keyVault2 = Get-AzKeyVault -VaultName $vault2Name -ResourceGroupName $rgname
Set-AzKeyVaultAccessPolicy -VaultName $vault2Name -ResourceGroupName $rgname -EnabledForDiskEncryption;
Set-AzKeyVaultAccessPolicy -VaultName $vault2Name -ServicePrincipalName $aadClientID -PermissionsToKeys all -PermissionsToSecrets all
$diskEncryptionKeyVaultUrl2 = $keyVault2.VaultUri;
$keyVaultResourceId2 = $keyVault2.ResourceId;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ($subnetName) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ($vnetName) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ($vnetName) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ($publicIpName) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ($publicIpName);
$pubip = Get-AzPublicIpAddress -Name ($publicIpName) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ($nicName) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ($nicName) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
New-AzStorageAccount -ResourceGroupName $rgname -Name $storageAccountName -Location $loc -Type $stotype;
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $storageAccountName)[0].Value;
$osDiskVhdUri = "https://$storageAccountName.blob.core.windows.net/$vhdContainerName/$osDiskName.vhd";
$dataDiskVhdUri = "https://$storageAccountName.blob.core.windows.net/$vhdContainerName/$dataDiskName.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name $dataDiskName -Caching 'ReadOnly' -DiskSizeInGB 2 -Lun 1 -VhdUri $dataDiskVhdUri -CreateOption Empty;
$securePassword = ConvertTo-SecureString $adminPassword -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($adminUser, $securePassword);
$computerName = $vmName;
$vhdContainer = "https://$storageAccountName.blob.core.windows.net/$vhdContainerName";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$p = Set-AzVMSourceImage -VM $p -PublisherName $imagePublisher -Offer $imageOffer -Skus $imageSku -Version "latest";
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -Force;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $vmName;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $true;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $true;
Assert-NotNull $OsVolumeEncryptionSettings;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SecretUrl;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SourceVault;
Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl2 -DiskEncryptionKeyVaultId $keyVaultResourceId2 -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -Force;
$p = Add-AzVMDataDisk -VM $p -Name $extraDataDiskName1 -Caching 'ReadOnly' -DiskSizeInGB 2 -Lun 1 -VhdUri $dataDiskVhdUri -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name $extraDataDiskName2 -Caching 'ReadOnly' -DiskSizeInGB 2 -Lun 1 -VhdUri $dataDiskVhdUri -CreateOption Empty;
Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -Force;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $vmName;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $true;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $true;
Assert-NotNull $OsVolumeEncryptionSettings;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SecretUrl;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SourceVault;
Disable-AzVMDiskEncryption -ResourceGroupName $rgname -VMName $vmName;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $p.StorageProfile.OSDisk.Name;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $false;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $false;
Remove-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $vmName;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $false;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $false;
Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -Force;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $vmName;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $true;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $true;
Assert-NotNull $OsVolumeEncryptionSettings;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SecretUrl;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SourceVault;
Set-AzVMDiskEncryptionExtension -ResourceGroupName $rgname -VMName $vmName -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -Force;
$encryptionStatus = Get-AzVmDiskEncryptionStatus -ResourceGroupName $rgname -VMName $vmName;
$OsVolumeEncryptionSettings = $encryptionStatus.OsVolumeEncryptionSettings;
Assert-AreEqual $encryptionStatus.OsVolumeEncrypted $true;
Assert-AreEqual $encryptionStatus.DataVolumesEncrypted $true;
Assert-NotNull $OsVolumeEncryptionSettings;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SecretUrl;
Assert-NotNull $OsVolumeEncryptionSettings.DiskEncryptionKey.SourceVault;
Assert-Null $OsVolumeEncryptionSettings.KeyEncryptionKey.SecretUrl;
Assert-Null $OsVolumeEncryptionSettings.KeyEncryptionKey.SourceVault;
Remove-AzVm -ResourceGroupName $rgname -Name $vmName -Force;
$p.StorageProfile.ImageReference = $null;
$p.OSProfile = $null;
$p.StorageProfile.DataDisks = $null;
$p = Set-AzVMOSDisk -VM $p -Name $p.StorageProfile.OSDisk.Name -VhdUri $p.StorageProfile.OSDisk.Vhd.Uri -Caching ReadWrite -CreateOption attach -DiskEncryptionKeyUrl $encryptionStatus.OsVolumeEncryptionSettings.DiskEncryptionKey.SecretUrl -DiskEncryptionKeyVaultId $encryptionStatus.OsVolumeEncryptionSettings.DiskEncryptionKey.SourceVault.Id -Windows;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-VirtualMachineBginfoExtension
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p -DisableBginfoExtension;
$vm1 = Get-AzVM -ResourceGroupName $rgname -Name $vmname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
$extname = 'csetest';
$extver = '2.1';
Set-AzVMBginfoExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -TypeHandlerVersion $extver;
$publisher = 'Microsoft.Compute';
$exttype = 'BGInfo';
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.UserName $user2;
Assert-NotNull $ext.ProvisioningState;
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
$vm1 = Get-AzVM -ResourceGroupName $rgname -Name $vmname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 1;
Assert-AreEqual $vm1.Extensions[0].Name $extname;
Assert-AreEqual $vm1.Extensions[0].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[0].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[0].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[0].TypeHandlerVersion $extver;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineExtensionWithSwitch
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A2';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = 'csetest';
$publisher = 'Microsoft.Compute';
$exttype = 'CustomScriptExtension';
$extver = '1.1';
$settingstr = '{"fileUris":[],"commandToExecute":""}';
$protectedsettingstr = '{"storageAccountName":"' + $stoname + '","storageAccountKey":"' + $stokey + '"}';
Set-AzVMExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname `
-Name $extname -Publisher $publisher `
-ExtensionType $exttype -TypeHandlerVersion $extver -SettingString $settingstr -ProtectedSettingString $protectedsettingstr `
-DisableAutoUpgradeMinorVersion -ForceRerun "RerunExtension";
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
Assert-False{$ext.AutoUpgradeMinorVersion};
Assert-AreEqual $ext.ForceUpdateTag "RerunExtension";
$ext = Get-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
Assert-NotNull $ext.SubStatuses;
Remove-AzVMExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineADDomainExtension
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = 'csetest';
$extver = '1.3';
$domainName = "Workgroup2"
Set-AzVMADDomainExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname -Name $extname -DomainName $domainName;
$publisher = 'Microsoft.Compute';
$exttype = 'JsonADDomainExtension';
$ext = Get-AzVMADDomainExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-AreEqual $domainName $ext.DomainName;
Assert-Null $ext.OUPath;
Assert-Null $ext.User;
Assert-AreEqual 0 $ext.JoinOption;
Assert-False {$ext.Restart};
$ext = Get-AzVMADDomainExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
Assert-AreEqual $domainName $ext.DomainName;
Assert-Null $ext.OUPath;
Assert-Null $ext.User;
Assert-AreEqual 0 $ext.JoinOption;
Assert-False {$ext.Restart};
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
Remove-AzVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineADDomainExtensionDomainJoin
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
Retry-IfException { $global:stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; }
$stokey = (Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname)[0].Value;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent;
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.OSProfile.WindowsConfiguration.ProvisionVMAgent $true;
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$extname = 'csetest';
$extver = '1.3';
$domainName = "dom123.com";
$user2 = 'dom123.com\Bar12';
$password2 = $PLACEHOLDER;
$securePassword2 = ConvertTo-SecureString $password2 -AsPlainText -Force;
$cred2 = New-Object System.Management.Automation.PSCredential ($user2, $securePassword2);
$ouPath = "OU=testOU,DC=domain,DC=Domain,DC=com";
Assert-ThrowsContains { Set-AzVMADDomainExtension -ResourceGroupName $rgname -Location $loc -VMName $vmname -Name $extname `
-DomainName $domainName -Credential $cred2 -OUPath $ouPath -JoinOption 3 -Restart; } `
"occured while joining Domain";
$publisher = 'Microsoft.Compute';
$exttype = 'JsonADDomainExtension';
$ext = Get-AzVMADDomainExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-AreEqual $domainName $ext.DomainName;
Assert-AreEqual $ouPath $ext.OUPath;
Assert-AreEqual $user2 $ext.User;
Assert-AreEqual 3 $ext.JoinOption;
Assert-True {$ext.Restart};
$ext = Get-AzVMADDomainExtension -ResourceGroupName $rgname -VMName $vmname -Name $extname -Status;
Assert-AreEqual $ext.ResourceGroupName $rgname;
Assert-AreEqual $ext.Name $extname;
Assert-AreEqual $ext.Publisher $publisher;
Assert-AreEqual $ext.ExtensionType $exttype;
Assert-AreEqual $ext.TypeHandlerVersion $extver;
Assert-NotNull $ext.ProvisioningState;
Assert-NotNull $ext.Statuses;
Assert-AreEqual $domainName $ext.DomainName;
Assert-AreEqual $ouPath $ext.OUPath;
Assert-AreEqual $user2 $ext.User;
Assert-AreEqual 3 $ext.JoinOption;
Assert-True {$ext.Restart};
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions.Count 2;
Assert-AreEqual $vm1.Extensions[1].Name $extname;
Assert-AreEqual $vm1.Extensions[1].Type 'Microsoft.Compute/virtualMachines/extensions';
Assert-AreEqual $vm1.Extensions[1].Publisher $publisher;
Assert-AreEqual $vm1.Extensions[1].VirtualMachineExtensionType $exttype;
Assert-AreEqual $vm1.Extensions[1].TypeHandlerVersion $extver;
Assert-NotNull $vm1.Extensions[1].Settings;
Remove-AzVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/Get-UcsServerVlan.ps1
|
Get-UcsServerVlan.ps1
|
function Get-UcsServerVlan {
Get-UcsServiceProfile | Foreach-Object {
$sp = $_
$sp | Get-UcsVnic | Foreach-Object {
$vn = $_
$vn | Get-UcsVnicInterface | Foreach-Object {
$output = New-Object psobject –property @{
Server = $sp.Name
Vnic = $vn.name
Vlan = $_.name
}
Write-Output $output
}
}
}
}
|
combined_dataset/train/non-malicious/sample_45_94.ps1
|
sample_45_94.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmtraces'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmtraces.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b8a6f9e5-94d6-4c39-9ded-9767df367b9b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmtraces Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmtraces.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmtracesAggregatedSnapshot',
'Get-OCIApmtracesQuickPicksList', 'Get-OCIApmtracesSpan',
'Get-OCIApmtracesStatusAutoActivate', 'Get-OCIApmtracesTrace',
'Get-OCIApmtracesTraceSnapshot',
'Invoke-OCIApmtracesBulkActivateAttribute',
'Invoke-OCIApmtracesBulkDeActivateAttribute',
'Invoke-OCIApmtracesBulkPinAttribute',
'Invoke-OCIApmtracesBulkUnpinAttribute',
'Invoke-OCIApmtracesBulkUpdateAttribute',
'Invoke-OCIApmtracesBulkUpdateAttributeNotes',
'Invoke-OCIApmtracesQuery', 'Write-OCIApmtracesToggleAutoActivate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmtraces'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/SQLPSX SSIS Demo.ps1
|
SQLPSX SSIS Demo.ps1
|
#Edit SSIS.psm1 and Comment/Uncomment 2005 or 2008 version of SSIS assembly
#add-type -AssemblyName "Microsoft.SqlServer.ManagedDTS, Version=9.0.242.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91"
add-type -AssemblyName "Microsoft.SqlServer.ManagedDTS, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91"
#Import the SSIS module
import-module SSIS
#Work with SSIS packages stored on the file system
$packages = dir "C:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Packages\\*" | select -ExpandProperty Fullname | foreach {get-ispackage -path $_ }
$packages | foreach {$package = $_; $_.Configurations | Select @{n='Package';e={$Package.DisplayName}}, Name,ConfigurationString}
$packages | foreach {$package = $_; $_.Connections | Select @{n='Package';e={$Package.DisplayName}}, Name,ConnectionString}
#Create a new folder on the SSIS server
new-isitem "\\msdb" "sqlpsx" "Z002"
#Copy SSIS packages from the file system to SQL Server and change the connection string for SSISCONFIG
copy-isitemfiletosql -path "C:\\Program Files\\Microsoft SQL Server\\100\\DTS\\Packages\\*" -destination "msdb\\sqlpsx" -destinationServer "Z002" -connectionInfo @{SSISCONFIG=".\\SQLEXPRESS"}
#Work with SSIS packages on SQL Server
$packages = get-isitem -path '\\sqlpsx' -topLevelFolder 'msdb' -serverName "Z002\\SQL2K8" | where {$_.Flags -eq 'Package'} | foreach {get-ispackage -path $_.literalPath -serverName $_.Servername}
$packages | foreach {$package = $_; $_.Configurations | Select @{n='Package';e={$Package.DisplayName}}, Name,ConfigurationString}
$packages | foreach {$package = $_; $_.Connections | Select @{n='Package';e={$Package.DisplayName}}, Name,ConnectionString}
|
combined_dataset/train/non-malicious/1923.ps1
|
1923.ps1
|
function New-NestedJson {
Param(
[ValidateRange(1, 2048)]
[int]
$Depth
)
$nestedJson = "true"
$Depth..1 | ForEach-Object {
$nestedJson = '{"' + $_ + '":' + $nestedJson + '}'
}
return $nestedJson
}
function Count-ObjectDepth {
Param([PSCustomObject] $InputObject)
for ($i=1; $i -le 2048; $i++)
{
$InputObject = Select-Object -InputObject $InputObject -ExpandProperty $i
if ($InputObject -eq $true)
{
return $i
}
}
}
Describe 'ConvertFrom-Json Unit Tests' -tags "CI" {
BeforeAll {
$testCasesWithAndWithoutAsHashtableSwitch = @(
@{ AsHashtable = $true }
@{ AsHashtable = $false }
)
}
It 'Can convert a single-line object with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
('{"a" : "1"}' | ConvertFrom-Json -AsHashtable:$AsHashtable).a | Should -Be 1
}
It 'Can convert one string-per-object with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
$json = @('{"a" : "1"}', '{"a" : "x"}') | ConvertFrom-Json -AsHashtable:$AsHashtable
$json.Count | Should -Be 2
$json[1].a | Should -Be 'x'
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
}
It 'Can convert multi-line object with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
$json = @('{"a" :', '"x"}') | ConvertFrom-Json -AsHashtable:$AsHashtable
$json.a | Should -Be 'x'
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
}
It 'Can convert an object with Newtonsoft.Json metadata properties with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
$id = 13
$type = 'Calendar.Months.December'
$ref = 1989
$json = '{"$id":' + $id + ', "$type":"' + $type + '", "$ref":' + $ref + '}' | ConvertFrom-Json -AsHashtable:$AsHashtable
$json.'$id' | Should -Be $id
$json.'$type' | Should -Be $type
$json.'$ref' | Should -Be $ref
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
}
It 'Can convert an object of depth 1024 by default with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
$nestedJson = New-NestedJson -Depth 1024
$json = $nestedJson | ConvertFrom-Json -AsHashtable:$AsHashtable
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
else
{
$json | Should -BeOfType PSCustomObject
}
}
It 'Fails to convert an object of depth higher than 1024 by default with AsHashtable switch set to <AsHashtable>' -TestCases $testCasesWithAndWithoutAsHashtableSwitch {
Param($AsHashtable)
$nestedJson = New-NestedJson -Depth 1025
{ $nestedJson | ConvertFrom-Json -AsHashtable:$AsHashtable } |
Should -Throw -ErrorId "System.ArgumentException,Microsoft.PowerShell.Commands.ConvertFromJsonCommand"
}
It 'Can convert null' {
'null' | ConvertFrom-Json | Should -Be $null
$out = '[1, null, 2]' | ConvertFrom-Json
$out.Length | Should -Be 3
$out[0] | Should -Be 1
$out[1] | Should -Be $null
$out[2] | Should -Be 2
}
}
Describe 'ConvertFrom-Json -Depth Tests' -tags "Feature" {
BeforeAll {
$testCasesJsonDepthWithAndWithoutAsHashtableSwitch = @(
@{ Depth = 2; AsHashtable = $true }
@{ Depth = 2; AsHashtable = $false }
@{ Depth = 200; AsHashtable = $true }
@{ Depth = 200; AsHashtable = $false }
@{ Depth = 2000; AsHashtable = $true }
@{ Depth = 2000; AsHashtable = $false }
)
}
It 'Can convert an object with depth less than Depth param set to <Depth> and AsHashtable switch set to <AsHashtable>' -TestCases $testCasesJsonDepthWithAndWithoutAsHashtableSwitch {
Param($AsHashtable, $Depth)
$nestedJson = New-NestedJson -Depth ($Depth - 1)
$json = $nestedJson | ConvertFrom-Json -AsHashtable:$AsHashtable -Depth $Depth
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
else
{
$json | Should -BeOfType PSCustomObject
}
(Count-ObjectDepth -InputObject $json) | Should -Be ($Depth - 1)
}
It 'Can convert an object with depth equal to Depth param set to <Depth> and AsHashtable switch set to <AsHashtable>' -TestCases $testCasesJsonDepthWithAndWithoutAsHashtableSwitch {
Param($AsHashtable, $Depth)
$nestedJson = New-NestedJson -Depth:$Depth
$json = $nestedJson | ConvertFrom-Json -AsHashtable:$AsHashtable -Depth $Depth
if ($AsHashtable)
{
$json | Should -BeOfType Hashtable
}
else
{
$json | Should -BeOfType PSCustomObject
}
(Count-ObjectDepth -InputObject $json) | Should -Be $Depth
}
It 'Fails to convert an object with greater depth than Depth param set to <Depth> and AsHashtable switch set to <AsHashtable>' -TestCases $testCasesJsonDepthWithAndWithoutAsHashtableSwitch {
Param($AsHashtable, $Depth)
$nestedJson = New-NestedJson -Depth ($Depth + 1)
{ $nestedJson | ConvertFrom-Json -AsHashtable:$AsHashtable -Depth $Depth } |
Should -Throw -ErrorId "System.ArgumentException,Microsoft.PowerShell.Commands.ConvertFromJsonCommand"
}
}
|
combined_dataset/train/non-malicious/sample_9_47.ps1
|
sample_9_47.ps1
|
ConvertFrom-StringData @'
id_servermanagerinfo=Server Manager Information
id_servermanagerobtaining=Obtaining Server Manager logs and role information
id_servermanageroclist=Optional Components list (oclist)
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZUsAAPH0D09Vv
# zSE0jcoPBSgr4w2wPtd9Kdk/GsnxrKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHZLg725EP+uD1zR5EcI0IuX
# IF6yDRsrWRWtTfv1JA4yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAnTuCBG5Q6ILj5QJaGx7IFjhkZ7NbtbtRWa0eXxwEGzEB5yPQfJJFByJ5
# K1vLMCFTEUwhm3edg2sSO+pAhMpup25QKT0G9JISnwgSgMWmvAcifU0xZ89FgNEB
# JBdHYDrJmsfCG1XWj402ufl4QLjXK57RDo9UhjMXn3Ej2nTGwlUyuKsXPnAU+Y5e
# CvkHkKSuylxWSWtKbnje0jVO/Jw6v5ltwuWf9ZY3AdL++c4vEE9OrlsW5LHchNFf
# 8ESlw7ysD0fLlblh/WypmqmQhiyMxsMZqon3wCK7pTooQaA8G209WB/qXfKLordQ
# aJ0vSN4Rt1fpXKz/LcAB2o/XZJOkG6GCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCMfIxvD/r/MVqA7UVIIXB9/MkDg6h960h6AuWik9/K2wIGZutC6/TG
# GBMyMDI0MTAyODExNDA0Mi41MTZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe
# gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN
# 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F
# mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi
# YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h
# 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss
# jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h
# KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp
# LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly
# 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K
# iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX
# nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2
# g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0
# dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv
# sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G
# cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk
# 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB
# RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX
# GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV
# OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ
# RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI
# lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r
# AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F
# uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0MTAyOTA5MDQwOFowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEAAgIIsAIB/zAHAgEAAgIS
# xjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzScy1wBbp
# cAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG0qSOBjk7VgyCvjFMirT1
# 1HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpeE+oE9viQRHMLsU/3b8hu
# zWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSjn3XQ0nllmNeGCeUkdIsN
# TpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/aN3CjM0gf25XwDETanz7K
# LbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9FVUpwZNtKUwYSNiOSsA9
# S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgJ+wvKPEr
# GceNlPIX3RdiIb3A1WMuWz2dvcPYhn1WocswgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA
# AAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH65KUaSnvoMA0GCSqGSIb3
# DQEBCwUABIICAKLd0O35yBKkD6akE0MPzH6zzDL1S9qVM/2G1HU10JkMuGs9WJ6X
# dDX327w/U6dOP37k+9agHYP6AwEQ3yNqC6qoO4v4dqBW7kshTkgDvmcgfi79JWZP
# DoU5HDdoya/Sw4aJ47APAdK5y+fT2RvXQRW2rU3JcAna743Sl7ydnilReEAevc7y
# IRPXQ9NiRob3aN0u4C+df7GtUuhQWaKy+Z6O+xxnzpeDBRlT+7NnkJEIHYw8RaJ/
# PbjB9L5Bgsc6CMNFEzYzVQjscg5dW8i70z+lCWeEMAJQmWAW4DEDOd+gZtYxEBuL
# L2jgHSGDbCGYCG/mmfR0OTELEJFGXamDuE2lRuPST0jRvNsgNtntoENKZNXUtJ8y
# JF+Ab9RGHQ7vVnWiG/JSDG+64x24BA9XhOo+XewR2q+O2UznGi6wSk4mXcu/3/PS
# 6gtJgHMzVjLZ8brhbBz5V9hzypzuHN8IYKhiJyC0nwJREWcYsMBzEvCSbeFTb4IL
# JzMcq8kSOFOcAaYkmsYROTm5NO9B6rKWrcDQ/w4J/MDzqpqbXTdvHJ3DVTTgTn3s
# TSm/hyXCkWIeAKDgEGS2n+j8vQJdIRi2Umhlrd3D/y8yJRdEklWiEK1FJZHHyZ1R
# proeJhbkLLMkZaDbCk947BmjEUsiXxqW2mo43gOB40g+HDAVIus/cWys
# SIG # End signature block
|
combined_dataset/train/non-malicious/1335.ps1
|
1335.ps1
|
function Enable-CIisSecurityAuthentication
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$SiteName,
[Alias('Path')]
[string]
$VirtualPath = '',
[Parameter(Mandatory=$true,ParameterSetName='Anonymous')]
[Switch]
$Anonymous,
[Parameter(Mandatory=$true,ParameterSetName='Basic')]
[Switch]
$Basic,
[Parameter(Mandatory=$true,ParameterSetName='Windows')]
[Switch]
$Windows
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$authType = $pscmdlet.ParameterSetName
$getArgs = @{ $authType = $true; }
$authSettings = Get-CIisSecurityAuthentication -SiteName $SiteName -VirtualPath $VirtualPath @getArgs
if( $authSettings.GetAttributeValue('enabled') )
{
return
}
$authSettings.SetAttributeValue('enabled', 'true')
$fullPath = Join-CIisVirtualPath $SiteName $VirtualPath
if( $pscmdlet.ShouldProcess( $fullPath, ("enable {0}" -f $authType) ) )
{
$authSettings.CommitChanges()
}
}
|
combined_dataset/train/non-malicious/sample_40_22.ps1
|
sample_40_22.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apigateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apigateway.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apigateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent',
'Get-OCIApigatewayApiDeploymentSpecification',
'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations',
'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList',
'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList',
'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList',
'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList',
'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber',
'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan',
'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest',
'Get-OCIApigatewayWorkRequestErrorsList',
'Get-OCIApigatewayWorkRequestLogsList',
'Get-OCIApigatewayWorkRequestsList',
'Move-OCIApigatewayApiCompartment',
'Move-OCIApigatewayCertificateCompartment',
'Move-OCIApigatewayDeploymentCompartment',
'Move-OCIApigatewayGatewayCompartment',
'Move-OCIApigatewaySubscriberCompartment',
'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi',
'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment',
'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk',
'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan',
'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate',
'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway',
'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber',
'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest',
'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate',
'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway',
'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber',
'Update-OCIApigatewayUsagePlan'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_33_71.ps1
|
sample_33_71.ps1
|
<#
/// <copyright>
/// INTEL CONFIDENTIAL
///
/// Copyright 2014 Intel Corporation
///
/// This software and the related documents are Intel copyrighted materials, and your use of
/// them is governed by the express license under which they were provided to you ("License").
/// Unless the License provides otherwise, you may not use, modify, copy, publish, distribute,
/// disclose or transmit this software or the related documents without Intel's prior written
/// permission.
///
/// This software and the related documents are provided as is, with no express or implied
/// warranties, other than those that are expressly stated in the License.
///
/// </copyright>
#>
#User input arguments
param
(
[Parameter(Mandatory=$true)]
[string]$Action,
[string]$ConfigPath,
[switch]$BDF
)
#Global file variables
$Script:context
$Script:service
$Script:lockobj
$script:options
$Script:Adapters = $null
$Script:bSave = $false
$Script:bRestore = $false
$Script:bRemove = $false
$Script:bUpSave = $false
$Script:bUpRestore = $false
$Script:bANSInstalled = $true
$Script:colImportAdapters = $null
$Script:EnabledSystemAdapters = $null
#Save off input parameters to be used in functions
$Script:Action = $Action
$Script:BDF = $BDF
$Script:ConfigPath = $ConfigPath
$Script:ScriptPath = $null
#------------------------ Messages ------------------------
$Script:Messages = @{
Usage = @"
Intel(R) SaveRestore.ps1
Copyright 2014 Intel Corporation. All rights reserved.
Usage: SaveRestore.ps1 -Action -ConfigPath -BDF
Example: SaveRestore.ps1 –Action save –ConfigPath C:\*File Path*\config.txt
-Action is required. Valid values are 'save' and 'restore.'
-ConfigPath is optional. It specifies the path and file name of the main configuration save file. If not specified, it is the script path and default file name (Saved_Config.txt).
NOTE: The Saved_StaticIP.txt file name does not change and is always saved and restored from the script path.
-BDF is optional. If specified during a restore, it will restore settings to adapters using their bus/device/function.
The default configuration file names are Saved_Config.txt and Saved_StaticIP.txt.
"@;
# Performing a save/restore of configuration file at $Script:ConfigPath
RunningSaveRestore = "Performing a save/restore of configuration file at";
SettingOEMValue = "Setting OEM custom value.";
# Restoring primary and secondary adapters on $Team.TeamName
RestoringTeamAdapters = "Restoring primary and secondary adapters on";
# Restoring $Team.TeamName / $Vlan.VlanName
Restoring = "Restoring"
RestoringAdapterIP = "Restoring adapter IP settings."
RestoringTeamIP = "Restoring team IP settings."
RestoringVLANIP = "Restoring VLAN IP settings."
RestoringAdapterSettings = "Restoring adapter settings."
RestoringTeamSettings = "Restoring team settings."
RestoringVLANSettings = "Restoring VLAN settings."
RestoringAdapterPartition = "Restoring adapter partition settings."
NICPartitioningDetected = "Detected a device configured for NIC partitioning. We recommend you use the -BDF option when restoring."
PerformingSave = "Saving the configuration."
PerformingUpgradeSave = "Upgrading and saving the configuration."
PerformingRestore = "Restoring the configuration."
PerformingUpgradeRestore = "Upgrading and restoring the configuration."
PerformingRemove = "Removing the team and VLAN device configuration."
# $Script:ConfigPath file already exists. Do you want to overwrite it (y/n)?
FileExistsPrompt = "file already exists. Do you want to overwrite it (y/n)?"
#------------------------ Errors ------------------------
# No objects found for $class
NoObjectsFound = "No objects found for"
AdminRequired = "The save/restore script requires administrative rights. Please log in as an Administrator and try again."
PROSetRequired = "The save/restore script requires Intel® PROSet to be installed. Please install Intel PROSet and try again."
# Could not find the restore configuration file at $Script:ConfigPath. Please provide a path to the configuration file.
ConfigNotFoundPart1 = "Could not find the restore configuration file at"
ConfigNotFoundPart2 = "Please provide a valid path to the configuration file."
# Configuration path $FilePath does not exist. Please provide a valid path.
ConfigPathDoesntExist1 = "A directory in"
ConfigPathDoesntExist2 = "does not exist. Please provide a valid path."
ConfigFileNotSpecified = "No configuration file name specified. Please provide a valid file name."
# Unable to set ... on ...
UnableToSetPart1 = "Unable to set"
UnableToSetPart2 = "on"
#----------------------- Warnings -----------------------
UnableToFindDevice = "Unable to find Device. Please verify configuration file matches your system configuration."
UnableToFindANS = "Intel(R) ANS is not present on the system. Any Team and VLAN information contained in the configuration file will not be restored."
}
#-----------------------------------------------------[Functions]------------------------------------------------------
# Set WMI lock
Function BeginApply
{
# retrieve instance
$Script:service = Get-WMiobject -class IAnet_netservice -namespace root\intelncs2
# create [in] parameters
$inparams = $Script:service.GetMethodParameters("BeginApply")
# spawn management object
$Script:options = new-object System.Management.InvokeMethodOptions
# add context for this script
$Script:options.Context.Add('SaveRestoreApply', $true)
$Script:options.Context.Add('GET_EXTENSIONS', $true)
$Script:options.Context.Add('GET_EXT_KEYS_ONLY', $false)
$Script:options.Context.Add('IANet_PartialData', 512)
# obtain lock
$Script:lockobj = $Script:service.InvokeMethod("BeginApply", $inparams, $Script:options)
# this is necessary to set the lock into a new object
$Script:context = new-object System.Management.ManagementNamedValueCollection
# adding a new single named value to the collection with the value of the lock objects client handle
$Script:context.Add('ClientSetId', [int] $Script:lockobj.ClientSetHandle)
$Script:context.Add('SaveRestoreApply', $true)
}
# Remove WMI lock
Function ReleaseLock
{
$inparams = $Script:service.GetMethodParameters("Apply")
$inparams.ClientSetHandle=[int]$Script:lockobj.ClientSetHandle
$null = $Script:Service.InvokeMethod("Apply", $inparams, $null)
}
Function NewObject ($class)
{
$classdef = New-Object System.Management.ManagementClass $class
# the new object options
$classdef.Options.UseAmendedQualifiers = $true
$classdef.Options.Context = $Script:context
return $classdef
}
Function DeleteObject ($object)
{
Write-Log $MyInvocation.MyCommand
Write-Log $object
# the delete options
$deleteoptions = New-Object System.Management.DeleteOptions
$deleteoptions.Context = $Script:context
$object.Delete($deleteoptions)
}
Function SetSetting ($setting)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$setting = $setting"
# the put options
$putoptions = New-Object System.Management.PutOptions($Script:context)
$putoptions.UseAmendedQualifiers = $true
#perform put
$null = $setting.Put($putoptions)
}
# Get specified class object from WMI
Function GetObject($class)
{
$querystring = [string] "SELECT * FROM $class"
$query = New-Object System.Management.ObjectQuery($querystring)
# the enumeration options
$enumerate_option = New-Object System.Management.EnumerationOptions
$enumerate_option.UseAmendedQualifiers = $true
$enumerate_option.Context = $Script:context
# setup scope
$DMiXPath = New-Object System.Management.ManagementPath
$DMiXPath.NamespacePath = "root\intelncs2"
$scope = New-Object System.Management.ManagementScope($DMiXPath)
$scope.Connect()
# the searcher for the object
$searcher = New-Object System.Management.ManagementObjectSearcher($scope, $query, $enumerate_option)
$collection = $searcher.Get()
# If the Get() above fails, it won't be caught until the return happens. So catch it and display an appropriate message.
try
{
return $collection
}
catch
{
$ErrorMessage = [string]$Messages.NoObjectsFound
Write-Error "$ErrorMessage $class"
Write-Log "$ErrorMessage $class"
exit
}
}
# Get associated objects given the object path and where condition
Function GetAssociated($path, $where)
{
$querystring = [string] "ASSOCIATORS OF {$path} WHERE $where"
$query = New-Object System.Management.ObjectQuery($querystring)
# the enumeration options
$enumerate_option = New-Object System.Management.EnumerationOptions
$enumerate_option.UseAmendedQualifiers = $true
$enumerate_option.Context = $Script:context
# setup scope
$DMiXPath = New-Object System.Management.ManagementPath
$DMiXPath.NamespacePath = "root\intelncs2"
$scope = New-Object System.Management.ManagementScope($DMiXPath)
$scope.Connect()
# the searcher for the object
$searcher = New-Object System.Management.ManagementObjectSearcher($scope, $query, $enumerate_option)
$collection = $searcher.Get()
return $collection
}
# Invoke a method given it's name, class and parameters
Function InvokeMethod($Class,$Method,$ColParameterName,$ColParameterValue)
{
$Invoke_option = New-Object System.Management.InvokeMethodOptions
$Invoke_option.Context = $Script:context
$params = $null
if ($null -ne $ColParameterName)
{
$params = $Class.psbase.GetMethodParameters($Method)
if ($ColParameterName.count -gt 1)
{
for($i=0; $i -lt $ColParameterName.count; $i++)
{
$params.psbase.SetPropertyValue($ColParameterName[$i],$ColParameterValue[$i])
}
}
else
{
$params.psbase.SetPropertyValue($ColParameterName,$ColParameterValue)
}
}
return $Class.psbase.InvokeMethod($Method,$params,$Invoke_option)
}
# Function used to write objects to config file.
Function WriteObjectToConfigFile($NewObjects,$Properties)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$NewObjects = $NewObjects"
Write-Log "`$Properties = $Properties"
if ($null -ne $NewObjects)
{
$ExportObject = $NewObjects | Select-Object $Properties | ConvertTo-Csv -NoTypeInformation
$ExportObject = $ExportObject[1..$ExportObject.Count]
WriteTextToConfigFile $ExportObject
}
}
# Function used to write text to config file.
Function WriteTextToConfigFile($NewText)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$NewText = $NewText"
$NewText | Out-File $Script:ConfigPath -Encoding utf8 -Append
}
# Function used to write objects to the IP config file.
Function WriteObjectToIPFile($NewObjects,$Properties)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$NewObjects = $NewObjects"
Write-Log "`$Properties = $Properties"
if ($null -ne $NewObjects)
{
$ExportObject = $NewObjects | Select-Object $Properties | ConvertTo-Csv -NoTypeInformation
$ExportObject = $ExportObject[1..$ExportObject.Count]
WriteTextToIPFile $ExportObject
}
}
# Function used to write text to IP config file.
Function WriteTextToIPFile($NewText)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$NewText = $NewText"
$NewText | Out-File $Script:ScriptPath\Saved_StaticIP.txt -Encoding utf8 -Append
}
# Function used to read objects from config file given a file section.
Function ReadFromConfigFile($FileSection)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$FileSection = $FileSection"
$FileObjects=@()
$FileObjects = Get-Content $Script:ConfigPath
switch($FileSection)
{
"Adapters"
{
#Find the section for adapters and add 1 to not include AdaptersStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"AdaptersStart") + 1
#Find the end of the section and remove 1 to not include AdaptersEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"AdaptersEnd") - 1
$colProperty = "Name","OriginalDisplayName","PermanentAddress","PCIDeviceID","SlotID"
break
}
"AdapterSettings"
{
#Find the section for adapters and add 1 to not include AdapterSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"AdapterSettingsStart") + 1
#Find the end of the section and remove 1 to not include AdapterSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"AdapterSettingsEnd") - 1
$colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID"
break
}
"OEMSetting"
{
#Find the section for adapters and add 1 to not include OEMSettingStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"OEMSettingStart") + 1
#Find the end of the section and remove 1 to not include OEMSettingEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"OEMSettingEnd") - 1
$colProperty = "OEMCustomizeable"
break
}
"PMSettings"
{
#Find the section for adapters and add 1 to not include PMSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"PMSettingsStart") + 1
#Find the end of the section and remove 1 to not include PMSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"PMSettingsEnd") - 1
$colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID"
break
}
"Teams"
{
#Find the section for adapters and add 1 to not include TeamsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"TeamsStart") + 1
#Find the end of the section and remove 1 to not include TeamsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"TeamsEnd") - 1
$colProperty = "TeamName","TeamMembers","TeamMode","PrimaryAdapter","SecondaryAdapter"
break
}
"TeamSettings"
{
#Find the section for adapters and add 1 to not include TeamSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"TeamSettingsStart") + 1
#Find the end of the section and remove 1 to not include TeamSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"TeamSettingsEnd") - 1
$colProperty = "TeamName","Caption","CurrentValue","CurrentValues"
break
}
"Vlans"
{
#Find the section for adapters and add 1 to not include VlansStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"VlansStart") + 1
#Find the end of the section and remove 1 to not include VlansEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"VlansEnd") - 1
$colProperty = "ParentName","VLANID","VLANNAME","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID"
break
}
"VlanSettings"
{
#Find the section for adapters and add 1 to not include VlanSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"VlanSettingsStart") + 1
#Find the end of the section and remove 1 to not include VlanSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"VlanSettingsEnd") - 1
$colProperty = "ParentName","Name","VLANID","Caption","CurrentValue","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID"
break
}
"NICPARTSettings"
{
#Find the section for adapters and add 1 to not include NICPARTSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"NICPARTSettingsStart") + 1
#Find the end of the section and remove 1 to not include NICPARTSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"NICPARTSettingsEnd") - 1
$colProperty = "Name","PartitionNumber","Identifier","MinBWPercent","MaxBWPercent"
break
}
Default
{
return
}
}
#If no items were found in the provided section return nothing
if ($CsvEnd -lt $CsvObjectStart)
{
return
}
#Else return only the provided section and convert the text into objects
else
{
return $FileObjects[$CsvObjectStart..$CsvEnd] | ConvertFrom-Csv -Header $colProperty
}
}
# Function used to read objects from config file.
Function ReadFromIPFile($FileSection)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$FileSection = $FileSection"
$FileObjects=@()
$FileObjects = Get-Content $Script:ScriptPath\Saved_StaticIP.txt
switch($FileSection)
{
"AdapterIPSettings"
{
#Find the section for adapters and add 1 to not include AdapterIPSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"AdapterIPSettingsStart") + 1
#Find the end of the section and remove 1 to not include AdapterIPSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"AdapterIPSettingsEnd") - 1
$colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID"
break
}
"TeamIPSettings"
{
#Find the section for adapters and add 1 to not include TeamIPSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"TeamIPSettingsStart") + 1
#Find the end of the section and remove 1 to not include TeamIPSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"TeamIPSettingsEnd") - 1
$colProperty = "TeamName","Caption","CurrentValue","CurrentValues"
break
}
"VlanIPSettings"
{
#Find the section for adapters and add 1 to not include VlanIPSettingsStart identifier
$CsvObjectStart = [array]::indexof($FileObjects,"VlanIPSettingsStart") + 1
#Find the end of the section and remove 1 to not include VlanIPSettingsEnd identifier
$CsvEnd = [array]::indexof($FileObjects,"VlanIPSettingsEnd") - 1
$colProperty = "ParentName","VLANID","Caption","CurrentValue","CurrentValues","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID"
break
}
Default
{
return
}
}
# If no items were found in the provided section return nothing
if ($CsvEnd -lt $CsvObjectStart)
{
return
}
# Else return only the provided section and convert the text into objects
else
{
return $FileObjects[$CsvObjectStart..$CsvEnd] | ConvertFrom-Csv -Header $colProperty
}
}
# Add the parent adapter identifiers to the setting objects
Function AddParentIDs($Setting)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$Setting = $Setting"
#Add the PermanentAddress, PCIDeviceID and SlotID to the settings object
$SettingAdapter = $Script:Adapters | Where-Object {$_.DeviceID -eq $Setting.ParentId}
if ($SettingAdapter)
{
$Setting | Add-Member -Name "PermanentAddress" -Value $SettingAdapter.PermanentAddress -MemberType NoteProperty
$Setting | Add-Member -Name "PCIDeviceID" -Value $SettingAdapter.PCIDeviceID -MemberType NoteProperty
$AdapterSlotID = $SettingAdapter.SlotID.split(":")[0..2] #return only the first three elements in array
$AdapterBDF = [string]::Join(':',$AdapterSlotID)
$Setting | Add-Member -Name "SlotID" -Value $AdapterBDF -MemberType NoteProperty
}
}
Function PrintUsage
{
Write-Host $Messages.Usage
exit
}
Function CheckForAdminRights
{
$winIdent = [Security.Principal.WindowsIdentity]::GetCurrent()
$WinPrinc = [Security.Principal.WindowsPrincipal] $winIdent
$AdminId = [Security.Principal.WindowsBuiltInRole] "Administrator"
if (-Not $WinPrinc.IsInRole($AdminId))
{
Write-Error $Messages.AdminRequired
exit
}
}
Function CheckForDMiXInstall
{
Write-Log $MyInvocation.MyCommand
$DMiXInstall = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\DMIX -Name InstalledDMIX -ErrorAction SilentlyContinue
if ((!$DMiXInstall) -or ($DMiXInstall.InstalledDMIX -ne 1))
{
Write-Error $Messages.PROSetRequired
exit
}
}
Function CheckForANSInstall
{
Write-Log $MyInvocation.MyCommand
$ANSInstall = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\DMIX -Name InstalledDMIX_ANS -ErrorAction SilentlyContinue
if ((!$ANSInstall) -or ($ANSInstall.InstalledDMIX_ANS -ne 1))
{
$Script:bANSInstalled = $false
}
}
Function CheckIfConfigFileExists
{
Write-Log $MyInvocation.MyCommand
if (!(Test-Path $Script:ConfigPath -PathType Leaf))
{
$ErrorMessagePart1 = [string]$Messages.ConfigNotFoundPart1
$ErrorMessagePart2 = [string]$Messages.ConfigNotFoundPart2
Write-Error "$ErrorMessagePart1 $Script:ConfigPath. $ErrorMessagePart2"
exit
}
}
Function CheckIfConfigShouldBeOverwritten
{
Write-Log $MyInvocation.MyCommand
if (!(Test-Path $Script:ConfigPath.ToString() -PathType Container))
{
$FileExistsString = [string]$Messages.FileExistsPrompt
$confirmation = Read-Host -Prompt "$Script:ConfigPath $FileExistsString"
if ($confirmation -notmatch "[yY]")
{
exit
}
}
}
Function Write-Log($string)
{
$timestamp = "[$(Get-Date -Format G)] "
$string = $timestamp + $string
Write-Verbose -Message $string
}
# Sets a global variable for the configuration file paths to be saved/restored from.
Function SetupSaveRestoreLocation
{
Write-Log $MyInvocation.MyCommand
$Script:ScriptPath = Get-Location
# If the user did not specify a path, use the scripts path
if ($Script:bUpSave -eq $true -or $Script:bUpRestore -eq $true)
{
$Script:ConfigPath = Get-Location
$Script:ConfigPath = $Script:ConfigPath + "\Upgrade_Saved_Config.txt"
}
elseif (!$Script:ConfigPath)
{
$Script:ConfigPath = Get-Location
$Script:ConfigPath = $Script:ConfigPath + "\Saved_Config.txt"
#Check if the file exist during a save
if ($Script:bSave -eq $true -and (Test-Path $Script:ConfigPath -PathType Leaf))
{
CheckIfConfigShouldBeOverwritten
}
}
else
{
#Only prompt to overwrite if we are doing save and file exists
if (($Script:bSave -eq $true -or $Script:bUpSave -eq $true) -and (Test-Path $Script:ConfigPath -PathType Leaf))
{
CheckIfConfigShouldBeOverwritten
}
#Current dir is default
$FilePath = "."
#Find position of the last backslash before the filename
$FileNamePos = $Script:ConfigPath.ToString().LastIndexOf("\")
#pos = -1 means ConfigPath contains just the file name - use current dir in this case
if ($FileNamePos -ne -1)
{
#Separate the filename from the path to verify path exists
$FilePath = $Script:ConfigPath.ToString().Substring(0, $FileNamePos)
}
#Check that config path exists
if (!(Test-Path $FilePath -PathType Container))
{
$ErrorMessagePart1 = [string]$Messages.ConfigPathDoesntExist1
$ErrorMessagePart2 = [string]$Messages.ConfigPathDoesntExist2
Write-Error "$ErrorMessagePart1 $FilePath $ErrorMessagePart2"
exit
}
#Check the input of the config file when Saving
if ($Script:bSave -eq $true -or $Script:bUpSave -eq $true)
{
Try
{
Out-File $Script:ConfigPath -ErrorAction Stop
}
Catch
{
Write-Error $Messages.ConfigFileNotSpecified
Write-Log $Messages.ConfigFileNotSpecified
exit
}
}
#Check the input of the config file when Restoring
elseif (!(Test-Path $Script:ConfigPath))
{
Write-Error $Messages.ConfigFileNotSpecified
exit
}
}
Write-Host $Messages.RunningSaveRestore $Script:ConfigPath
}
# Get the present and enabled adapters on the system.
Function GetAdaptersOnSystem
{
Write-Log $MyInvocation.MyCommand
#Only store adapters that have a status of 3 (which means enabled)
$Script:EnabledSystemAdapters = GetObject "IANet_PhysicalEthernetAdapter" | Where-Object {($_.StatusInfo -eq 3)} | Sort-Object -Property Name
#Only store adapters that support DMiX or Extended DMiX capability or if it is intel vendor capable and this is an upgrade.
$Script:Adapters = $Script:EnabledSystemAdapters | Where-Object {($_.Capabilities -eq 73) -or ($_.Capabilities -eq 74) -or (($_.Capabilities -eq 47) -and (($bUpSave -eq $true) -or ($bUpRestore -eq $true)))}
#Save Teamable adapters to be referenced for teams
}
# Remove any present configuration files
Function RemoveOldFiles
{
Write-Log $MyInvocation.MyCommand
# check if the file exists before trying to remove it
if (Test-Path $Script:ConfigPath -PathType Leaf)
{
Remove-Item $Script:ConfigPath
}
if (Test-Path $Script:ScriptPath\Saved_StaticIP.txt)
{
Remove-Item $Script:ScriptPath\Saved_StaticIP.txt
}
}
# Save adapters on system to the configuration file
Function SaveAdapters
{
Write-Log $MyInvocation.MyCommand
WriteTextToConfigFile "AdaptersStart"
$colProperty = "Name","OriginalDisplayName","PermanentAddress","PCIDeviceID","SlotID"
WriteObjectToConfigFile $Script:EnabledSystemAdapters $colProperty
WriteTextToConfigFile "AdaptersEnd"
WriteTextToConfigFile ""
}
# Save OEM customization value
Function SaveOEMCustomizeableSetting
{
Write-Log $MyInvocation.MyCommand
WriteTextToConfigFile "OEMSettingStart"
$OEMSetting = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\NCS2 -Name OEMCustomizeable -ErrorAction SilentlyContinue
# If a value is present save it to the config file
if ($null -ne $OEMSetting)
{
WriteObjectToConfigFile $OEMSetting OEMCustomizeable
}
WriteTextToConfigFile "OEMSettingEnd"
WriteTextToConfigFile ""
}
# Save any legacy power management settings
Function SavePowerManagementSettings
{
Write-Log $MyInvocation.MyCommand
$colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID"
WriteTextToConfigFile "PMSettingsStart"
foreach ($Adapter in $Script:Adapters)
{
try
{
#Get the Power Management settings for adapter
$PowerSettingValues = InvokeMethod $Adapter GetPowerUsageOptions $null $null
$PowerSettingProperties = @{Name = $Adapter.Name;
CurrentValue = $PowerSettingValues.AutoPowerSaveModeEnabled;
CurrentValues = {};
PermanentAddress = $Adapter.PermanentAddress;
PCIDeviceID = $Adapter.PCIDeviceID;
SlotID = $Adapter.SlotID}
# Check each Power Management setting to see if it NULL before trying to save it to the config file
# if there is a value, create a custom object and save it to the config file
if ($null -ne $PowerSettingValues.AutoPowerSaveModeEnabled)
{
$Setting = New-Object PSObject -Property $PowerSettingProperties
$Setting | Add-Member -Name "Caption" -Value "AutoPowerSaveModeEnabled" -MemberType NoteProperty
WriteObjectToConfigFile $Setting $colProperty
}
if ($null -ne $PowerSettingValues.ReduceSpeedOnPowerDown)
{
$Setting = New-Object PSObject -Property $PowerSettingProperties
$Setting | Add-Member -Name "Caption" -Value "ReduceSpeedOnPowerDown" -MemberType NoteProperty
WriteObjectToConfigFile $Setting $colProperty
}
if ($null -ne $PowerSettingValues.SmartPowerDown)
{
$Setting = New-Object PSObject -Property $PowerSettingProperties
$Setting | Add-Member -Name "Caption" -Value "SmartPowerDown" -MemberType NoteProperty
WriteObjectToConfigFile $Setting $colProperty
}
if ($null -ne $PowerSettingValues.SavePowerNowEnabled)
{
$Setting = New-Object PSObject -Property $PowerSettingProperties
$Setting | Add-Member -Name "Caption" -Value "SavePowerNowEnabled" -MemberType NoteProperty
WriteObjectToConfigFile $Setting $colProperty
}
if ($null -ne $PowerSettingValues.EnhancedASPMPowerSaver)
{
$Setting = New-Object PSObject -Property $PowerSettingProperties
$Setting | Add-Member -Name "Caption" -Value "EnhancedASPMPowerSaver" -MemberType NoteProperty
WriteObjectToConfigFile $Setting $colProperty
}
}
catch
{
Write-Log "Unable to Save Power Management Settings"
}
}
WriteTextToConfigFile "PMSettingsEnd"
WriteTextToConfigFile ""
}
# Some settings need to be saved in a certain order, this function stops them from being saved now so they can be saved later by returning
# whether it should be saved immidiately or later (using true or false).
Function SaveAdapterSettingLater($Setting, $bIPSetting)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$Setting = $Setting"
Write-Log "`$bIPSetting = $bIPSetting"
$bRet = $true
# Don't save the settings now if it is an IP, DCB, performance profile, SRIOV, VMQueues, or NUMVF setting
if (($bIPSetting -eq $false) -and
($Setting.GroupId -ne 12 ) -and
($Setting.GroupId -ne 8 ) -and
($Setting.Caption -ne "PerformanceProfile") -and
($Setting.Caption -ne "*FlowControl") -and
($Setting.Caption -ne "*PriorityVLANTag") -and
($Setting.Caption -ne "*SRIOV") -and
($Setting.Caption -ne "VMQueues") -and
($Setting.Caption -ne "*NumVFs"))
{
$bRet = $false
}
return $bRet
}
# Check if the given setting is an IP setting and save it in the IP config file and return if it is an IP setting (true or false).
# Depending on the device different properties of the object need to be saved.
Function SaveIPSetting($Setting,$DeviceType,$EnabledDHCP,$bSaveIPv6Settings)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$DeviceType = $DeviceType"
Write-Log "`$Setting = $Setting"
Write-Log "`$bEnabledDHCP = $EnabledDHCP"
Write-Log "`$bSaveIPv6Settings = $bSaveIPv6Settings"
$bIPSetting = $false
$bSaveIpSetting = $false
# Check if the passed in setting is one of these IP settings.
# Some IP settings need DHCP enabled to restore.
switch($Setting.Caption)
{
"IPAddress"
{
$bIPSetting = $true
if ($EnabledDHCP -eq 0)
{
$bSaveIpSetting = $true
}
}
"IPv4Address"
{
$bIPSetting=$true
if ($EnabledDHCP -eq 0)
{
$bSaveIpSetting = $true
}
}
"IPv6Address"
{
$bIPSetting=$true
if ($bSaveIPv6Settings -eq $true)
{
$bSaveIpSetting = $true
}
}
"PrefixLength"
{
$bIPSetting=$true
if ($bSaveIPv6Settings -eq $true)
{
$bSaveIpSetting = $true
}
}
"SubnetMask"
{
$bIPSetting=$true
if ($EnabledDHCP -eq 0)
{
$bSaveIpSetting = $true
}
}
"DefaultGateway"
{
$bIPSetting=$true
if ($EnabledDHCP -eq 0)
{
$bSaveIpSetting = $true
}
}
"DefaultGatewayIPv6"
{
$bIPSetting=$true
if ($bSaveIPv6Settings -eq $true)
{
$bSaveIpSetting = $true
}
}
"NameServer"
{
$bIPSetting=$true
if($EnabledDHCP -eq 0)
{
$bSaveIpSetting = $true
}
}
"NameServerList"
{
$bIPSetting=$true
$bSaveIpSetting = $true
}
"NetbiosOptions"
{
$bIPSetting=$true
$bSaveIpSetting = $true
}
}
# Save IP settings with different properties depending on the device type
if ($bSaveIpSetting -eq $true -and $DeviceType -eq "Adapter")
{
$colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID"
WriteObjectToIPFile $Setting $colProperty
}
elseif ($bSaveIpSetting -eq $true -and $DeviceType -eq "Team")
{
$colProperty = "TeamName","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"}
WriteObjectToIPFile $Setting $colProperty
}
elseif ($bSaveIpSetting -eq $true -and $DeviceType -eq "Vlan")
{
$colProperty = "ParentName","VLANID","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID"
WriteObjectToIPFile $Setting $colProperty
}
return $bIPSetting
}
# Save the adapter settings
Function SaveAdapterSettings()
{
Write-Log $MyInvocation.MyCommand
$colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID"
# Save power management settings
SavePowerManagementSettings
WriteTextToConfigFile "AdapterSettingsStart"
WriteTextToIPFile "AdapterIPSettingsStart"
foreach ($Adapter in $Script:Adapters)
{
# Get the settings associated with the adapter
$colSettings = GetAssociated $Adapter.path.path "ResultClass = IANet_AdapterSetting"
$colSettings = $colSettings | Sort-Object -Property Name,Caption
# Check status of EnablDHCP for IP settings later
$EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty
$EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty
$ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty
#Get the DHCP enable value for the specific adapter
$EnableDHCP = $EnableDHCPCol | Where-Object {($_.Name -eq $Adapter.Name)}
# Get the DHCPv6 enable value, and the ManualIPv6 value
# EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0
# (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/)
# ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration
$EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.Name -eq $Adapter.Name)}
$ManualIPv6 = $ManualIPv6Col | Where-Object {($_.Name -eq $Adapter.Name)}
$bSaveIPv6Settings = $false
#if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them
if($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1)
{
$bSaveIPv6Settings = $true
}
foreach ($Setting in $colSettings)
{
AddParentIDs $Setting
#check if setting is an IP setting save them in the IP config file instead of the Saved_Config file
$bIPSetting = SaveIPSetting $Setting "Adapter" $EnableDHCP.CurrentValue $bSaveIPv6Settings
#Check to see if the setting should be saved later
$bRet = SaveAdapterSettingLater $Setting $bIPSetting
if ($bRet -eq $false)
{
WriteObjectToConfigFile $Setting $colProperty
}
}
# Check if DCB is being updated and if so, don't save the settings so the default values are restored
$RestoreDCB = $true
$FCoEUpdate = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Prounstl -Name DCB_Update_FCoE -ErrorAction SilentlyContinue
if ($null -ne $FCoEUpdate)
{
if ($FCoEUpdate.DCB_Update_FCoE -eq 1)
{
#FCoE is changing don't save settings
$RestoreDCB = $false
}
}
$iSCSIUpdate = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Prounstl -Name DCB_Update_iSCSI -ErrorAction SilentlyContinue
if ($null -ne $iSCSIUpdate)
{
if ($iSCSIUpdate.DCB_Update_iSCSI -eq 1)
{
#iSCSI is changing don't save settings
$RestoreDCB = $false
}
}
#Save *SRIOV after *VMQ
$SRIOVSetting = $colSettings | Where-Object {($_.Caption -eq "*SRIOV")}
WriteObjectToConfigFile $SRIOVSetting $colProperty
#Save DCB Settings if this is not an upgrade or if it is an upgrade, and we are modifying DCB
if (($Script:bUpSave -eq $false) -or ($RestoreDCB -eq $true))
{
$colDCBSettings = $colSettings | Where-Object {($_.GroupId -eq 12) -or ($_.GroupId -eq 8)}
WriteObjectToConfigFile $colDCBSettings $colProperty
}
#Save the performance profile
$ProfileSetting = $colSettings | Where-Object {($_.Caption -eq "PerformanceProfile")}
WriteObjectToConfigFile $ProfileSetting $colProperty
#Save the FlowControl after performance profile and DCB
$FlowControlSetting = $colSettings | Where-Object {($_.Caption -eq "*FlowControl")}
WriteObjectToConfigFile $FlowControlSetting $colProperty
#Save the PriorityVLANTag after performance profile and DCB
$PriorityVLANTagSetting = $colSettings | Where-Object {($_.Caption -eq "*PriorityVLANTag")}
WriteObjectToConfigFile $PriorityVLANTagSetting $colProperty
#Save VMQueues and *NUMVFs last
$VMQQueuesSetting = $colSettings | Where-Object {($_.Caption -eq "VMQueues")}
WriteObjectToConfigFile $VMQQueuesSetting $colProperty
$NumVFsSetting = $colSettings | Where-Object {($_.Caption -eq "*NumVFs")}
WriteObjectToConfigFile $NumVFsSetting $colProperty
}
WriteTextToConfigFile "AdapterSettingsEnd"
WriteTextToConfigFile ""
WriteTextToIPFile "AdapterIPSettingsEnd"
WriteTextToIPFile ""
}
#Save team information
Function SaveTeams
{
Write-Log $MyInvocation.MyCommand
#Get current teams on system
$colProperty = "TeamName","TeamMembers","TeamMode","PrimaryAdapter","SecondaryAdapter"
$colItems = GetObject "IANet_TeamOfAdapters" | Select-Object $colProperty | Sort-Object -Property TeamName
WriteTextToConfigFile "TeamsStart"
# if there are teams on system save the team information to the config file.
if ($colItems)
{
# convert Member arrays into a "single" value to save
foreach ($item in $colItems)
{
$TeamMembers = $item.TeamMembers
$item.TeamMembers = @()
for (($i = 0); $i -lt $TeamMembers.Count; $i++)
{
$adapter = GetObject IANet_PhysicalEthernetAdapter | Where-Object {($_.OriginalDisplayName -eq $TeamMembers[$i])}
$PermanentAddress = $adapter | Select-Object -ExpandProperty "PermanentAddress"
$PCIDeviceID = $adapter | Select-Object -ExpandProperty "PCIDeviceID"
$SlotID = $adapter | Select-Object -ExpandProperty "SlotID"
$item.TeamMembers += $TeamMembers[$i] + "," + $PermanentAddress + "," + $PCIDeviceID + "," + $SlotID
}
$item.TeamMembers = $item.TeamMembers -join '|'
}
WriteObjectToConfigFile $colItems *
}
WriteTextToConfigFile "TeamsEnd"
WriteTextToConfigFile ""
}
# Save team settings
Function SaveTeamSettings
{
Write-Log $MyInvocation.MyCommand
# Get the current team settings
$colProperty = "TeamName","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"}
$colSettings = GetObject "IANet_TeamSetting" | Sort-Object -Property Name,Caption
WriteTextToConfigFile "TeamSettingsStart"
WriteTextToIPFile "TeamIPSettingsStart"
# Check status of EnablDHCP for IP settings later
$EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty
$EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty
$ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty
foreach ($Setting in $colSettings)
{
# Get the DHCP enable value for the specific Team
$EnableDHCP = $EnableDHCPCol | Where-Object {($_.TeamName -eq $Setting.Name)}
# Get the DHCPv6 enable value, and the ManualIPv6 value
# EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0
# (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/)
# ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration
$EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.TeamName -eq $Setting.Name)}
$ManualIPv6 = $ManualIPv6Col | Where-Object {($_.TeamName -eq $Setting.Name)}
$bSaveIPv6Settings = $false
# if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them
if ($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1)
{
$bSaveIPv6Settings = $true
}
# Save the IP Settings in the IP config file
$bIPSetting = SaveIPSetting $Setting "Team" $EnableDHCP.CurrentValue $bSaveIPv6Settings
if ($bIPSetting -eq $false)
{
WriteObjectToConfigFile $Setting $colProperty
}
}
WriteTextToConfigFile "TeamSettingsEnd"
WriteTextToConfigFile ""
WriteTextToIPFile "TeamIPSettingsEnd"
WriteTextToIPFile ""
}
# Save vlan information
Function SaveVlans
{
Write-Log $MyInvocation.MyCommand
#Get the vlans on the system
$colProperty = "ParentName", "VLANID", "VLANNAME", "ParentPermanentAddress", "ParentPCIDeviceID", "ParentSlotID"
$colVlans = GetObject "IANet_VLAN" | Sort-Object -Property Parent,VLANID
WriteTextToConfigFile "VlansStart"
# Save untagged vlan last if there are vlans on the system
if ($colVlans)
{
$colTaggedVlans = $colVlans | Where-Object {($_.VLANID -ne 0)}
WriteObjectToConfigFile $colTaggedVlans $colProperty
$colUnTaggedVlans = $colVlans | Where-Object {($_.VLANID -eq 0)}
WriteObjectToConfigFile $colUnTaggedVlans $colProperty
}
WriteTextToConfigFile "VlansEnd"
WriteTextToConfigFile ""
}
# Save vlan settings
Function SaveVlanSettings
{
Write-Log $MyInvocation.MyCommand
#Get vlan settings on system
$colProperty = "ParentName","Name","VLANID","Caption","CurrentValue","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID"
$colSettings = GetObject "IANet_VLANSetting" | Sort-Object -Property Name,Caption
WriteTextToConfigFile "VlanSettingsStart"
WriteTextToIPFile "VlanIPSettingsStart"
# Check status of EnablDHCP for IP settings later
$EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty
$EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty
$ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty
foreach ($Setting in $colSettings)
{
# Get the DHCP enable value for the specific adapter
$EnableDHCP = $EnableDHCPCol | Where-Object {($_.Name -eq $Setting.Name)}
# Get the DHCPv6 enable value, and the ManualIPv6 value
# EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0
# (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/)
# ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration
$EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.Name -eq $Setting.Name)}
$ManualIPv6 = $ManualIPv6Col | Where-Object {($_.Name -eq $Setting.Name)}
$bSaveIPv6Settings = $false
# if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them
if ($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1)
{
$bSaveIPv6Settings = $true
}
# Save the IP Settings in the IP config file
$bIPSetting = SaveIPSetting $Setting "Vlan" $EnableDHCP.CurrentValue $bSaveIPv6Settings
if ($bIPSetting -eq $false)
{
WriteObjectToConfigFile $Setting $colProperty
}
}
WriteTextToConfigFile "VlanSettingsEnd"
WriteTextToConfigFile ""
WriteTextToIPFile "VlanIPSettingsEnd"
WriteTextToIPFile ""
}
#Save NICPART settings
Function SaveNICPARTSettings
{
Write-Log $MyInvocation.MyCommand
$colProperty = "Name","PartitionNumber","Identifier","MinBWPercent","MaxBWPercent"
WriteTextToConfigFile "NICPARTSettingsStart"
#start lock
BeginApply
try
{
#Get the partition information for all partitions on system and save them
$PartitionArray = InvokeMethod $Script:service GetPartitionsForPort "szDeviceID" $null
WriteObjectToConfigFile $PartitionArray.Partitions $colProperty
}
catch
{
Write-log "Unable to Save NIC Partition Settings"
}
#release lock
ReleaseLock
WriteTextToConfigFile "NICPARTSettingsEnd"
WriteTextToConfigFile ""
}
#Remove teams and vlans on system
Function RemoveTeamsAndVlans
{
Write-Log $MyInvocation.MyCommand
$IANetObjs = @('IANet_TeamOfAdapters','IANet_Vlan')
foreach ($IANetObj in $IANetObjs)
{
$colDevices = @()
$colDevices += GetObject $IANetObj
BeginApply
foreach ($Device in $colDevices)
{
try
{
DeleteObject $Device
}
catch
{
Write-Log "Unable to DeleteObject `$Device $Device"
}
}
ReleaseLock
}
}
# Check that adapters in configuration file are present and enabled on the system.
Function CheckAdaptersExist
{
Write-Log $MyInvocation.MyCommand
$Script:colImportAdapters = ReadFromConfigFile "Adapters"
if ($null -ne $Script:colImportAdapters )
{
foreach ($Adapter in $Script:colImportAdapters)
{
# Find the matching file adapter using the appropriate property to compare name,address or ID
if ($Script:BDF -eq $false)
{
if ($bUpRestore -eq $true)
{
$ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $Adapter.PermanentAddress)}
}
else
{
$ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $Adapter.PCIDeviceID)}
}
if ($null -eq $ImportedAdapter)
{
$ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.Name -eq $Adapter.Name)}
}
}
else
{
$ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $Adapter.SlotID)}
}
if ($null -eq $ImportedAdapter)
{
Write-Warning UnableToFindDevice
Write-Log "Invalid `$Adapter = $Adapter"
}
}
}
}
# Restore custome OEM value
Function RestoreOEMCustomizeableSetting
{
Write-Log $MyInvocation.MyCommand
$ImportOEMSetting = ReadFromConfigFile "OEMSetting"
if ($null -ne $ImportOEMSetting)
{
Write-Host $Messages.SettingOEMValue
Set-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\NCS2 -Name OEMCustomizeable -Value $ImportOEMSetting.OEMCustomizeable -Type DWord
}
}
Function RestoreSettings($Setting, $stringClass, $enumClass)
{
if ($Setting)
{
# IPv6 Address and DefaultGateway must be set with netsh, currently no API to set setting in Middleware
if ($Setting.Caption -eq "IPv6Address")
{
# netsh interface ipv6 add address $ConnectionName $Address
$ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue
$ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex
# delete current IPv6 addresses to overwrite them with saved config, if there are no addresses then we catch the exception and continue since there is nothing to delete.
try
{
$AllAddresses = Get-WmiObject Win32_NetworkAdapterConfiguration -Namespace "root/cimv2" | Where-Object {($_.InterfaceIndex -eq $ConnectionInterfaceIndex)} | Select-Object -ExpandProperty IPAddress -ErrorAction SilentlyContinue
}
catch
{
Write-Log "No IPv6Address found."
}
$IPv6Array = @()
foreach ($Address in $AllAddresses)
{
if (-not $Address.Contains("."))
{
$IPv6Array += $Address
}
}
#wrap interfaceindex in quotes for netsh
$ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`""
foreach ($IP in $IPv6Array)
{
$DeleteCommand = "netsh interface ipv6 delete address $ConnectionInterfaceIndex $IP"
Invoke-Expression $DeleteCommand
}
foreach ($Value in $Setting.CurrentValues) #CurrentValues is a list of IPv6Addresses split by comma, set each address
{
$Command = "netsh interface ipv6 add address $ConnectionInterfaceIndex $Value"
Invoke-Expression $Command
}
}
elseif ($Setting.Caption -eq "DefaultGatewayIPv6")
{
# netsh interface ipv6 add route ::/0 $ConnectionName $Address
$ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue
$ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex
# delete current IPv6 gateways to overwrite them with saved config, if there are no gateways then we catch the exception and continue since there is nothing to delete.
try
{
$AllGateways = Get-WmiObject Win32_NetworkAdapterConfiguration -Namespace "root/cimv2" | Where-Object {($_.InterfaceIndex -eq $ConnectionInterfaceIndex)} | Select-Object -ExpandProperty DefaultIPGateway -ErrorAction SilentlyContinue
}
catch
{
Write-Log "No DefaultGatewayIPv6 found."
}
$IPv6Array = @()
foreach ($Address in $AllGateways)
{
if (-not $Address.Contains("."))
{
$IPv6Array += $Address
}
}
#wrap interfaceindex in quotes for netsh
$ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`""
foreach ($IP in $IPv6Array)
{
$DeleteCommand = "netsh interface ipv6 delete route ::/0 $ConnectionInterfaceIndex $IP"
Invoke-Expression $DeleteCommand
}
foreach ($Value in $Setting.CurrentValues)
{
$Command = "netsh interface ipv6 add route ::/0 $ConnectionInterfaceIndex $Value"
Invoke-Expression $Command
}
}
elseif ($Setting.Caption -eq "EnableDHCPv6")
{
$EnableDHCPv6Setting = Get-WmiObject $enumClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "EnableDHCPv6")} | Select-Object -ExpandProperty CurrentValue
if (($Setting.CurrentValue -eq "0") -and ($EnableDHCPv6Setting.CurrentValue -eq "1"))
{
$ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue
$ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex
$ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`""
$dhcpv6routercmd = "netsh int ipv6 set int $ConnectionInterfaceIndex routerdiscovery=disabled managedaddress=disabled otherstateful=disabled"
Invoke-Expression $dhcpv6routercmd
Start-Sleep -s 1
}
elseif (($Setting.CurrentValue -eq "1") -and ($EnableDHCPv6Setting.CurrentValue -eq "0"))
{
$ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue
$ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex
$ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`""
$dhcpv6managedcmd = "netsh int ipv6 set int $ConnectionInterfaceIndex managedaddress=enabled"
Invoke-Expression $dhcpv6managedcmd
Start-Sleep -s 1
}
}
else
{
$result = SetSetting $Setting
Write-Log "SetSetting $result"
}
}
}
# Restore adapter settings
Function RestoreAdapterSettings($colImportedSettings)
{
Write-Log $($MyInvocation.MyCommand)
Write-Log "`$colImportedSettings = $colImportedSettings"
# Get adapter settings on system
$colSetting = GetObject "IANet_AdapterSetting" | Sort-Object -Property Name,Caption
# Add parent identifiers to settings on system
foreach ($cSetting in $colSetting)
{
AddParentIDs $cSetting
}
# start lock
BeginApply
# Loop through the passed in settings from the config file
foreach ($ImportedSetting in $colImportedSettings) #for each setting in AdapterIPSettings
{
try
{
# Find the matching system setting using the appropriate property to compare name,address or ID
if ($Script:BDF -eq $false)
{
# finds the setting with the same caption and device name
if (($bUpRestore -eq $true))
{
$Setting = $colSetting | Where-Object {($_.PermanentAddress -eq $ImportedSetting.PermanentAddress) -and ($_.Caption -eq $ImportedSetting.Caption)}
}
else
{
$Setting = $colSetting | Where-Object {($_.PCIDeviceID -eq $ImportedSetting.PCIDeviceID) -and ($_.Caption -eq $ImportedSetting.Caption)}
}
if ($null -eq $Setting)
{
$Setting = $colSetting | Where-Object {($_.Name -eq $ImportedSetting.Name) -and ($_.Caption -eq $ImportedSetting.Caption)}
}
}
else
{
$Setting = $colSetting | Where-Object {($_.SlotID -eq $ImportedSetting.SlotID) -and ($_.Caption -eq $ImportedSetting.Caption)}
}
# If the setting in the file can't be found on the system, continue to the next setting
if ($null -eq $Setting)
{
Write-Log "Not Restored: $ImportedSetting"
continue
}
# See if 'CurrentValues' is a property over the system setting, if so set that value from the config file setting
if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues")
{
# If no value was present from the file setting, then set it to empty
if ($null -eq $ImportedSetting.CurrentValues)
{
$Setting.CurrentValues = {}
}
else
{
$Setting.CurrentValues = $ImportedSetting.CurrentValues.Split(",")
}
}
else
{
$Setting.CurrentValue = $ImportedSetting.CurrentValue
}
RestoreSettings $Setting "IANet_AdapterSettingString" "IANet_AdapterSettingEnum"
}
catch
{
$ErrorMessagePart1 = [string]$Messages.UnableToSetPart1
$ErrorMessagePart2 = [string]$Messages.UnableToSetPart2
# Unable to set ... on ...
Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)"
}
}
ReleaseLock
}
# Set the primary and secondary adapters on the team
Function RestorePrimaryAndSecondary($Team)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$Team = $Team"
Write-Host $Messages.RestoringTeamAdapters $Team.TeamName
# Find the adapter objects from the configuration file that match the team primary and secondary adapter names
$PrimaryImportAdapter = $Script:colImportAdapters | Where-Object {$_.OriginalDisplayName -eq $Team.PrimaryAdapter}
$SecondaryImportAdapter = $Script:colImportAdapters | Where-Object {$_.OriginalDisplayName -eq $Team.SecondaryAdapter}
# Find the matching system adapter using the appropriate property to compare name,address or ID
if ($Script:BDF -eq $false)
{
if ($bUpRestore)
{
$PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $PrimaryImportAdapter.PermanentAddress)}
}
else
{
$PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $PrimaryImportAdapter.PCIDeviceID)}
}
}
else
{
$PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $PrimaryImportAdapter.SlotID)}
}
if ($Script:BDF -eq $false)
{
if ($bUpRestore -eq $true)
{
$SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $SecondaryImportAdapter.PermanentAddress)}
}
else
{
$SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $SecondaryImportAdapter.PCIDeviceID)}
}
}
else
{
$SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $SecondaryImportAdapter.SlotID)}
}
# Set the primary and secondary adapters on the team
$Team = GetObject "IANet_TeamOfAdapters" | Where-Object {$_.TeamName -eq $Team.TeamName} | Sort-Object -Property TeamName
$param = $Team.psbase.GetMethodParameters("ValidateAndSetAdapterPriority")
$param.PrimaryAdapter = $PrimaryAdapter
$param.SecondaryAdapter = $SecondaryAdapter
$param.SetValuesOnNoError = 2
$value = $Team.psbase.InvokeMethod("ValidateAndSetAdapterPriority", $param, $invokeoptions)
Write-Log $Value
}
# Restore teams from configuration file
Function RestoreTeams
{
Write-Log $MyInvocation.MyCommand
# Get the team objects from the configuration file
$colImportTeams = ReadFromConfigFile "Teams"
if ($null -ne $colImportTeams)
{
BeginApply
foreach ($Team in $colImportTeams)
{
Write-Host $Messages.Restoring $Team.TeamName
try
{
# Create a new team object
$classdef = NewObject root\intelncs2:IANet_TeamOfAdapters
# fill in the CreateTeam's method parameters with the new object
$param = $classdef.psbase.GetMethodParameters("CreateTeam2Ex")
$TeamedAdapters = $Team.TeamMembers.split("|")
$param.Adapters = @()
$bCreateTeam = $true
# Set the teammembers for creation
foreach ($Adapter in $TeamedAdapters)
{
$Adapter = $Adapter.Split(",")
$AdapterName = $Adapter[0]
$AdapterPermanentAddress = $Adapter[1]
$AdapterPCIDeviceID = $Adapter[2]
$AdapterSlotID = $Adapter[3]
$Adapter = $null
# Find the matching system adapter using the appropriate property to compare address or ID
if ($Script:BDF -eq $false)
{
if ($bUpRestore -eq $true)
{
$Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $AdapterPermanentAddress)}
}
else
{
$Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $AdapterPCIDeviceID)}
}
# Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name.
if ($null -eq $Adapter)
{
$Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.Name -eq $AdapterName)}
}
}
else
{
$Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $AdapterSlotID)}
}
# If a teammember can't be found output an error and breakout of team creation
if ($null -eq $Adapter)
{
Write-Warning UnableToFindDevice
Write-Log $AdapterName
$bCreateTeam = $false
break
}
$param.Adapters += $Adapter
}
# If an error was found, don't try and create the team
if ($bCreateTeam -eq $false)
{
Continue
}
$param.TeamMode = $Team.TeamMode
$param.TeamName = $Team.TeamName
# the invoke options
$invokeoptions = New-Object System.Management.InvokeMethodOptions
$invokeoptions.Context = $Script:context
# call the CreateTeam method to create the new team
$null = $classdef.psbase.InvokeMethod("CreateTeam2Ex", $param, $invokeoptions)
# Set primary and secondary adapters
RestorePrimaryAndSecondary $Team
}
catch
{
Write-Log "Unable to Restore Teams"
}
}
ReleaseLock
}
}
#Restore team settings
Function RestoreTeamSettings($colImportSettings)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$colImportSettings = $colImportSettings"
# Get the current team settings
$colSetting = GetObject "IANet_TeamSetting" | Sort-Object -Property Name,Caption
BeginApply
foreach ($Setting in $colSetting)
{
try
{
# If the current setting using 'CurrentValues' then set that value.
if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues")
{
$ValueObject = $colImportSettings | Where-Object {($_.TeamName -eq $Setting.Name) -and ($_.Caption -eq $Setting.Caption)} | Select-Object CurrentValues
if ($null -eq $ValueObject.CurrentValues)
{
$Setting.CurrentValues = {}
}
else
{
$Setting.CurrentValues = $ValueObject.CurrentValues.Split(",")
}
}
else
{
$ValueObject = $colImportSettings | Where-Object {($_.TeamName -eq $Setting.Name) -and ($_.Caption -eq $Setting.Caption)} | Select-Object CurrentValue
$Setting.CurrentValue = $ValueObject.CurrentValue
}
#If a matching system setting was found set it to the restore value
if($null -ne $ValueObject)
{
RestoreSettings $Setting "IANet_TeamSettingString" "IANet_TeamSettingEnum"
}
}
catch
{
$ErrorMessagePart1 = [string]$Messages.UnableToSetPart1
$ErrorMessagePart2 = [string]$Messages.UnableToSetPart2
# Unable to set ... on ...
Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)"
}
}
ReleaseLock
}
Function RestoreVlans
{
Write-Log $MyInvocation.MyCommand
# Get vlan objects from config file
$colImportVlans = ReadFromConfigFile "Vlans"
if ($null -ne $colImportVlans)
{
foreach ($Vlan in $colImportVlans)
{
# Start lock
BeginApply
try
{
# Find the matching system adapter using the appropriate property to compare name,address or ID
if ($Script:BDF -eq $false)
{
if ($bUpRestore -eq $true)
{
$Adapter = $Script:Adapters | Where-Object {($_.PermanentAddress -eq $Vlan.ParentPermanentAddress)}
}
else
{
$Adapter = $Script:Adapters | Where-Object {($_.PCIDeviceID -eq $Vlan.ParentPCIDeviceID)}
}
# Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name.
if ($null -eq $Adapter)
{
$Adapter = $Script:Adapters | Where-Object {($_.Name -eq $Vlan.ParentName)}
}
}
else
{
$Adapter = $Script:Adapters | Where-Object {($_.SlotID -eq $Vlan.ParentSlotID)}
}
if ($null -ne $Adapter)
{
# Get the vlan creation class associated with adapter parent object
$VlanCreator = GetAssociated $Adapter.path.path "ResultClass = IANet_802dot1QVLANService" | Where-Object {1}
}
# Check if vlan needs to be created on a team
else
{
# Get the logical ethernet adapter object for the team parent
$Team = GetObject "IANet_LogicalEthernetAdapter" | Where-Object {( NScompare $_.Name $Vlan.ParentName )}
if ($null -ne $Team)
{
# Get the vlan creation class associated with team parent object
$VlanCreator = GetAssociated $Team.path.path "ResultClass = IANet_802dot1QVLANService" | Where-Object {1}
}
}
# If the vlan creation class was found continue on to create the vlan
if ($null -ne $VlanCreator)
{
Write-Host $Messages.Restoring $Vlan.VlanName
# fill in the CreateVlan's method parameters
$param = $VlanCreator.psbase.GetMethodParameters("CreateVlan")
$param.Name = $Vlan.VLANNAME
$param.VLANNumber = $Vlan.VLANID
# the invoke options
$invokeoptions = New-Object System.Management.InvokeMethodOptions
$invokeoptions.Context = $Script:context
# call the CreateVlan method to create the new vlan
$null = $VlanCreator.psbase.InvokeMethod("CreateVlan", $param, $invokeoptions)
}
}
catch
{
Write-Log "Unable to Restore VLANs"
}
ReleaseLock
}
}
}
# Restore vlan settings
Function RestoreVlanSettings($colImportSettings)
{
Write-Log $MyInvocation.MyCommand
Write-Log "`$colImportSettings = $colImportSettings"
# Get the current Vlan settings
$vlanSettings = GetObject "IANet_VLANSetting" | Sort-Object -Property ParentName,VLANID,Caption
# Start lock
BeginApply
foreach ($Setting in $vlanSettings)
{
try
{
if ($Script:BDF -eq $false)
{
#finds the setting with the same caption and device name
if ($bUpRestore -eq $true)
{
$ValueObject = $colImportSettings | Where-Object {($_.ParentPermanentAddress -eq $Setting.ParentPermanentAddress) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)}
}
else
{
$ValueObject = $colImportSettings | Where-Object {($_.ParentPCIDeviceID -eq $Setting.ParentPCIDeviceID) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)}
}
# Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name.
if ($null -eq $ValueObject)
{
$ValueObject = $colImportSettings | Where-Object {( NSCompare $_.ParentName $Setting.ParentName ) -and ( $_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)}
}
}
else
{
$ValueObject = $colImportSettings | Where-Object {($_.ParentSlotID -eq $Setting.ParentSlotID) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)}
}
if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues")
{
if ($null -eq $ValueObject.CurrentValues)
{
$Setting.CurrentValues = {}
}
else
{
$Setting.CurrentValues = $ValueObject.CurrentValues.Split(",")
}
}
else
{
$Setting.CurrentValue = $ValueObject.CurrentValue
}
# If a matching system setting was found set it to the restore value
if($null -ne $ValueObject)
{
RestoreSettings $Setting "IANet_VLANSettingString" "IANet_VLANSettingEnum"
}
}
catch
{
$ErrorMessagePart1 = [string]$Messages.UnableToSetPart1
$ErrorMessagePart2 = [string]$Messages.UnableToSetPart2
# Unable to set ... on ...
Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)"
}
}
ReleaseLock
}
# Restore the IP settings from the IP config file
Function RestoreIPSettings
{
Write-Log $MyInvocation.MyCommand
# Restore Adapter IP settings from the IP config file
$colImportSettings = ReadFromIPFile "AdapterIPSettings"
if ($null -ne $colImportSettings)
{
foreach ($setting in $colImportSettings)
{
# If the staticip is set on a disconnected adapter from cmdline tools (netsh, New-NetIPAddress, Set-NetIPInterface, etc)
# the private 169.254.x.x IP that Microsoft assigns when it can't get an address from the DHCP server
# comes along and saverestore ends up restoring that IP with a 255.255.0.0 subnetmask instead.
# Only capture the first ip, which is what static ip and subnetmask the user intended to set
# ignore the 169.254.x.x IP and 255.255.0.0 subnetmask
if (($setting.Caption -eq 'IPv4Address') -or
($setting.Caption -eq 'SubnetMask'))
{
if (($setting.CurrentValues.ToCharArray()) -contains [char]',')
{
$setting.CurrentValues = $setting.CurrentValues.Substring(0, $setting.CurrentValues.lastIndexOf(','))
}
}
}
Write-Host $Messages.RestoringAdapterIP
RestoreAdapterSettings $colImportSettings
}
if ($Script:bANSInstalled)
{
# Restore Team IP settings from the IP config file
$colImportSettings = ReadFromIPFile "TeamIPSettings"
if ($null -ne $colImportSettings)
{
Write-Host $Messages.RestoringTeamIP
RestoreTeamSettings $colImportSettings $colSetting
}
# Restore Vlan IP settings from the IP config file
$colImportSettings = ReadFromIPFile "VlanIPSettings"
if ($null -ne $colImportSettings)
{
Write-Host $Messages.RestoringVLANIP
RestoreVlanSettings $colImportSettings
}
}
}
# Restore devices and settings from configuration files
Function RestoreAdvancedSettingsAndDevices
{
Write-Log $MyInvocation.MyCommand
#Restore Adapter avanced settings from config file
$colImportSettings = ReadFromConfigFile "AdapterSettings"
if ($null -ne $colImportSettings)
{
Write-Host $Messages.RestoringAdapterSettings
RestoreAdapterSettings $colImportSettings
}
if (!$Script:bANSInstalled)
{
Write-Warning UnableToFindANS
}
else
{
#Restore Teams
RestoreTeams
#Restore Team advanced settings from config file
$colImportSettings = ReadFromConfigFile "TeamSettings"
if ($null -ne $colImportSettings)
{
Write-Host $Messages.RestoringTeamSettings
RestoreTeamSettings $colImportSettings
}
#Restore Vlans
RestoreVlans
#Restore Vlan avanced settings from config file
$colImportSettings = ReadFromConfigFile "VlanSettings"
if ($null -ne $colImportSettings)
{
Write-Host $Messages.RestoringVLANSettings
RestoreVlanSettings $colImportSettings
}
}
if (Test-Path $Script:ScriptPath\Saved_StaticIP.txt)
{
#Restore IP Settings from IP config file
RestoreIPSettings
}
}
#Restore NICPART settings
Function RestoreNICPARTSettings
{
Write-Log $MyInvocation.MyCommand
#Restore NICPART settings from config file
$colImportPartitions = ReadFromConfigFile "NICPARTSettings"
Write-Host $Messages.RestoringAdapterPartition
BeginApply
try
{
if ($null -ne $colImportPartitions)
{
#Get the partition information for all partitions on system and save them
$PartitionObject = InvokeMethod $Script:service GetPartitionsForPort "szDeviceID" $null
$PartitionArray = $PartitionObject.Partitions
foreach ($Partition in $PartitionArray)
{
$ImportPartition = $colImportPartitions | Where-Object {($_.PartitionNumber -eq $Partition.PartitionNumber) -and ($_.Identifier -eq $Partition.Identifier)}
if ($null -ne $ImportPartition)
{
if ($Script:BDF -eq $true)
{
$Partition.Name = "IGNORE"
$Partition.DeviceGuid = "IGNORE"
}
else
{
$Partition.Identifier = "IGNORE"
$Partition.DeviceGuid = "IGNORE"
}
$Partition.MinBWPercent = $ImportPartition.MinBWPercent
$Partition.MaxBWPercent = $ImportPartition.MaxBWPercent
}
}
$Output = InvokeMethod $Script:service ValidateAndSetBAndwidthsForPort "Partitions","SetValuesOnNoError" $PartitionArray,"1"
}
}
catch
{
Write-Log "Unable to Restore NIC Partition Settings"
}
ReleaseLock
}
<#
.SYNOPSIS
Make sure users know about BDF parameter when using NICPART enabled adapters
.DESCRIPTION
By default, the save restore script uses the adapter's friendly name to match the name of the adapter
in the configuration file to adapter in the system. Because of the way Windows enumerates devices and
assigns friendly names, the name of the adapter saved in the configuration file may not be the exact
same adapter/port/partition on another system. The /bdf command line option should be used when
restoring settings of NICPART enabled devices on multiple systems.
.NOTES
This must be invoked after GetAdaptersOnSystem - as it relies on the contents of $Script:Adapters.
The global variable is used to save time when restoring settings on user systems (to avoid polling
the system again just to get the same data).
#>
function CheckNICPART_BDFWarning
{
Write-Log $MyInvocation.MyCommand
$NICPART = $Script:Adapters | Where-Object {($_.Capabilities -eq 76)}
if ($NICPART -and $Script:BDF -eq $false)
{
Write-Host $Messages.NICPartitioningDetected
}
}
<#
.SYNOPSIS
"No Space Compare" Compares two strings without whitespace
.DESCRIPTION
Intel(R) Network Connections Software recently introduced a change to ANS team prefixes. The old format
was "TEAM : ". The new format is "TEAM: ". To preserve user configurations during an upgrade it is
necessary to compare some devices without space differences.
#>
function NSCompare ($s1, $s2)
{
Write-Log $MyInvocation.MyCommand
Write-Log "Comparing `$s1=$s1 and `$s2=$s2..."
$s1temp = $s1 -replace '\s', ''
$s2temp = $s2 -replace '\s', ''
return ($s1temp -eq $s2temp)
}
#-----------------------------------------------------[Execution]------------------------------------------------------
# Determine which action was specified by the user
switch($Script:Action)
{
"Save" {$Script:bSave=$true
Write-Host $Messages.PerformingSave
break}
"UpSave" {$Script:bUpSave=$true
Write-Host $Messages.PerformingUpgradeSave
break}
"Restore" {$Script:bRestore=$true
Write-Host $Messages.PerformingRestore
break}
"UpRestore" {$Script:bUpRestore=$true
Write-Host $Messages.PerformingUpgradeRestore
break}
"Remove" {$Script:bRemove=$true
Write-Host $Messages.PerformingRemove
break}
"?" {PrintUsage}
"help"{PrintUsage}
default {PrintUsage}
}
CheckForAdminRights
CheckForDMiXInstall
CheckForANSInstall
# Setup the save/restore path
SetupSaveRestoreLocation
# If a save is the primary action
if (($Script:bSave -eq $true) -or ($Script:bUpSave -eq $true))
{
GetAdaptersOnSystem
RemoveOldFiles
SaveAdapters
SaveOEMCustomizeableSetting
SaveAdapterSettings
if ($Script:bANSInstalled)
{
SaveTeams
SaveTeamSettings
SaveVlans
SaveVlanSettings
}
SaveNICPARTSettings
}
# If a restore is the primary action
elseif (($Script:bRestore -eq $true) -or ($Script:bUpRestore -eq $true))
{
CheckIfConfigFileExists
if ($Script:bANSInstalled)
{
RemoveTeamsAndVlans
}
GetAdaptersOnSystem
CheckNICPART_BDFWarning
CheckAdaptersExist
RestoreOEMCustomizeableSetting
RestoreAdvancedSettingsAndDevices
RestoreNICPARTSettings
}
# If remove is the primary action
elseif ($Script:bRemove -eq $true)
{
RemoveTeamsAndVlans
}
# SIG # Begin signature block
# MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAg5XcJXSwWFqph
# dupHD17uM3jd+S7JJX0NITYAtsMChqCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU
# jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM
# EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy
# dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG
# EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv
# IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s
# hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD
# J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7
# P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme
# me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz
# T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q
# RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz
# mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc
# QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T
# OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/
# AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID
# AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD
# VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV
# HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE
# VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v
# ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE
# KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI
# hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF
# OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC
# J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ
# pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl
# d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH
# +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio
# kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD
# VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv
# ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5
# NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs
# BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi
# MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw
# hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl
# wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo
# PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND
# brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62
# 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME
# Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx
# G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6
# zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud
# IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE
# osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT
# BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw
# SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv
# UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI
# KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv
# ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl
# Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS
# /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3
# ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT
# s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp
# GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr
# OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb
# MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN
# r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt
# CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF
# 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG
# 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim
# VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ
# KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt
# aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW
# IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF
# EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT
# CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv
# cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN
# AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8
# FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR
# MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA
# tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9
# HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB
# wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b
# H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD
# jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr
# hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS
# QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj
# MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF
# BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0
# dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG
# Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n
# Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v
# Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu
# Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE
# JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG
# 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh
# NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa
# UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw
# FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP
# Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M
# c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ
# YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV
# k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB
# XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE
# ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl
# IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC
# AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIMjIQRxcpfJhSpwoVocMxvnr
# z62LiXT7IUQ/DnDGqETTMA0GCSqGSIb3DQEBAQUABIIBgCOWlnmmzN+8pO8B/jzJ
# fQIYgC4uEVUNF4Jdgu+OaiKZRUL4DZQn2cWcygHmwZQODSkCCOETMf+tSHHBrgoD
# Oy/daH8kAzc6MxgsN7gZTPfUUOyaFH+SNhuqvxd5eGTi9ytrg9Y3Ah+V3wWP2CjP
# ghUkIA36d9apGICRRIzIWRoElxr0EFN4RMpr1vLGxT39IUQXeI+xuf72e9TvZ6ID
# +40UjpiW0Byp3Oud85pVUucwr+lbVmbwx1JwpwOHgjPQo3EScI/TZIdGNOv6vJsb
# 4SPjMJDOKWne10HPppo3yZpg6r5cPumQ7b/FTioDYTgGMCk/MWoNqEvzA5wWi5VT
# U2OT0wWurammJ1KRlwvLKA2R/J83odIDZxWz2qjcQZSBiqnJMC7+XEDw0czFogSa
# cDUtND1h6CvAotCWkm/40ilf3T6ISPTyyiZApVihSwf5sja1cXG7kUksxW7IM0bP
# 8+cmGqwzPj3WV1YWby7pYxNs0oWqh+C/uhQ/KXPKPnmeW6GCE08wghNLBgorBgEE
# AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD
# BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw
# DQYJYIZIAWUDBAIBBQAEIGqeQbcO//4yG+csJxKpJI/6Axt6LYtT/BsZ1mReauiH
# AhUA+NEtAlkynHXfEcdpra6znSkKNdYYDzIwMjQwMzE4MTg1NzIwWqBupGwwajEL
# MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp
# Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT
# aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq
# hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j
# aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0
# ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw
# NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE
# CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD
# DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk
# is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB
# IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc
# rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN
# 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7
# HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl
# TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY
# B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re
# DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE
# qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT
# cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP
# 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf
# BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD
# AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g
# BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0
# aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j
# cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr
# BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v
# U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov
# L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD
# Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf
# +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66
# kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s
# IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1
# RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T
# jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01
# 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA
# bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP
# jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV
# Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8
# KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2
# p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l
# dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF
# UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh
# dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE
# pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0
# RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray
# cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv
# f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi
# nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1
# r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F
# GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs
# dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm
# /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA
# V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID
# AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD
# VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV
# HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw
# BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j
# b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB
# BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v
# VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v
# Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB
# kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk
# VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w
# QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb
# sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB
# c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah
# c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M
# 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0
# PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x
# uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx
# py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu
# tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC
# R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y
# ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT
# QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC
# AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF
# MQ8XDTI0MDMxODE4NTcyMFowPwYJKoZIhvcNAQkEMTIEME/FCX4XStgNQlUOvSFc
# K7UOe3BpW99Kwn8TEvzRa7/hwqIga9GtyeQWayZh9z6YFDCB7QYLKoZIhvcNAQkQ
# Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB
# VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV
# U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp
# Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF
# AASCAgBNiG8m7kW1ytaYxFIdOraAOr10q49/SvAkv55vg0LkKzzRt3m4M6vBNqmU
# zg4Nl/6EsqfGgMGJaxyQGr2bZi61ESTNEG6k/IBGrM33K3DKl7rKo0Sns510BObc
# Y7Q1mK06a81uIkDK/8BlTenHDH3BLHm/6TwGX7AaialAb93IeW1TAEc1WIdUC1Vi
# xdjWRVmRhdZOZq1gBq3RFN6y8u6FuI4DU8szwkMMvMGB3NJ60kWKTKzRgYUs+Q/b
# VvvHLlLY0nk2c+MGOLOz0OIW3hwlKxDLAEI2vHmK/rAQXSKNLqmesy46uSSH0MQ+
# AjEbuD2bc6ljintOZtdR3QScjovh5EdXqrDIGavC1Xg3QHmJg93HruzQIkQHqw5P
# X6eEiIWQG9Rrmr/N2XcipM30zEBQ+ECyM6L2sgLtKu6E0+hqi3aHntZKVh9CkQSi
# a1sN3tIF+4xIes4ud++Z2QIRiTpoxSRJT6yBX9jFfJEHKydh6g0mZljMYARxOv0L
# QY1AdbnHl61enC9G9esi9Nw/k30XWmdCwBX0nbc5nVeeId2X2TxjgwhlDKM+PeZA
# zVXUJ4GSys1bvve92882OppZlBV6aZarXipx5rFYA1XPJFmDzwg8OERMmUfDGRpK
# LrjDaqpKCkcFgLriWD1VUKc/BZ5z1yK8aMyomCCUVvOUTywQoQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_32_24.ps1
|
sample_32_24.ps1
|
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=はい(&Y)
PromptNoString=いいえ(&N)
BundleFound=見つかったバンドル: {0}
PackageFound=パッケージが見つかりました: {0}
EncryptedBundleFound=暗号化されたバンドルが見つかりました: {0}
EncryptedPackageFound=暗号化されたパッケージが見つかりました: {0}
CertificateFound=証明書が見つかりました: {0}
DependenciesFound=依存関係パッケージが見つかりました:
GettingDeveloperLicense=開発者ライセンスを取得しています...
InstallingCertificate=証明書をインストールしています...
InstallingPackage=\nアプリをインストールしています...
AcquireLicenseSuccessful=開発者ライセンスは正常に取得されました。
InstallCertificateSuccessful=証明書は正常にインストールされました。
Success=\n成功: アプリは正常にインストールされました。
WarningInstallCert=\nコンピューターの信頼されたユーザー証明書ストアにデジタル証明書をインストールしようとしています。この操作には重大なセキュリティ リスクが伴うので、このデジタル証明書の発行元が信頼できる場合にのみ実行してください。\n\nこのアプリを使用して実行済みの場合は、関連するデジタル証明書を手動で削除する必要があります。手順については、以下を参照してください。http://go.microsoft.com/fwlink/?LinkId=243053\n\n続行しますか?\n\n
ElevateActions=\nこのアプリをインストールする前に、以下を行う必要があります。
ElevateActionDevLicense=\t-開発者ライセンスを取得します
ElevateActionCertificate=\t- 署名用証明書をインストールします
ElevateActionsContinue=続行するには管理者の資格情報が必要です。UAC プロンプトを受け入れ、要求された場合は管理者パスワードを入力してください。
ErrorForceElevate=続行するには管理者の資格情報を入力する必要があります。このスクリプトを、-Force パラメーターなしで実行するか管理者特権の PowerShell ウィンドウから実行してください。
ErrorForceDeveloperLicense=開発者ライセンスを取得するには、ユーザー操作が必要です。スクリプトを -Force パラメーターなしで再実行してください。
ErrorLaunchAdminFailed=エラー: 新しいプロセスを管理者として実行できませんでした。
ErrorNoScriptPath=エラー: このスクリプトはファイルから起動する必要があります。
ErrorNoPackageFound=エラー: スクリプト ディレクトリにパッケージまたはバンドルがありません。インストールするパッケージまたはバンドルがこのスクリプトと同じディレクトリに配置されていることを確認してください。
ErrorManyPackagesFound=エラー: スクリプト ディレクトリで複数のパッケージまたはバンドルが見つかりました。インストールするパッケージまたはバンドルだけがこのスクリプトと同じディレクトリに配置されていることを確認してください。
ErrorPackageUnsigned=エラー:パッケージまたはバンドルがデジタル署名されていない、または署名が破損しています。
ErrorNoCertificateFound=エラー: スクリプト ディレクトリに証明書がありません。インストールするパッケージまたはバンドルに署名するために使用される証明書がこのスクリプトと同じディレクトリに配置されていることを確認してください。
ErrorManyCertificatesFound=エラー: スクリプト ディレクトリで複数の証明書が見つかりました。インストールするパッケージまたはバンドルに署名するために使用される証明書だけがこのスクリプトと同じディレクトリに配置されていることを確認してください。
ErrorBadCertificate=エラー: ファイル "{0}" は有効なデジタル証明書ではありません。CertUtil がエラー コード {1} で戻りました。
ErrorExpiredCertificate=エラー: 開発者の証明書 "{0}" の有効期限が切れています。システム時計の日付と時刻が正しく設定されていないことが考えられます。システムの設定が正しい場合は、有効な証明書でパッケージまたはバンドルを再作成するようアプリ所有者に連絡してください。
ErrorCertificateMismatch=エラー: この証明書はパッケージまたはバンドルに署名するために使用された証明書と一致しません。
ErrorCertIsCA=エラー: この証明書を証明機関にすることはできません。
ErrorBannedKeyUsage=エラー: この証明書では次のキー使用法は指定できません: {0}。キー使用法は指定しないか、"DigitalSignature" にする必要があります。
ErrorBannedEKU=エラー: この証明書では次の拡張キー使用法は指定できません: {0}。許可されるのは、Code Signing EKU と Lifetime Signing EKU だけです。
ErrorNoBasicConstraints=エラー: 証明書に基本制約拡張機能がありません。
ErrorNoCodeSigningEku=エラー: 証明書に Code Signing 用の拡張キー使用法がありません。
ErrorInstallCertificateCancelled=エラー:証明書のインストールは取り消されました。
ErrorCertUtilInstallFailed=エラー: 証明書をインストールできませんでした。CertUtil がエラー コード {0} で戻りました。
ErrorGetDeveloperLicenseFailed=エラー: 開発者ライセンスを取得できませんでした。詳細については http://go.microsoft.com/fwlink/?LinkID=252740 を参照してください。
ErrorInstallCertificateFailed=エラー: 証明書をインストールできませんでした。ステータス: {0}。詳細については http://go.microsoft.com/fwlink/?LinkID=252740 を参照してください。
ErrorAddPackageFailed=エラー: アプリをインストールできませんでした。
ErrorAddPackageFailedWithCert=エラー: アプリをインストールできませんでした。 セキュリティを確保するために、アプリをインストールできるようになるまで、署名証明書をアンインストールすることをお勧めします。 手順については以下を参照してください:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/2340.ps1
|
2340.ps1
|
function Get-ActiveDirectoryUserNameMatch($FirstName,$LastName,$MiddleInitial) {
if ($MiddleInitial) {
$Filter = { (initials -eq $MiddleInitial) -and (surname -eq $LastName) -and (givenname -eq $FirstName) }
$MatchType = 'FML'
} else {
$Filter = { (surname -eq $LastName) -and (givenname -eq $FirstName) }
$MatchType = 'FL'
}
$Param = @{ 'Filter' = $Filter; 'Properties' = 'DisplayName' }
$Result = Get-ADUser @Param
if ($Result) {
$Result | Add-Member -Type 'NoteProperty' -Name 'MatchMethod' -Value $MatchType -Force
} else {
$UserCount = $AllAdUsers.Count
for ($i=0; $i -lt $UserCount; $i++) {
$FnameDistance = Get-LevenshteinDistance -first $FirstName -second $AllAdusers[$i].Givenname -ignoreCase
$LnameDistance = Get-LevenshteinDistance -first $LastName -second $AllAdusers[$i].surname -ignoreCase
$TotalDistance = $FnameDistance + $LnameDistance
if ($i -eq 0) {
$Result = $AllAdUsers[$i]
$LowestDistance = $TotalDistance
} elseif ($TotalDistance -lt $LowestDistance) {
$Result = $AllAdUsers[$i]
$LowestDistance = $TotalDistance
}
}
$Result | Add-Member -Type 'NoteProperty' -Name 'MatchMethod' -Value 'LowestEditDistance' -Force
}
$Result
}
function Get-LevenshteinDistance {
param ([string] $first, [string] $second, [switch] $ignoreCase)
$len1 = $first.length
$len2 = $second.length
if ($len1 -eq 0) { return $len2 }
if ($len2 -eq 0) { return $len1 }
if ($ignoreCase -eq $true) {
$first = $first.tolowerinvariant()
$second = $second.tolowerinvariant()
}
$dist = new-object -type 'int[,]' -arg ($len1 + 1), ($len2 + 1)
for ($i = 0; $i -le $len1; $i++) { $dist[$i, 0] = $i }
for ($j = 0; $j -le $len2; $j++) { $dist[0, $j] = $j }
$cost = 0
for ($i = 1; $i -le $len1; $i++) {
for ($j = 1; $j -le $len2; $j++) {
if ($second[$j - 1] -ceq $first[$i - 1]) {
$cost = 0
} else {
$cost = 1
}
$tempmin = [System.Math]::Min(([int]$dist[($i - 1), $j] + 1), ([int]$dist[$i, ($j - 1)] + 1))
$dist[$i, $j] = [System.Math]::Min($tempmin, ([int]$dist[($i - 1), ($j - 1)] + $cost))
}
}
return $dist[$len1, $len2];
}
$AllAdUsers = Get-ADUser -Filter { (givenname -like '*') -and (surname -like '*') } -Properties 'DisplayName'
$Content = Get-Content 'C:\users.txt'
$UnknownSourceUsers = [system.Collections.ArrayList]@()
foreach ($Row in $Content) {
$Split = $Row.Split(' ');
$LastName = $Split[$Split.Count - 1];
$FirstName = $Split[0];
$MiddleInitial = @{ $true = $Split[1]; $false = '' }[($Split.Count -eq 3) -and ($Split[1].Length -eq 1)]
if (($Split.Count -gt 3) -or ($Split.Count -lt 2) -or (($Split[1].Length -ne 1) -and ($Split.Count -eq 3))) {
$UnknownSourceUsers.Add($Row) | Out-Null
} else {
$Output = @{
'SourceFirstName' = $FirstName
'SourceLastName' = $LastName
'SourceMiddleInitial' = $MiddleInitial
'ActiveDirectoryFirstname' = ''
'ActiveDirectoryLastName' = ''
'ActiveDirectoryDisplayName' = ''
'ActiveDirectorySamAccountName' = ''
'ActiveDirectoryStatus' = ''
'ActiveDirectoryMatchMethod' = 'NoMatch'
}
$AdMatch = Get-ActiveDirectoryUserNameMatch -FirstName $FirstName -LastName $LastName -MiddleInitial $MiddleInitial
if (!$AdMatch) {
[pscustomobject]$Output | Export-Csv -Path johnoutput.csv -Append -NoTypeInformation
} else {
$Output.ActiveDirectoryDisplayName = $AdMatch.DisplayName
$Output.ActiveDirectoryFirstName = $AdMatch.givenName
$Output.ActiveDirectoryLastName = $AdMatch.surName
$Output.ActiveDirectorySamAccountName = $AdMatch.SamAccountName
$Output.ActiveDirectoryStatus = $AdMatch.Enabled
$Output.ActiveDirectoryMatchMethod = $AdMatch.MatchMethod
[pscustomobject]$Output | Export-Csv -Path output.csv -Append -NoTypeInformation
}
}
}
Write-Host 'Unrecognized name formats'
$UnknownSourceUsers
|
combined_dataset/train/non-malicious/sample_24_87.ps1
|
sample_24_87.ps1
|
<#
.SYNOPSIS
SyncServiceIIS.ps1 script file
This is a place-holder file only for agent patch build purposes
#>
Write-Host "This file functionality is deprecated and is place-holder only"
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDl6hxqgry3XZSs
# CPe36BD1TrOY7xbsiI1oyJ1d5Nz6JKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMI/BzqZ0GCB6dL+oY1mn4B4
# sOMC+b6Kxq+9fbz1kGTLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEANGKkWlFEFBK02E9C9QfYI7/E0XY9d7ArOSx+pp0qZAX0FHiElUV//+9c
# 5bdbsTx7Xk2AxbQugWJHUMITCcOP0R1OlYE0eSGWNZYkU7BZj+HC2RDQ6USqHoL5
# uosBXvYgm/8KmtEoLqFANGPF4xfemeKYd2UVHN+nctnH9QX33WX7zDIoy9EfA+sE
# cRaEWnEdxUZkx+gvIfdKi/mFBpJwlWD5BxaQrOzYjvSFFOfubN7+9tNy8d4OCrrA
# MDa0g/SpLBJvUqKIpcZeYaKxquSa7VcVMGFdjYY3x4DUkownqu9OflBfXnspfdyx
# GAA+NhLyxMEZNs2O1q3L/D5esL+4bKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCldp6MgktUU20X2OJb+klF2/cEUGkPYxWbY9YYIoGf6gIGZbwS4TOl
# GBMyMDI0MDIxMjE4MjUzOS40OTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRonTAiGA8yMDI0MDIxMjA5NTEy
# NVoYDzIwMjQwMjEzMDk1MTI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGid
# AgEAMAoCAQACAgKOAgH/MAcCAQACAhKyMAoCBQDpdbodAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBABNHhd2a8l9AkSew6E3ouHAoQVTxoBr1tzDmn+UDF/ut
# EUS5Xq0WW263TdU+PsMVT9LzJFuB1ie39ADvydLhjErGVukzncpsKWvRAGcUvBU3
# FAEco+FoEYnfyD1dxpAq5C3W6m+7hliTGM7AmNDotpXAiq0OtPfg5ixlRyM61y08
# AGC3CSqxRvJpH+7r4ox4L3DJWNDynrieGy7SM9Jl6xeyuxIwGVYdIPmzo5hWt4Ed
# rFEMGwXMTJOkz4GPy2HkWFS2F7G+RdLtSpPSgAumzVWYLHAJ/TBz0qaziiDNQvHx
# dHl+IaEAKuQwFRHMLWEbjtQnLgIPZJ5BK5EqUMuIjXgxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB
# 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCByCtaxlsTYQKoJjxlTlgZE6aJvi43Xum0Jl8FCZq1F
# PDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w
# wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgxTpQpi6SbkFY+zLnqEJNqPux
# ScexEDMqmrod4o47CNQwDQYJKoZIhvcNAQELBQAEggIAR9BjCl2Roh6aTwigoIpu
# md6T02KkkkCUBR2K4VVnq5UjaWJmx37fCKu4woR5GgMf+tEVK9Y6ewpyKi3HQ4lP
# TXOAQ3jw8wsUGvZ4aRKrungI7Vl2Q3UV5/pAPNv/9X1V8wcY3ETAXq7w8WLWGyLf
# y21Pmtkb25DsUzHTFUkCt78ZM30dn8B6yLRJAtd2DKKcNEqZJIu6V9hjIwZY2QnB
# 5WrdlDIaFzw461GDXRlDBXGzxGLqS/L2yTYiK2co6x0B1+A/pOJ/YncPpCt1mY6c
# SdvP3RrEiUfHRK5q4w6hoDNz921QvqZNxkUoBmoFLJs0pxJ1ebrdW6FMEG+u0AmT
# yvyFZ0wJYrEW2jQZvxYNK9FPa/5SZFa3CHLDwOgzaP/vELTEH9CI7Eq77L/t9JGc
# NzPT6eRDCMBxB+YeFpXNMMIJBWe2LljiiJTsGOH5vRq/MPh0d9fNWYTMOS0Z61eD
# fYqmznN2+n8p/cqswgiq1p5Fp9e2mk+RbzljztV5RYovZ5VZLCmCZO19QEHwm3TB
# 3lIcklXXGqF6E24Qffof4T0/8wPa2rPxjYVpnJsZ+ApGUd0F/8krv7hquaBl92PG
# NDvglU4v0zMh6KProGLb0w+oUnMbxbaMgOeB7CkY1rk4QyXK/CArmwsod1oa2srZ
# 3AvaUqcRVv3pRAiMR5OqRsM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/457.ps1
|
457.ps1
|
Set-PSFConfig -Module PSFramework -Name 'message.info.minimum' -Value 1 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MinimumInformation = $args[0] } -Description "The minimum required message level for messages that will be shown to the user."
Set-PSFConfig -Module PSFramework -Name 'message.info.maximum' -Value 3 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MaximumInformation = $args[0] } -Description "The maximum message level to still display to the user directly."
Set-PSFConfig -Module PSFramework -Name 'message.verbose.minimum' -Value 4 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MinimumVerbose = $args[0] } -Description "The minimum required message level where verbose information is written."
Set-PSFConfig -Module PSFramework -Name 'message.verbose.maximum' -Value 6 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MaximumVerbose = $args[0] } -Description "The maximum message level where verbose information is still written."
Set-PSFConfig -Module PSFramework -Name 'message.debug.minimum' -Value 1 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MinimumDebug = $args[0] } -Description "The minimum required message level where debug information is written."
Set-PSFConfig -Module PSFramework -Name 'message.debug.maximum' -Value 9 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::MaximumDebug = $args[0] } -Description "The maximum message level where debug information is still written."
Set-PSFConfig -Module PSFramework -Name 'message.info.color' -Value 'Cyan' -Initialize -Validation "consolecolor" -Handler { [PSFramework.Message.MessageHost]::InfoColor = $args[0] } -Description "The color to use when writing text to the screen on PowerShell."
Set-PSFConfig -Module PSFramework -Name 'message.info.color.emphasis' -Value 'green' -Initialize -Validation "consolecolor" -Handler { [PSFramework.Message.MessageHost]::InfoColorEmphasis = $args[0] } -Description "The color to use when emphasizing written text to the screen on PowerShell."
Set-PSFConfig -Module PSFramework -Name 'message.info.color.subtle' -Value 'gray' -Initialize -Validation "consolecolor" -Handler { [PSFramework.Message.MessageHost]::InfoColorSubtle = $args[0] } -Description "The color to use when making writing text to the screen on PowerShell appear subtle."
Set-PSFConfig -Module PSFramework -Name 'message.developercolor' -Value 'Gray' -Initialize -Validation "consolecolor" -Handler { [PSFramework.Message.MessageHost]::DeveloperColor = $args[0] } -Description "The color to use when writing text with developer specific additional information to the screen on PowerShell."
Set-PSFConfig -Module PSFramework -Name 'message.consoleoutput.disable' -Value $false -Initialize -Validation "bool" -Handler { [PSFramework.Message.MessageHost]::DisableVerbosity = $args[0] } -Description "Global toggle that allows disabling all regular messages to screen. Messages from '-Verbose' and '-Debug' are unaffected"
Set-PSFConfig -Module PSFramework -Name 'message.transform.errorqueuesize' -Value 512 -Initialize -Validation "integerpositive" -Handler { [PSFramework.Message.MessageHost]::TransformErrorQueueSize = $args[0] } -Description "The size of the queue for transformation errors. May be useful for advanced development, but can be ignored usually."
Set-PSFConfig -Module PSFramework -Name 'message.nestedlevel.decrement' -Value 0 -Initialize -Validation "integer0to9" -Handler { [PSFramework.Message.MessageHost]::NestedLevelDecrement = $args[0] } -Description "How many levels should be reduced per callstack depth. This makes commands less verbose, the more nested they are called"
Set-PSFConfig -Module PSFramework -Name 'developer.mode.enable' -Value $false -Initialize -Validation "bool" -Handler { [PSFramework.Message.MessageHost]::DeveloperMode = $args[0] } -Description "Developermode enables advanced logging and verbosity features. There is little benefit for enabling this as a regular user. but developers can use it to more easily troubleshoot issues."
Set-PSFConfig -Module PSFramework -Name 'message.style.breadcrumbs' -Value $false -Initialize -Validation "bool" -Handler { [PSFramework.Message.MessageHost]::EnableMessageBreadcrumbs = $args[0] } -Description "Controls how messages are displayed. Enables Breadcrumb display, showing the entire callstack. Takes precedence over command name display."
Set-PSFConfig -Module PSFramework -Name 'message.style.functionname' -Value $true -Initialize -Validation "bool" -Handler { [PSFramework.Message.MessageHost]::EnableMessageDisplayCommand = $args[0] } -Description "Controls how messages are displayed. Enables command name, showing the name of the writing command. Is overwritten by enabling breadcrumbs."
Set-PSFConfig -Module PSFramework -Name 'message.style.timestamp' -Value $true -Initialize -Validation "bool" -Handler { [PSFramework.Message.MessageHost]::EnableMessageTimestamp = $args[0] } -Description "Controls how messages are displayed. Enables timestamp display, including a timestamp in each message."
|
combined_dataset/train/non-malicious/sample_20_31.ps1
|
sample_20_31.ps1
|
#
# This script launches the VC redist executable and handles certain error scenarios.
#
param(
[Parameter(Mandatory=$true)][String][ValidateNotNullOrEmpty()]$PayloadDirectory,
[Parameter(Mandatory=$true)][String][ValidateSet("arm64","x64","x86")]$Architecture,
[Parameter(Mandatory=$true)][String][ValidateNotNullOrEmpty()]$LogFile,
[Parameter(Mandatory=$false)][String]$VersionToInstall
)
#
# Variables and helper functions
#
# Use transcript to log all output
$envTemp = [Environment]::GetEnvironmentVariable('TEMP', 'User')
$date = Get-Date -Format "yyyyMMddHHmmss"
$transcriptPath = "$envTemp\dd_vcredist_wrapper_" + $Architecture + "_" + $date + ".log"
Start-Transcript -Path $transcriptPath
# Gather VC runtime version information in registry and files, generating appropriate output
Function Collect-Version-Information($outputString)
{
# Get registry version information
$vcrtRegVersionNative = $missingVersion
$vcrtRegVersionWOW = $missingVersion
if (![string]::IsNullOrEmpty($vcrtRegKeyPathNative) -and (Test-Path $vcrtRegKeyPathNative)) {
$vcrtRegKeyNative = Get-ItemProperty -Path $vcrtRegKeyPathNative
$vcrtRegVersionNative = "$($vcrtRegKeyNative.Major).$($vcrtRegKeyNative.Minor).$($vcrtRegKeyNative.Bld).$($vcrtRegKeyNative.Rbld)"
}
if (![string]::IsNullOrEmpty($vcrtRegKeyPathWOW) -and (Test-Path $vcrtRegKeyPathWOW)) {
$vcrtRegKeyWOW = Get-ItemProperty -Path $vcrtRegKeyPathWOW
$vcrtRegVersionWOW = "$($vcrtRegKeyWOW.Major).$($vcrtRegKeyWOW.Minor).$($vcrtRegKeyWOW.Bld).$($vcrtRegKeyWOW.Rbld)"
}
$regVersionToCheck = $vcrtRegVersionNative
if (($installType -eq [InstallType]::X64Native) -or ($installType -eq [InstallType]::Arm64Native) -and ($vcrtRegVersionNative -ne $vcrtRegVersionWOW)) {
$vcrtRegVersion = "registry version mismatch"
Write-Host "$outputString registry versions"
if ($vcrtRegVersionNative -ne $missingVersion) {
Write-Host " native: $vcrtRegVersionNative"
} else {
Write-Host " native: $missingVersionOutput"
}
if ($vcrtRegVersionWOW -ne $missingVersion) {
Write-Host " WOW: $vcrtRegVersionWOW"
} else {
Write-Host " WOW: $missingVersionOutput"
}
$regVersionToCheck = $null
} elseif ($installType -eq [InstallType]::X86OnX64) {
$regVersionToCheck = $vcrtRegVersionWOW
}
if ($regVersionToCheck -ne $null) {
if ($regVersionToCheck -ne $missingVersion) {
$vcrtRegVersion = $regVersionToCheck
Write-Host "$outputString registered version: $vcrtRegVersion"
} else {
Write-Host "No version registered"
}
}
# Get file version information
$vcrtFileVersion = $null
Foreach ($redistFile in $allRedistFiles) {
if (Test-Path -path "$systemDir\$redistFile") {
$redistFileVersion = (Get-Item -LiteralPath "$systemDir\$redistFile").VersionInfo.FileVersionRaw
$redistFileVersions += @{ $redistFile = $redistFileVersion }
if ($vcrtFileVersion -eq $null) {
$vcrtFileVersion = $redistFileVersion
} elseif ($redistFileVersion -ne $vcrtFileVersion) {
$vcrtFileVersion = "multiple versions found"
}
} else {
$redistFileVersions += @{ $redistFile = $missingVersion }
}
}
if ($vcrtFileVersion -eq $null) {
$vcrtFileVersion = "no VC runtime files installed"
}
Write-Host "$outputString file version: $vcrtFileVersion"
# If the registry and all file versions do not agree, list each file and its version
$vcrtVersionConsistent = $true
$outputStringLowerCase = $outputString.ToLower()
if ($vcrtRegVersion -ne $vcrtFileVersion) {
Write-Host "Inconsistent VC runtime install detected: registry version does not match file version"
$vcrtVersionConsistent = $false
$skipSoftRebootCheckReasons += "$outputStringLowerCase registry version does not match $outputStringLowerCase file version"
}
if ($vcrtFileVersion -eq "multiple versions found") {
Write-Host "Inconsistent VC runtime install detected: not all files have same version"
$vcrtVersionConsistent = $false
$skipSoftRebootCheckReasons += "not all $outputStringLowerCase files have same version"
}
if (! $vcrtVersionConsistent ) {
Foreach ($redistFile in $allRedistFiles) {
$redistFileVersionValue = $redistFileVersions[$redistFile]
if ($redistFileVersionValue -eq $missingVersion) { $redistFileVersionValue = "not installed"}
Write-Host " ${redistFile}: $redistFileVersionValue"
}
$vcrtVersionConsistent = $false
}
$vcrtVersion = $vcrtRegVersion
if ($vcrtVersionConsistent -eq $false) {
$vcrtVersion = $null
}
return $vcrtVersionConsistent, $vcrtVersion
}
#
# Main execution sequence
#
# Initialize variables
$envMachineArch = [Environment]::GetEnvironmentVariable("PROCESSOR_ARCHITECTURE", 'Machine');
$envWINDIR = [Environment]::GetEnvironmentVariable('WINDIR', 'Machine')
# These variables are initialized to default x64 native values and overridden as appropriate:
# $installType = one of { X64Native, X86OnX64, X86Native }
# $systemDir = where to find installed files
# $registryPath[Native,WOW] = the paths to the Native and WOW registry keys
enum InstallType {
Arm64Native
X64Native
X86OnX64
X86Native
}
# Setting $systemDir needs to account for System32 redirection on 64-bit processors:
#
# MachineArch Process VCRTArch TargetDirectory SystemDirValue
# x64 64-bit x64 System32 System32
# x64 32-bit x64 System32 Sysnative (avoids redirection to SysWOW64)
# x64 64-bit x86 SysWOW64 SysWOW64
# x64 32-bit x86 SysWOW64 System32 (redirects to SysWOW64)
# x86 32-bit x86 System32 System32
# arm64 64-bit arm64 System32 System32
$installType = [InstallType]::X64Native
$is64BitPS = [IntPtr]::Size -eq 8
$systemDir = "$envWINDIR\System32"
if ($Architecture -eq "x64" -and $is64BitPS -eq $false) {
$systemDir = "$envWINDIR\Sysnative"
} elseif ($Architecture -eq "x86" -and $is64BitPS -eq $true) {
$systemDir = "$envWINDIR\SysWOW64"
}
# Registry keys
$vcrtRegKeyPathNative = "HKLM:\Software\Microsoft\VisualStudio\14.0\VC\Runtimes\$Architecture"
$vcrtRegKeyPathWOW = "HKLM:\Software\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\$Architecture"
if ($envMachineArch -eq 'AMD64' -and $Architecture -eq 'x86') {
$installType = [InstallType]::X86OnX64
} elseif ($envMachineArch -eq 'X86' -and $Architecture -eq 'x86') {
$installType = [InstallType]::X86Native
$vcrtRegKeyPathWOW = ""
} elseif ($envMachineArch -eq 'ARM64') {
$installType = [InstallType]::Arm64Native
}
# The value "0.0.0.0" indicates the registry key is empty or the file is not present,
# which typically indicates the VCRT is not installed or only partially installed.
$missingVersion = "0.0.0.0"
$missingVersionOutput = "not found"
# List of VCRT files
$redistSharedFiles = @(
"concrt140.dll",
"mfc140.dll",
"mfc140chs.dll",
"mfc140cht.dll",
"mfc140deu.dll",
"mfc140enu.dll",
"mfc140esn.dll",
"mfc140fra.dll",
"mfc140ita.dll",
"mfc140jpn.dll",
"mfc140kor.dll",
"mfc140rus.dll",
"mfc140u.dll",
"msvcp140.dll",
"msvcp140_1.dll",
"msvcp140_2.dll",
"msvcp140_atomic_wait.dll",
"msvcp140_codecvt_ids.dll",
"vcamp140.dll",
"vccorlib140.dll",
"vcomp140.dll",
"vcruntime140.dll",
"vcruntime140_threads.dll"
)
$redistIntelFiles = @(
"mfcm140.dll",
"mfcm140u.dll"
)
$redistX64Files = @(
"vcruntime140_1.dll"
)
if ($Architecture -eq 'x64') {
$allRedistFiles = @($redistSharedFiles) + @($redistIntelFiles) + @($redistX64Files)
} elseif ($Architecture -eq 'arm64') {
$allRedistFiles = @($redistSharedFiles) + @($redistX64Files)
} else {
$allRedistFiles = @($redistSharedFiles) + @($redistIntelFiles)
}
# Begin output
Write-Host "Installing Visual C++ Redist"
Write-Host "Inputs:"
Write-Host " PayloadDirectory: $PayloadDirectory"
Write-Host " Architecture: $Architecture"
Write-Host " LogFile: $LogFile"
Write-Host " VersionToInstall: $VersionToInstall"
Write-Host "Environment:"
Write-Host " WINDIR: $envWINDIR"
Write-Host " TEMP: $envTemp"
Write-Host " system directory: $systemDir"
Write-Host " native reg. key: $vcrtRegKeyPathNative"
Write-Host " WOW64 reg. key: $vcrtRegKeyPathWOW"
Write-Host "Installing $Architecture Visual C++ Runtime on $envMachineArch system"
$checkForSoftReboot = $true
$skipSoftRebootCheckReasons = @()
# Lookup current versions in registry and files to determine if there is
# a consistent VC Runtime installation. An inconsistent initial install does not
# disable soft-reboot since it can be a valid state (vc_redist installs a full
# set of runtime files, then an MSM install updates only a subset of files).
$vcrtIsInitialInstallConsistent, $vcrtUpdatedVersion = Collect-Version-Information("Initial")
if (! $vcrtIsInitialInstallConsistent ) {
Write-Host "Information: initial VC runtime install is not consistent"
}
# Run VCRT install command with parameters used for VS installs
# command: $PayloadDirectory\vc_redist.$Architecture.exe /q /norestart /log $LogFile
# example: VC_redist.x64.exe /q /norestart /log <logfilename>
# Use Start-Process to wait for exit and pass-thru the exit code
$vcrtExePath=-join($PayloadDirectory, "\\VC_redist.", $Architecture, ".exe")
$vcrtInstallerVersion = (Get-Item -LiteralPath $vcrtExePath).VersionInfo.FileVersionRaw
Write-Host "Redist Installer Version: $vcrtInstallerVersion"
$vcrtProcess = Start-Process -FilePath $vcrtExePath -ArgumentList "/q /norestart /log $LogFile" -Wait -PassThru
$vcrtProcessExitCode = $vcrtProcess.ExitCode
Write-Host "Redist Exit Code: $vcrtProcessExitCode"
# Gather updated versions in registry and files
$vcrtIsUpdatedInstallConsistent, $vcrtUpdatedVersion = Collect-Version-Information("Updated")
if (! $vcrtIsUpdatedInstallConsistent ) {
Write-Host "Skipping soft-reboot check: updated VC runtime install is not consistent"
$checkForSoftReboot = $false
}
if ((! [string]::IsNullOrEmpty($VersionToInstall)) -and ($vcrtUpdatedVersion -ne $VersionToInstall)) {
$msg = "updated VC runtime version $vcrtUpdatedVersion does not match expected version $VersionToInstall"
Write-Host "Skipping soft-reboot check: $msg"
$checkForSoftReboot = $false
$skipSoftRebootCheckReasons += $msg
}
$returnCode=$vcrtProcessExitCode
if ($vcrtProcessExitCode -ne 3010) {
$msg = "redist exit code was not ERROR_SUCCESS_REBOOT_REQUIRED (3010)"
Write-Host "Skipping soft-reboot check: $msg"
$checkForSoftReboot = $false
$skipSoftRebootCheckReasons += $msg
}
if ($checkForSoftReboot -and ($vcrtIsUpdatedInstallConsistent -eq $true)) {
# The soft-reboot case occurs when the installer returns ERROR_SUCCESS_REBOOT_REQUIRED (3010),
# but all files were actuall updated and the VCRT install is consistent. In this case, convert
# the return code to NS_S_REBOOT_RECOMMENDED (862968) for soft reboot. This code is defined in
# files nserror.h and zunenserror.h and can be identified by http://errors.
Write-Host "Soft-reboot conditions detected, changing exit code from 3010 to 862968"
$returnCode = 862968
} else {
Write-Host "Reasons for skipping soft-reboot check:"
Foreach ($reason in $skipSoftRebootCheckReasons) {
Write-Host " $reason"
}
}
Write-Host "Wrapper Exit Code: $returnCode"
Stop-Transcript
exit $returnCode
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAx/euVbHAt7uS2
# y4y9FWu1gZaSpY1rX8mHD7awv0bxnKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAKG
# XW1m/FvtQTRX2UsEuUN4cKx0ChRz0Hk4P5V3KXISMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAG2eHCEu9P8Qcpjbs9TtMryUeqVEtAWKRIARC
# fhFn2+k6/aCG/8xWNdb2tWzwsO4DkY6RhhnXWt2YgccTDMrrNRYqsQ/cympmrq8y
# 0zHb1A5Zh3yDmbL/H4nOpvr8oSwRLq4DS+NRwOofb0fBsENWOkOTqH81+qMcx9Wo
# ZKJ0R1jiqETBNWug8JmhnRusZsK/94phwJr+gTBLHu4QVLC6Hj6JASnx5KQpbpVm
# AJF+dTSpRj23K1B+d24fEOsfJtVYqLs5VmqpO/bJv4YknTV3PDk+o1b+cgvH6o9B
# VV3BvkLSo23/823YhlKd0k0HPLsU6IlWIA1LmCN8VThIslOIaKGCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDOlRDA9uD61tkect7MkPtIqC9FuWuj+gX4
# 0uz61284dgIGZYL0OnpPGBMyMDI0MDExOTE3Mjg0Ny42NjNaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHlj2rA
# 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7
# 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY
# SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4
# dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq
# cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE
# izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J
# VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/
# 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu
# QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm
# z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc
# c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd
# JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG
# gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup
# gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU
# wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg
# oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD
# YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu
# dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3
# 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu
# uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD
# C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY
# FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD
# d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOlU/WUwIhgPMjAyNDAxMTkyMTUzNDFaGA8yMDI0MDEy
# MDIxNTM0MVowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6VT9ZQIBADAGAgEAAgEh
# MAcCAQACAhFAMAoCBQDpVk7lAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# VvMIp+3nRk3FYQsynS9qEol86FKwXiDoXI7HXAuVJUVwm8Iqx9/0xKdqWPpo/tH2
# 8JRZR9d/oXaEv6l9U93EXWU/WqLRT2TbKA9BI9HITkoqUut4DlZ8DP0V7SypOIik
# EMoSU3wcZxznxtgklCq623VAPXOc8Lo+sPPLfAY2uBkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB
# 5TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCD1QnOAPhnidNaAx+G/ydAXq+N75JH3qlTp1KF9n2AM
# XjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vw
# j+kCh/TULCFvFQf1Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwIgQg3dX9plziduzK74+wraH/k37U
# HyaUoNCOFUmPoNHd/m0wDQYJKoZIhvcNAQELBQAEggIAlzaUSn5OI8ZfMPB0+mTa
# owCkh4vb1uMyS2X/6fn7b5UlV5MBN1QhvzsWysSyDsgLmeFi8K38qKg016odWWvr
# kwfSYHZum66u2tYP9dN6IfsHxLy7N0R/7GQozM1XyuGS4PulNV4k58l6i7LQR1MV
# huwnhNb/G+S3GIxdDmb4lh3jKiENYIC+AbLbP+o2cfVvrlsLNAIrSWM/Kdc2JiOS
# cFPQUcACJ4FJICOpyEt7oCNv/jSohI5ZaNdE8uUB29fHgLqZxVgp9Mkf9YvU1BRx
# l75iRR7fvyBYoKe0iMsRauUs5kY4d4t+3QFOqES4p5juK187JyYWFaZ5byup3nic
# o8tkaeIBsJAd7VLauso3rUGpTYJZ3naV2GhZY1BEuUOjCOTQog2mh0SE4JONzClp
# SXGWuQEtuXQREAaiZmWG0R8Srk0iTyl2iVJ0b+La9l6J2YoR9Tm9FGXaeAJbADLs
# ak23YTLaqIVQDpc89S4/rMytsxXYPDkL4+O7OmIGD0eVPExS+D1XgRnS/EZsyhaJ
# xBk9TCuzj6H/ufo1fkRqg05TBJk57FQwXtsglDDNRCXBr7B+pJ/RN0+xi6U7y+r8
# XkhRl98RLB6f3TIljRcJBkjuyzgomFu/b9T4NiilRlL49kvG7neLhvc57Yfo9irU
# f425z5bqlZ8xGd3Qi0bP+Qs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Progress Message popup.ps1
|
Progress Message popup.ps1
|
#Generated Form Function
function ProgressMessage {
########################################################################
# Code Generated By: SAPIEN Technologies PrimalForms (Community Edition) v1.0.10.0
# Generated On: 29/01/2013 11:01 AM
# Generated By: Denis St-Pierre, Ottawa, Canada
#source http://poshcode.org/4020
########################################################################
param( #parameters with default values assigned
[String]$LabelText="Message",
[String]$FormTitle="Form Title",
# [int]$nSecondsToWait=3,
# [int]$Buttons = 0,
[int]$FontSize = 12,
[String]$ICOpath=""
)
If ( Get-Variable -Name ProgMsgForm1 -Scope Global -ErrorAction SilentlyContinue ) {
$ProgMsgForm1.close() #Kill previous Progress Message to prevent lost handles
}
If ($LabelText -eq ""){
Return
}
$LabelText="`r`n "+$LabelText+" `r`n " #add space around the message
#region Import the Assemblies
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
#endregion
#region Generated Form Objects
$global:ProgMsgForm1 = New-Object System.Windows.Forms.Form
$ProgMsgLabel1 = New-Object System.Windows.Forms.Label
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
#endregion Generated Form Objects
#region Generated Form Code
$ProgMsgForm1.AutoSize = $True
$ProgMsgForm1.AutoSizeMode = 0
# $System_Drawing_Size = New-Object System.Drawing.Size
#$System_Drawing_Size.Height = 113
#$System_Drawing_Size.Width = 255
# $ProgMsgForm1.ClientSize = $System_Drawing_Size
$ProgMsgForm1.DataBindings.DefaultDataSourceUpdateMode = 0
#add Icon to dialog
If ( ($ICOpath -ne "") -and (Test-Path "$ICOpath") ) {
Try { #If the ICO file is NFG, ignore and move on
$ProgMsgForm1.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon("$ICOpath")
} catch { } #use default ICO
}
$ProgMsgForm1.Name = "form1"
$ProgMsgForm1.StartPosition = 1 #Center of the Screen
$ProgMsgForm1.Text = "$FormTitle"
# $ProgMsgLabel1.AutoEllipsis = $True #handle text that goes beyond width of Label control
$ProgMsgLabel1.AutoSize = $True
$ProgMsgLabel1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
# $System_Drawing_Point.X = 10
# $System_Drawing_Point.Y = 10
$ProgMsgLabel1.Location = $System_Drawing_Point
$ProgMsgLabel1.Name = "label1"
# $System_Drawing_Size = New-Object System.Drawing.Size
## $System_Drawing_Size.Height = 13
## $System_Drawing_Size.Width = 35
# $ProgMsgLabel1.Size = $System_Drawing_Size
$ProgMsgLabel1.TabIndex = 0
$ProgMsgLabel1.Text = "$LabelText"
$ProgMsgLabel1.TextAlign = 2
$ProgMsgLabel1.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",$FontSize,1,3,1)
$ProgMsgForm1.Controls.Add($ProgMsgLabel1)
#endregion Generated Form Code
#Save the initial state of the form
$InitialFormWindowState = $ProgMsgForm1.WindowState
#Init the OnLoad event to correct the initial state of the form
$ProgMsgForm1.add_Load($OnLoadForm_StateCorrection)
#Show the Form
#$ProgMsgForm1.ShowDialog()| Out-Null #ShowDialog waits until it is closed
$ProgMsgForm1.Show() #show forms and keep on going
$ProgMsgForm1.activate() #Make sure its on top
return $ProgMsgForm1 #need to do this to kill form later (now optional b/c $ProgMsgForm1 is made global)
} #End Function
#Call the Function
$ProgressObj=ProgressMessage "this is text to display this is text to display this is text to display this is text to display this is text to display" "My title"
Echo "doing other stuff"
Start-Sleep -Second 2
Echo "doing other stuff"
Start-Sleep -Second 2
#$ProgressObj.Close() #if you forget to close previous, it stays on the screen and you cant kill it!
$ProgressObj=ProgressMessage "LEt's see if this works too"
Echo "doing other stuff"
Start-Sleep -Second 3
Echo "doing other stuff"
Start-Sleep -Second 2
#$ProgressObj.Close()
ProgressMessage "" #close progress message
|
combined_dataset/train/non-malicious/sample_30_31.ps1
|
sample_30_31.ps1
|
"use strict";
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
Object.defineProperty(exports, "__esModule", { value: true });
exports.Clear = void 0;
const switch_1 = require("../switch");
class Clear extends switch_1.Switch {
switch = 'clear';
}
exports.Clear = Clear;
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xlYXIuanMiLCJzb3VyY2VSb290IjoiaHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL21pY3Jvc29mdC92Y3BrZy10b29sL21haW4vdmNwa2ctYXJ0aWZhY3RzLyIsInNvdXJjZXMiOlsiY2xpL3N3aXRjaGVzL2NsZWFyLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQSx1Q0FBdUM7QUFDdkMsa0NBQWtDOzs7QUFFbEMsc0NBQW1DO0FBRW5DLE1BQWEsS0FBTSxTQUFRLGVBQU07SUFDL0IsTUFBTSxHQUFHLE9BQU8sQ0FBQztDQUNsQjtBQUZELHNCQUVDIn0=
// SIG // Begin signature block
// SIG // MIIoKwYJKoZIhvcNAQcCoIIoHDCCKBgCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // ZmkDk40JJeHZgSIRQZlNibhIZg12xEuU9at0PvZ9MdOg
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoNMIIaCQIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCDo7U/49pOqPbdXYt1tt1C7OgYJRYWKzoJE
// SIG // IvwCbDLEeDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAKPq+v1+
// SIG // jGyfWCYRimIaSO1fB2vhadVYV+dWak6EpDXq0W8FGiyQ
// SIG // 9NLNVFSjQa1QID6VfaM58F96aWFGl5sSeiObddIUkI9T
// SIG // jAr9eAIsu23teo8RV8H0NeC84IDKcc+1snnZodg3bmBe
// SIG // 9CMdErVGJ1e0AU/ZfrmB/pF5ad0CJp7Wjq3GBkP8BhUm
// SIG // pHdZdWV3cZ2E34YbPZmYfeRngGH7YePERM5PFC3xKmiH
// SIG // /A1Wdw5JYTnOsD7eHyhqqtL0fa0c8gh2GUy1Jgd9Cska
// SIG // n3lGWWYhXmq234KLSk1Vc8LdE1qVJZfOGBMDeLN/+qeM
// SIG // RmX/kWZ/rFO4IlkNhCa/LKSqI4OhgheXMIIXkwYKKwYB
// SIG // BAGCNwMDATGCF4Mwghd/BgkqhkiG9w0BBwKgghdwMIIX
// SIG // bAIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN
// SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgljDERpUBEox67W6YxTig
// SIG // vOiV3NQ5dqJxcKT1iI9y8roCBmV7IKCuQhgTMjAyNDAx
// SIG // MTEwMjU5MTUuMzExWjAEgAIB9KCB0aSBzjCByzELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0
// SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
// SIG // aWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYD
// SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
// SIG // oIIR7TCCByAwggUIoAMCAQICEzMAAAHODxj3RZfnxv8A
// SIG // AQAAAc4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMwNTI1MTkxMjA4WhcN
// SIG // MjQwMjAxMTkxMjA4WjCByzELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl
// SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
// SIG // OkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAuQpMGdco2Md35yk8
// SIG // P1Z88BhoSjiI6jA0rh3RoPCaCdizdpwVFJAMMYWAEeGU
// SIG // FoPUG48Wfw1qw9sXlMC5yjijQzbYV/b2io/l+QrcYuoq
// SIG // E1VO1AeaEOMBqZFdpJn56dEWBnYbXOfAGqFGRXL4XQZS
// SIG // dshE8LgrhFeqZOCe4IRsprM69B1akfQdjCY1fK3jy/hx
// SIG // iMyG2C65NI1pmikUT7BX8SisN54xYBZUqmgQOElbldBW
// SIG // BP+LdGfVI11Dy6sPog3i1L97Kd4fTOKDSGdtelT5VZX9
// SIG // xThUS5WYPHgnl+MZWgY1omveZ15VzF0FqmiMJIDeE7Ec
// SIG // 8poHlrlczKUTwVpOoDo88cF54yHFqsdZT85yEr/8bZ9R
// SIG // 6QfgiBeUjypAn/JQj4mdRLQdNRcx0Y/mIUViY7EZdYC1
// SIG // tYtBC661lQBawz6yLIQSqM+klAMig+8j8euPUsixgaP7
// SIG // yR8WYDJWIq3JH/XpJaazQ3qLJYa3iGMwCazCfmKFp/Q8
// SIG // ZoP+4Rgv1x/HpY5iagS6shwpnYEvlgK4/OHIkRrJqkWl
// SIG // Af+IRRlJC79RmtrxD7VQclJox3AKaSUdTzpotQE1fRbr
// SIG // DkEMZA9p11kilnygKQ+7RnzWTEb5LnxxcBn+TZzdAIpt
// SIG // JYwYNTuYLONxaJP7kntds0C9IUj/SX/ogi/jT0zwDyTx
// SIG // LG3WGr0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQw+whG
// SIG // QKOTDI6ZfhVk7FMp+eKFxTAfBgNVHSMEGDAWgBSfpxVd
// SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ
// SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
// SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
// SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
// SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
// SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB
// SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G
// SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // lyAWFv9FFUww2Tv30Nl7LTQuA2RvET265WR8hbee8/1V
// SIG // qj7req7oGshltVHLybsX/ERLYk7Zn+UkOTdqbtJ05eju
// SIG // AbUnCLzPyvKXv8o++8fLur35PEOkgzmaBaSKVZBR98uu
// SIG // 4rH+P0n6DfTNpy2/d6aPzrZTPQHFkyW6rp8wvpJni3MS
// SIG // ZgsS3LIgTCemU70jVkJ4nIDLr+zxdIqfR2I8xVqDavKp
// SIG // 67O4PvmBj11O3qZdSkgU6/VEex5/5DXKgomX9tg4aGT1
// SIG // T+/r2R02Pjl6MaBBDp8wGwJQQrqf8G1zSYrLIivGckSV
// SIG // 0/0eBVZhNtgkr6bvqeTHkZQU+NqZCIYTJal5bHUHU/XF
// SIG // iLYlvMlkaWhNWSNZsvRVvCTPQ7QkLYt2bhh0jab5uEAG
// SIG // P+ta8qyqJeES3+RfkgJeKM1bzPDyjHkXRJqNsDs2SuDB
// SIG // Ow+4h8y3GKebnMNJILMt/en2nM7F3Zy0qJlzAK7LRpB7
// SIG // 7fxd4atnhEkNj4K1/oKXQaPLj1dessJp6QMGKjHWTPsh
// SIG // +gf/+DLFxLt0YOUDqDlnYzVQe0JujDyYPrw1+fV7zJom
// SIG // wM26ZcSMqe0tZMuy/oN4auisZSkPWm1I2KWjhZx7SgxS
// SIG // fr8c53BDFRFdyB0HYwu7q6jgYDu78qXiMI0OvPartjTb
// SIG // iEOnGWYDJ/BL0klkcAxvIIkwggdxMIIFWaADAgECAhMz
// SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
// SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
// SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
// SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx
// SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
// SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
// SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
// SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc
// SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
// SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130
// SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
// SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes
// SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp
// SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
// SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz
// SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO
// SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
// SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5
// SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
// SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
// SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
// SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
// SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG
// SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv
// SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
// SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
// SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
// SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
// SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
// SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
// SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
// SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
// SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l
// SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
// SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz
// SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
// SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY
// SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX
// SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
// SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz
// SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/
// SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
// SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328
// SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
// SIG // ahC0HVUzWLOhcGbyoYIDUDCCAjgCAQEwgfmhgdGkgc4w
// SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
// SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV
// SIG // BAsTHm5TaGllbGQgVFNTIEVTTjpGMDAyLTA1RTAtRDk0
// SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAXY2VGxTQMgpF
// SIG // ROg3VVsos02EB8yggYMwgYCkfjB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOlJ
// SIG // NtMwIhgPMjAyNDAxMTAxNTMxMzFaGA8yMDI0MDExMTE1
// SIG // MzEzMVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6Uk2
// SIG // 0wIBADAKAgEAAgIdcAIB/zAHAgEAAgITaTAKAgUA6UqI
// SIG // UwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBCwUAA4IBAQCwlCDRA1rvqFy5Q8xkeaLRwNxF
// SIG // jlytK25H9/QwTFo1iMYLAkvRIW9gMTyYxSu3dX7HfAlA
// SIG // DAWqHTsKSThOlsxyVQJB9nR6Mi6QG9ZqnByIzaGxZ7CL
// SIG // 6PnxuIZNiz91RdmqUnRUlQpuiTWqiX8GLlgiwb3ZPmhS
// SIG // Y8IqpQnc41Zgo5JKr1tQjvSK5NGveLYkJkb7VQys7Sso
// SIG // /2uY+r7lj60VrwlTYqSdaAmGTMOHrO27/6fgVsZGCsT9
// SIG // 2tL47Wuzdl/7kqJmHYoNtzEztOUnFWn5WswlgeiG1cV6
// SIG // 5pfUZGFepSbIIuFWf+hjK+TS+EBU1Iy7TYQ3dR7YbGr7
// SIG // g0zj/xQGMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTACEzMAAAHODxj3RZfnxv8AAQAA
// SIG // Ac4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ
// SIG // AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg
// SIG // u5nPB2iauonjUJlJKzhkeXPIGRoRmB3FY5Zok5GPcMEw
// SIG // gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAybM9B
// SIG // ei9Fw1JudyUQXzTGbMyrJZSwzImhWdzy/y6sZzCBmDCB
// SIG // gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
// SIG // HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
// SIG // AAABzg8Y90WX58b/AAEAAAHOMCIEIDU892bTTz7iXwiN
// SIG // C9db9NTRA8tnhVKGvA0iStPXtgLGMA0GCSqGSIb3DQEB
// SIG // CwUABIICAEoWhSJM3fSk+mimZElNRIHhEYhhOExcJl+O
// SIG // 8C2Y6A5MPL0KaOiTaaIbQYH8aWte2bmLv+ZG/Mecdq36
// SIG // dtcf1EoW/TfGEQ5t6kIvI/YX4Zcw/PtGllyyL7uo2TT9
// SIG // +su/x0zeWu6bXyq3xuXF8DoQWIC7IltcrFmhClSx4TcR
// SIG // aAvNJHRV4WebUDhGBGKj4nyF3G9xnIcoJMYdT5Uw1eaj
// SIG // f7Y9M4MncaNMYFp37dX/BdvPULtBGitDJa3ZmnmklPnm
// SIG // 9/sCKiTB6/XlfeUaA3bRPh37ygn8vwLmfdi3wv0R0IJZ
// SIG // NfeZSxIrZPxqtBkHyVV1SkWcPHlpJ35uCHmR/8FKJAe7
// SIG // PzQrEerQ67NEvL9ZgiUqLagXBpLKS826NvHB4HNZcmSf
// SIG // LTUkhsRtjzvCRx8n0UMpnBtvXWtBBH+UnyXcYmMD4kVE
// SIG // obJ/9ikgbZs0alTjhGKr4YdYGDFj8d6gmOpt7C7361Um
// SIG // BACmvwSCakTay0385L/QOP/LJx3jL0Qqy9ldIJ7nUVrm
// SIG // MdTosseTbNumkEi6KfiYNzI2Cqx3NMS/HGA05SQUgg/x
// SIG // FpnHqYT69kh3tlqC61kKjIWjTKle48NKcCNLJ3d9Y+nW
// SIG // 208ytfSREvy/kRE6uKwqNM9/kLnWuRJhOCVXhHWcn9iT
// SIG // gJevl8Jhz6oh1PGGZBetwgCD39MlP1US
// SIG // End signature block
|
combined_dataset/train/non-malicious/4294.ps1
|
4294.ps1
|
function New-SQLiteConnection
{
[cmdletbinding()]
[OutputType([System.Data.SQLite.SQLiteConnection])]
param(
[Parameter( Position=0,
Mandatory=$true,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false,
HelpMessage='SQL Server Instance required...' )]
[Alias( 'Instance', 'Instances', 'ServerInstance', 'Server', 'Servers','cn','Path','File','FullName','Database' )]
[ValidateNotNullOrEmpty()]
[string[]]
$DataSource,
[Parameter( Position=2,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[System.Security.SecureString]
$Password,
[Parameter( Position=3,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Switch]
$ReadOnly,
[Parameter( Position=4,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[bool]
$Open = $True
)
Process
{
foreach($DataSRC in $DataSource)
{
Write-Verbose "Querying Data Source '$DataSRC'"
[string]$ConnectionString = "Data Source=$DataSRC;"
if ($Password)
{
$BSTR = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Password)
$PlainPassword = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($BSTR)
$ConnectionString += "Password=$PlainPassword;"
}
if($ReadOnly)
{
$ConnectionString += "Read Only=True;"
}
$conn = New-Object System.Data.SQLite.SQLiteConnection -ArgumentList $ConnectionString
$conn.ParseViaFramework = $true
Write-Debug "ConnectionString $ConnectionString"
if($Open)
{
Try
{
$conn.Open()
}
Catch
{
Write-Error $_
continue
}
}
write-Verbose "Created SQLiteConnection:`n$($Conn | Out-String)"
$Conn
}
}
}
|
combined_dataset/train/non-malicious/sample_39_99.ps1
|
sample_39_99.ps1
|
#
# Module manifest for module 'OCI.PSModules.Databasemigration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Databasemigration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects',
'Connect-OCIDatabasemigrationionDiagnostics',
'Get-OCIDatabasemigrationAdvisorReport',
'Get-OCIDatabasemigrationAgent',
'Get-OCIDatabasemigrationAgentImagesList',
'Get-OCIDatabasemigrationAgentsList',
'Get-OCIDatabasemigrationConnection',
'Get-OCIDatabasemigrationConnectionsList',
'Get-OCIDatabasemigrationExcludedObjectsList',
'Get-OCIDatabasemigrationJob',
'Get-OCIDatabasemigrationJobOutputContent',
'Get-OCIDatabasemigrationJobOutputsList',
'Get-OCIDatabasemigrationJobsList',
'Get-OCIDatabasemigrationMigration',
'Get-OCIDatabasemigrationMigrationObjectsList',
'Get-OCIDatabasemigrationMigrationObjectTypesList',
'Get-OCIDatabasemigrationMigrationsList',
'Get-OCIDatabasemigrationWorkRequest',
'Get-OCIDatabasemigrationWorkRequestErrorsList',
'Get-OCIDatabasemigrationWorkRequestLogsList',
'Get-OCIDatabasemigrationWorkRequestsList',
'Invoke-OCIDatabasemigrationCloneMigration',
'Invoke-OCIDatabasemigrationEvaluateMigration',
'Invoke-OCIDatabasemigrationResumeJob',
'Invoke-OCIDatabasemigrationRetrieveSupportedPhases',
'Move-OCIDatabasemigrationAgentCompartment',
'Move-OCIDatabasemigrationConnectionCompartment',
'Move-OCIDatabasemigrationMigrationCompartment',
'New-OCIDatabasemigrationConnection',
'New-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationAgent',
'Remove-OCIDatabasemigrationConnection',
'Remove-OCIDatabasemigrationJob',
'Remove-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationMigrationObjects',
'Start-OCIDatabasemigrationMigration',
'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent',
'Update-OCIDatabasemigrationConnection',
'Update-OCIDatabasemigrationJob',
'Update-OCIDatabasemigrationMigration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/885.ps1
|
885.ps1
|
$resourceGroupName = "<Enter a name for the resource group>"
$nhubnamespace = "<Enter a name for the notification hub namespace>"
$location = "East US"
New-AzResourceGroup -Name $resourceGroupName -Location $location
New-AzNotificationHubsNamespace -ResourceGroup $resourceGroupName -Namespace $nhubnamespace -Location $location
$text = '{"name": "MyNotificationHub", "Location": "East US", "Properties": { }}'
$text | Out-File "inputfile2.json"
New-AzNotificationHub -ResourceGroup $resourceGroupName -Namespace $nhubnamespace -InputFile .\inputfile.json
|
combined_dataset/train/non-malicious/Get-ScriptCoverage.ps1
|
Get-ScriptCoverage.ps1
|
#############################################################################\n##\n## Get-ScriptCoverage\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nUses conditional breakpoints to obtain information about what regions of\na script are executed when run.\n\n.EXAMPLE\n\nPS >Get-Content c:\\temp\\looper.ps1\n\nparam($userInput)\n\nfor($count = 0; $count -lt 10; $count++)\n{\n "Count is: $count"\n}\n\nif($userInput -eq "One")\n{\n "Got 'One'"\n}\n\nif($userInput -eq "Two")\n{\n "Got 'Two'"\n}\n\nPS >$action = { c:\\temp\\looper.ps1 -UserInput 'One' }\nPS >$coverage = Get-ScriptCoverage c:\\temp\\looper.ps1 -Action $action\nPS >$coverage | Select Content,StartLine,StartColumn | Format-Table -Auto\n\nContent StartLine StartColumn\n------- --------- -----------\nparam 1 1\n( 1 6\nuserInput 1 7\n) 1 17\nGot 'Two' 15 5\n} 16 1\n\nThis example exercises a 'looper.ps1' script, and supplies it with some\nuser input. The output demonstrates that we didn't exercise the\n"Got 'Two'" statement.\n\n#>\n\nparam(\n ## The path of the script to monitor\n $Path,\n\n ## The command to exercise the script\n [ScriptBlock] $Action = { & $path }\n)\n\nSet-StrictMode -Version Latest\n\n## Determine all of the tokens in the script\n$scriptContent = Get-Content $path\n$ignoreTokens = "Comment","NewLine"\n$tokens = [System.Management.Automation.PsParser]::Tokenize(\n $scriptContent, [ref] $null) |\n Where-Object { $ignoreTokens -notcontains $_.Type }\n$tokens = $tokens | Sort-Object StartLine,StartColumn\n\n## Create a variable to hold the tokens that PowerShell actually hits\n$visited = New-Object System.Collections.ArrayList\n\n## Go through all of the tokens\n$breakpoints = foreach($token in $tokens)\n{\n ## Create a new action. This action logs the token that we\n ## hit. We call GetNewClosure() so that the $token variable\n ## gets the _current_ value of the $token variable, as opposed\n ## to the value it has when the breakpoints gets hit.\n $breakAction = { $null = $visited.Add($token) }.GetNewClosure()\n\n ## Set a breakpoint on the line and column of the current token.\n ## We use the action from above, which simply logs that we've hit\n ## that token.\n Set-PsBreakpoint $path -Line `\n $token.StartLine -Column $token.StartColumn -Action $breakAction\n}\n\n## Invoke the action that exercises the script\n$null = . $action\n\n## Remove the temporary breakpoints we set\n$breakpoints | Remove-PsBreakpoint\n\n## Sort the tokens that we hit, and compare them with all of the tokens\n## in the script. Output the result of that comparison.\n$visited = $visited | Sort-Object -Unique StartLine,StartColumn\nCompare-Object $tokens $visited -Property StartLine,StartColumn -PassThru\n\n## Clean up our temporary variable\nRemove-Item variable:\\visited
|
combined_dataset/train/non-malicious/sample_62_73.ps1
|
sample_62_73.ps1
|
#
# Module manifest for module 'OCI.PSModules.Objectstorage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Objectstorage.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2d17e379-676f-4800-9582-5814d9a8df00'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Objectstorage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Objectstorage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Copy-OCIObjectstorageObject', 'Get-OCIObjectstorageBucket',
'Get-OCIObjectstorageBucketsList',
'Get-OCIObjectstorageMultipartUploadPartsList',
'Get-OCIObjectstorageMultipartUploadsList',
'Get-OCIObjectstorageNamespace',
'Get-OCIObjectstorageNamespaceMetadata',
'Get-OCIObjectstorageObject',
'Get-OCIObjectstorageObjectLifecyclePolicy',
'Get-OCIObjectstorageObjectsList',
'Get-OCIObjectstorageObjectVersionsList',
'Get-OCIObjectstoragePreauthenticatedRequest',
'Get-OCIObjectstoragePreauthenticatedRequestsList',
'Get-OCIObjectstorageReplicationPoliciesList',
'Get-OCIObjectstorageReplicationPolicy',
'Get-OCIObjectstorageReplicationSourcesList',
'Get-OCIObjectstorageRetentionRule',
'Get-OCIObjectstorageRetentionRulesList',
'Get-OCIObjectstorageWorkRequest',
'Get-OCIObjectstorageWorkRequestErrorsList',
'Get-OCIObjectstorageWorkRequestLogsList',
'Get-OCIObjectstorageWorkRequestsList',
'Invoke-OCIObjectstorageCommitMultipartUpload',
'Invoke-OCIObjectstorageHeadBucket',
'Invoke-OCIObjectstorageHeadObject',
'Invoke-OCIObjectstorageMakeBucketWritable',
'Invoke-OCIObjectstorageReencryptBucket',
'Invoke-OCIObjectstorageReencryptObject',
'New-OCIObjectstorageBucket', 'New-OCIObjectstorageMultipartUpload',
'New-OCIObjectstoragePreauthenticatedRequest',
'New-OCIObjectstorageReplicationPolicy',
'New-OCIObjectstorageRetentionRule',
'Remove-OCIObjectstorageBucket', 'Remove-OCIObjectstorageObject',
'Remove-OCIObjectstorageObjectLifecyclePolicy',
'Remove-OCIObjectstoragePreauthenticatedRequest',
'Remove-OCIObjectstorageReplicationPolicy',
'Remove-OCIObjectstorageRetentionRule',
'Rename-OCIObjectstorageObject', 'Restore-OCIObjectstorageObjects',
'Stop-OCIObjectstorageMultipartUpload',
'Stop-OCIObjectstorageWorkRequest', 'Update-OCIObjectstorageBucket',
'Update-OCIObjectstorageNamespaceMetadata',
'Update-OCIObjectstorageRetentionRule',
'Update-OCIObjectstorageTier', 'Write-OCIObjectstorageObject',
'Write-OCIObjectstorageObjectLifecyclePolicy',
'Write-OCIObjectstoragePart',
'Write-OCIObjectstorageuploadmanagerObject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Objectstorage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_64_60.ps1
|
sample_64_60.ps1
|
#
# Script module for module 'Az.Synapse' that is executed when 'Az.Synapse' is imported in a PowerShell session.
#
# Generated by: Microsoft Corporation
#
# Generated on: 07/04/2024 08:22:41
#
$PSDefaultParameterValues.Clear()
Set-StrictMode -Version Latest
function Test-DotNet
{
try
{
if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))
{
throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher."
}
}
catch [System.Management.Automation.DriveNotFoundException]
{
Write-Verbose ".NET Framework version check failed."
}
}
function Preload-Assembly {
param (
[string]
$AssemblyDirectory
)
if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore))
{
try
{
Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object {
try
{
Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null
}
catch {
Write-Verbose $_
}
}
}
catch {}
}
}
if ($true -and ($PSEdition -eq 'Desktop'))
{
if ($PSVersionTable.PSVersion -lt [Version]'5.1')
{
throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."
}
Test-DotNet
}
if ($true -and ($PSEdition -eq 'Core'))
{
if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')
{
throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."
}
}
if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
# [windows powershell] preload assemblies
# [windows powershell] preload module alc assemblies
$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies")
Preload-Assembly -AssemblyDirectory $preloadPath
if (Get-Module AzureRM.profile -ErrorAction Ignore)
{
Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
}
$module = Get-Module Az.Accounts
if ($module -ne $null -and $module.Version -lt [System.Version]"3.0.1")
{
Write-Error "This module requires Az.Accounts version 3.0.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop
}
elseif ($module -eq $null)
{
Import-Module Az.Accounts -MinimumVersion 3.0.1 -Scope Global
}
Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Synapse.dll)
if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
$FilteredCommands = @()
if ($Env:ACC_CLOUD -eq $null)
{
$FilteredCommands | ForEach-Object {
$existingDefault = $false
foreach ($key in $global:PSDefaultParameterValues.Keys)
{
if ($_ -like "$key")
{
$existingDefault = $true
}
}
if (!$existingDefault)
{
$global:PSDefaultParameterValues.Add($_,
{
if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)
{
$context = Get-AzureRmContext
}
else
{
$context = Get-AzContext
}
if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {
$context.ExtendedProperties["Default Resource Group"]
}
})
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDTKJ9yizkWtYdz
# Y/uSpIOvraCL+PRPCv7q4/yEbMFIsKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOX+BL1kJTBWQzT/1K+bcVZK
# or8XJ3xTZGO8PmiAL5LwMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAiqqE5vyQfl7l48CrOk8b+DaQ/TL5K83rINuJcJAsdKAkmadWtBImlr27
# dOHtXP8eEIJ6xG9Orc+jZtXAUyBnDZDQ8Q6oUgThOzoL/jYgr3Pyu+QnwMKTSB4/
# 04ZeQhiyNFm9xl3byvIYUYXqjbNVl/2ENeW+uoIX0p7cRINCi63nxpuSOU9hKGw8
# wgcMXbr5sfeobA7pMVa2E4Lkl4Av6BtxraTDak+ZCOYwMgzRjCHtK1gqLeZkRJrH
# 0kRxfHchn8S+Zz/5hoT6m75zaBYT1UnBsIYu7Kzh0LdCkJ2hXhkFjv+3hHasWYQF
# FJrosQ3GCdsd4yfTZobDOvR9bnQOX6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBEbcfeE3Duqm2hS62nRLi2xIeRJuwemYLA5ebLIR79WgIGZkZZtmsX
# GBMyMDI0MDcwNDA4MzA1MS4wNThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie
# YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt
# 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG
# 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F
# zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh
# ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK
# FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/
# zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX
# lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM
# k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH
# xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF
# tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI
# rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO
# 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy
# 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK
# CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV
# wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj
# 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb
# vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE
# yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe
# gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o
# uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy
# TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi
# WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jDFJTAiGA8yMDI0MDcwNDA2NTIy
# MVoYDzIwMjQwNzA1MDY1MjIxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqMMUl
# AgEAMAoCAQACAg1cAgH/MAcCAQACAhPiMAoCBQDqMhalAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAC5Ve1oSfx8Z4vKreZbHipUE5poD6bpnhhqnSKONo2Pn
# d3rQgjeAjdcW5fKncDcAQcZGtgnFxsuxwgnTOOfi/zKuGEFNCOBewpK143Br814Z
# q50inoPXx1h1gPD6CsBj0bJHlDALT6U6thNqFV9kvh/V9RhjifAAPGa0J7Ngmx/m
# NA+0AggukmkGXI2ECPpX/REZRBmRLHb0HSWpOdPwx5dlPtSqSR3ipwajNKQq2KIy
# 3iz8gzWWO/CgfT2bDE1QFahNgs1z7EYhDxED95U7MiFI3vziEx4kYEZoHjIo2+5Z
# eWv4D9qYaKRvHz7F/wetKUvjkLfjjLitZImAsyEsY8oxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB
# 5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAxgSIgPIDRf7uFcR++U6jEk6NdwXZueHSiAE75WKPL
# fzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16h
# IYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgnq4lEKAgpQN8pTwifwyx3wsM
# j8TkkxeAKva7NDAX1/YwDQYJKoZIhvcNAQELBQAEggIAFnhq2fqqkVl7rTKw8gB4
# u2vMPgGFt6m18uK4eAXrpAsqj7OYUAzg17L849z72iqHqqk5ie1xlqTjLhNmbi50
# tZljkl6ITS26Sy/jLHsh7LN3PDGMfkNecaubFu5tJ2ylqXO8ZncnIl8B+my5KZxL
# 3VgKRegiTsnZFW0Hvu0I/2au5Q/lzKRhZtgdjReF0P9KmOt42lwos93XwM5P6pIX
# 99blJBNCBFU0IPi0N57LzE+c3g9ffoWtzyofAO63Gc5pPaLVa8AwTrE3NUebFRir
# 0IOFpBHPyVi+C1LzdHh0ommvHnnUYJyLJGZl9SEECNjU7VYL4c6xyigU7KwiCKxj
# 1W3TPs3VGZ3NnhYY4xdkkM3a5G275gkN6T8wKxzD8CDK2OOWpPO3ACbotRk8nT38
# roKD3vbm6RoYRYxJJWPlF3IlklT3USRYsWtyqL6Ub3coAoOWB6YjRe+mQcIytSOU
# jBSnu/DNgrJyHjyjNbiNNaYxnqNC+/t/oWaL9hiYR4SUmjirX+b5iN72oBPIYJ65
# lAv1wT0b8YdmFJahuZSH6idygjVkbfkQPwzRlqfsMpq2wnyCRmJPKnV4Fv/T53eR
# mt5oZ5OmhnAL/gaFui2/hqETTwVC/O4eZkVbpFOwwsiqO7eV8W+mS45hcXazs3y/
# PJAwW75EQQZ5cfCp2zkkXVM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_20_97.ps1
|
sample_20_97.ps1
|
ConvertFrom-StringData @'
progressbar_id_crm_fileversion_outdated=Checking For Outdated Microsoft CRM File Versions
progressbar_id_crm_fileversion_outdateddesc=Checking Microsoft CRM File Version Information To Ensure Recent Updates Are Installed
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVvdUlBIAeVM+g
# pSGdCfjmUbVrxZwLXt5Gk3VA3XjsDqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGVTbP9KoBmD4EXq0k5rzAZa
# +kIog+XVjS8NQcQIMW3yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAXavuMDBVxeYa6LIU/GOfpQdr4hZAsaUXJn9bkdtUPMWpy5SGHp6vtm1c
# cWBBEYjwCgFhxJ0ybnCCNCMl5UqlWMYs0eTFTWorplVOIRhHAfOl/Z/5/6sC4OUc
# kzfPNhV7hrnTybE+9bAj5Q64ScJ4YROQQOlfhQJP5f0sxWgJ03YoBz+qjnmIezTX
# RusySGNkQzKthmZ1jeKQ4dmyHUqdZsk6rwp6CDcyzgyPgRT0zSqEpRx92FfacIS8
# 35YlpK/IEHPuoLHxFCqYlsEKGTJb1LmBEzbu4avP2ZpGdZOe7t35Ymu2WZ2rX0EN
# YrdckW1b/BnsSCTU30Yjm+eKF+RYEaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAFghHOX1DX01pXlepM1S8tpggUg5NH83isrQ4t6jq6ugIGZxp1kNw4
# GBMyMDI0MTAyODExNDA0Mi41NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBnvretFUK4+VNp/fXzqpkJjgpsANQc1b3UadS2wotjWjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAC2PW4Z1ZEITYREF6klKsp9yU
# mGeXSFWC0uZWVwdwbzISP7wHtuQHXugm6M7tX/bDjRRy11fU/GYq5dtlKutR/jMX
# pW4K9b82jG+wMsm7PlIEdRYHrOH347spU8Vd2VPlTyWjS2Pd3Fnon9muvahQPb9/
# CNHnBIUylXU+6IdGut507A1xc81ZUcqwvjbl/bsOh4tB+vcpVwAYNN4HTVG7fZPj
# 9oFa3nKjr68ylkUdCDtMCsBZ8nDxS7M7oSz7rnVdC50itWuWEGouPIrBPXCuvUXH
# ZYqTEyWg/sgMhLD/sF1lV+26qX4lVoAF5/rGTq3dHHL5NQdrmxpgsSkrgI9E6/JJ
# EXt1yyoBMcW7yGnogYj/sCtAq9/eMHHHl9zuFhDj4j4QwXIH8Vn6UfPtlhFS+9JB
# LmnxEpZCbwWDkPiuWNAYGiF2sj6xtvH+hqOjJhfRIqwJK7oojb1hYh6KBzkJyX0L
# 0fVU9GQWlxo6czDjNVzELeKW5pEfs8BGwLTGLSkPzGn6Lt4zE50sUGyymvTOrboL
# cIrURN0IvBnwpL8u+T8Qmc+MZvaWDTngGHcBW8g5bsklxGsfblM18ce4kok5FGnb
# 2xyZ3I8/wHXiPXpM8eoF4k03PKjjkmFne1O3jdgvHFURjgke5DNTbULffO4w7WGb
# mNRnp8iGR9jpgEXeN1Q=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_11_97.ps1
|
sample_11_97.ps1
|
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_
continue
}
If (!$Is_SiteServer) {
TraceOut "ConfigMgr Site Server not detected. This script gathers data only from a Site Server. Exiting."
exit 0
}
TraceOut "Started"
Import-LocalizedData -BindingVariable ScriptStrings
$sectiondescription = "Configuration Manager Server Information"
# ----------------
# Write Progress
# ----------------
Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_ServerInfo
TraceOut " Getting Server Information"
# ----------------------
# Current Time:
# ----------------------
AddTo-CMServerSummary -Name "Current Time" -Value $CurrentTime
# -------------
# Computer Name
# -------------
AddTo-CMServerSummary -Name "Server Name" -Value $ComputerName
# ----------
# Site Code
# ----------
$Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Site Code"
AddTo-CMServerSummary -Name "Site Code" -Value $Temp
# ----------
# Site Code
# ----------
$Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Parent Site Code"
AddTo-CMServerSummary -Name "Parent Site Code" -Value $Temp
# ----------
# Site Type
# ----------
# $SiteType = Get-RegValueWithError ($Reg_SMS + "\Setup") "Type"
If ($SiteType -eq 8) {
AddTo-CMServerSummary -Name "Site Type" -Value "Central Administration Site" }
ElseIf ($SiteType -eq 1) {
AddTo-CMServerSummary -Name "Site Type" -Value "Primary Site" }
ElseIf ($SiteType -eq 2) {
AddTo-CMServerSummary -Name "Site Type" -Value "Secondary Site" }
else {
AddTo-CMServerSummary -Name "Site Type" -Value $SiteType
}
# -------------
# Site Version
# -------------
$Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "Full Version"
AddTo-CMServerSummary -Name "Site Version" -Value $Temp
# ----------------
# Monthly Version
# ----------------
if ($global:SiteType -eq 2) {
AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available on a Secondary Site"
}
else {
$Temp = Get-CimInstance -Computer $SMSProviderServer -Namespace $SMSProviderNamespace -Class SMS_Identification -ErrorAction SilentlyContinue
If ($Temp -is [CimInstance]) {
AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value $Temp.MonthlyReleaseVersion }
else {
AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available" }
}
# -------------
# CU Level
# -------------
$Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "CULevel"
AddTo-CMServerSummary -Name "CU Level" -Value $Temp
# -------------
# ADK Version
# -------------
$global:ADKVersion = Get-ADKVersion
AddTo-CMServerSummary -Name "ADK Version" -Value $global:ADKVersion
# ----------------------------------------------------------
# Installation Directory - defined in utils_ConfigMgr12.ps1
# ----------------------------------------------------------
If ($null -ne $SMSInstallDir) {
AddTo-CMServerSummary -Name "Installation Directory" -Value $SMSInstallDir }
else {
AddTo-CMServerSummary -Name "Installation Directory" -Value "Error obtaining value from Registry" }
# -----------------
# Provider Location
# -----------------
if ($global:SiteType -eq 2) {
AddTo-CMServerSummary -Name "Provider Location" -Value "Not available on a Secondary Site"
}
else {
If ($null -ne $global:SMSProviderServer) {
AddTo-CMServerSummary -Name "Provider Location" -Value $SMSProviderServer }
else {
AddTo-CMServerSummary -Name "Provider Location" -Value "Error obtaining value from Registry" }
}
# -----------
# SQL Server
# -----------
$Temp = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Server"
AddTo-CMDatabaseSummary -Name "SQL Server" -Value $Temp -NoToSummaryQueries
# --------------
# Database Name
# --------------
$Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Database Name"
AddTo-CMDatabaseSummary -Name "Database Name" -Value $Temp -NoToSummaryQueries
# ----------------
# SQL Ports
# ----------------
$Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Port"
AddTo-CMDatabaseSummary -Name "SQL Port" -Value $Temp -NoToSummaryQueries
$Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "SSBPort"
AddTo-CMDatabaseSummary -Name "SSB Port" -Value $Temp -NoToSummaryQueries
# -----------------------
# SMSExec Service Status
# -----------------------
$Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_Executive'} | Select-Object Status
If ($null -ne $Temp) {
if ($Temp.Status -eq 'Running') {
$Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SMSExec'} | Select-Object StartTime
AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "Running. StartTime = $($Temp2.StartTime)"
}
else {
AddTo-CMServerSummary -Name "SMS_Executive Status" -Value $Temp.Status
}
}
Else {
AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "ERROR: Service Not found"
}
# -----------------------
# SiteComp Service Status
# -----------------------
$Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_SITE_COMPONENT_MANAGER'} | Select-Object Status
If ($null -ne $Temp) {
if ($Temp.Status -eq 'Running') {
$Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SiteComp'} | Select-Object StartTime
AddTo-CMServerSummary -Name "SiteComp Status" -Value "Running. StartTime = $($Temp2.StartTime)"
}
else {
AddTo-CMServerSummary -Name "SiteComp Status" -Value $Temp.Status
}
}
Else {
AddTo-CMServerSummary -Name "SiteComp Status" -Value "ERROR: Service Not found"
}
# ----------------------
# SMSExec Thread States
# ----------------------
$TempFileName = $ComputerName + "_CMServer_SMSExecThreads.TXT"
$OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName)
Get-ItemProperty HKLM:\Software\Microsoft\SMS\Components\SMS_Executive\Threads\* -ErrorAction SilentlyContinue -ErrorVariable DirError `
| Select-Object PSChildName, 'Current State', 'Startup Type', 'Requested Operation', DLL `
| Sort-Object @{Expression='Current State';Descending=$true}, @{Expression='PSChildName';Ascending=$true} `
| Format-Table -AutoSize | Out-String -Width 200 | Out-File -FilePath $OutputFile
If ($DirError.Count -eq 0) {
CollectFiles -filesToCollect $OutputFile -fileDescription "SMSExec Thread States" -sectionDescription $sectiondescription -noFileExtensionsOnDescription
AddTo-CMServerSummary -Name "SMSExec Thread States" -Value "Review $TempFileName" -NoToSummaryReport
Remove-Item $OutputFile -Force
}
else {
AddTo-CMServerSummary -Name "SMSExec Thread States" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport
$DirError.Clear()
}
# -----------------
# SQL Server SPN's
# -----------------
#TraceOut " Getting SQL SPNs"
#$TempFileName = ($ComputerName + "_CMServer_SQLSPN.TXT")
#$FileToCollect = join-path $pwd.Path $TempFileName
#$CmdToRun = ".\psexec.exe /accepteula -s $pwd\ldifde2K3x86.exe -f $FileToCollect -l serviceprincipalname -r `"(serviceprincipalname=MSSQLSvc/$ConfigMgrDBServer*)`" -p subtree"
#RunCmD -commandToRun $CmdToRun -collectFiles $false
#If (Test-Path $FileToCollect) {
# If ((Get-Content $FileToCollect) -ne $null) {
# If ((Get-Content $FileToCollect) -ne "") {
# CollectFiles -filesToCollect $FileToCollect -fileDescription "SQL SPNs" -sectionDescription $sectiondescription -noFileExtensionsOnDescription
# AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Review $TempFileName") -NoToSummaryReport
# }
# Else {
# TraceOut " No SPN's found. Output file was null."
# # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport
# }
# }
# Else {
# TraceOut " No SPN's found. Output file was empty."
# # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport
# }
#}
#Else {
# TraceOut " No SPN's found. Output file was not found."
# AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. SPN Query Failed!") -NoToSummaryReport
#}
# ----------------
# Write Progress
# ----------------
Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_Hierarchy
TraceOut " Getting Site Hierarchy"
# ------------------
# Hierarchy Details
# ------------------
$TempFileName = $ComputerName + "_CMServer_Hierarchy.txt"
$OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName)
Run-DiagExpression .\GetCM12Hierarchy.ps1
IF (Test-Path $OutputFile) {
CollectFiles -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -sectionDescription $sectiondescription -noFileExtensionsOnDescription
AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport
Remove-Item $OutputFile -Force
}
<#
$CommandLineToExecute = $Env:windir + "\system32\cscript.exe GetCM12Hierarchy.VBS"
If (($RemoteStatus -eq 0) -or ($RemoteStatus -eq 1)) {
# Local Execution
If ($null -eq $global:DatabaseConnectionError) {
RunCmD -commandToRun $CommandLineToExecute -sectionDescription $sectiondescription -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -noFileExtensionsOnDescription
AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport
Remove-Item $OutputFile -Force
}
Else {
AddTo-CMServerSummary -Name "Hierarchy Details" -Value $DatabaseConnectionError -NoToSummaryReport
}
}
#>
# ----------------
# Write Progress
# ----------------
Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_FileVer
TraceOut " Getting File Versions"
# ---------------------
# Binary Versions List
# ---------------------
$TempFileName = ($ComputerName + "_CMServer_FileVersions.TXT")
$OutputFile = join-path $pwd.path $TempFileName
Get-ChildItem ($SMSInstallDir + "\bin") -recurse -include *.dll,*.exe -ErrorVariable DirError -ErrorAction SilentlyContinue | `
ForEach-Object {[System.Diagnostics.FileVersionInfo]::GetVersionInfo($_)} | `
Select-Object FileName, FileVersion, ProductVersion | Format-Table -AutoSize | `
Out-File $OutputFile -Width 1000
If ($DirError.Count -eq 0) {
CollectFiles -filesToCollect $OutputFile -fileDescription "Server File Versions" -sectionDescription $sectiondescription -noFileExtensionsOnDescription
AddTo-CMServerSummary -Name "File Versions" -Value ("Review $TempFileName") -NoToSummaryReport
}
else {
AddTo-CMServerSummary -Name "File Versions" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport
$DirError.Clear()
}
# --------------------
# RCM Inbox File List
# --------------------
TraceOut " Getting File List for RCM.box"
$TempFileName = ($ComputerName + "_CMServer_RCMFileList.TXT")
$OutputFile = join-path $pwd.path $TempFileName
Get-ChildItem ($SMSInstallDir + "\inboxes\RCM.box") -Recurse -ErrorVariable DirError -ErrorAction SilentlyContinue | `
Select-Object CreationTime, LastAccessTime, FullName, Length, Mode | Sort-Object FullName | Format-Table -AutoSize | `
Out-File $OutputFile -Width 1000
If ($DirError.Count -eq 0) {
AddTo-CMServerSummary -Name "RCM.box File List" -Value ("Review $TempFileName") -NoToSummaryReport
CollectFiles -filesToCollect $OutputFile -fileDescription "RCM.box File List" -sectionDescription $sectiondescription -noFileExtensionsOnDescription
}
else {
AddTo-CMServerSummary -Name "RCM.box File List" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport
$DirError.Clear()
}
# Server Info File is collected in DC_CM12SQLInfo.ps1. Need to make sure this script runs before that.
# $ServerInfo | Out-File $ServerInfoFile -Append -Width 200
TraceOut "Completed"
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuLz0GycFAQ7KQ
# LfpRFMTYdSduKXDIMT/Km56vXh0X9aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINN2r62K9efzFqmqClW8HZZ4
# EiEUDo7jgH7RuqUeykhVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhK/DNPiVO2UFTKiwcxbcIaNPfjV6zEjpxLIs0NbXrXur6PlOA01qDI7N
# C53HjHNe1LRC5rp0h6nwwxxv1JASDx6MQWUc5+4HJInFnZlWXlj6Q6sZ+dFQUiws
# Az5dCbS8azp4jsc6/W1nUlhFor6tow/LsW+W/2S5dGiZhNyvWBEa8ZEFEGwCu+O3
# 2ebtocTDIFJ8sqdaCVXcbPJzBNOUdw+3pep5emg9Bjgiq5Ku2TySWZnAx1UrjhVx
# clpXpH1tDFPYQvx9PlLJCUBZND1I462hFFH2neHCeigv8bCViYr/WPW8WgPDwFMq
# 2kIm/ECBkzjKsSg/ecJzGRfpY4W9BaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD5h7js0uX/xprpcS1w4HLYZ8UCVHRfmVcWnGLRPPtKEQIGZxqBxlgG
# GBMyMDI0MTAyODExNDA0Mi4yMzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw
# M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H
# AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA
# trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX
# ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2
# JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s
# 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr
# LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAgUsdylc26QNxX0nGAl0D4j13aeEtJzbM6kMScqnCPUzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ
# T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX
# s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIA4DBQhKoqmyTt0q/nerXxhkXt
# 2aB6hZqAOVAz+2fTWmYfhlAtT/6KQ9smOpMdAMXhMOcM3I/y7O3lPvWWxrvXmOsa
# HwH7T+WWTwJdQEzKTbjvK+bpDskMTofTdOcRr61uoTjQ6RlrlouVci0b0Bi8f7Ts
# XqiKOhMUtS/pKPp1VHLaMJ2xX1M7X8+9ZjTHT4E0K8xTPRAYj31JKKXLnBpQj27U
# M/C4GsqIyPAYEWexovwoAFsFi6fnl4VMv5HzLg/Vybke74x8qvabVIUbOif8O2PR
# YzOOXd18zXQ4GX1kYG1H2EkRakbgW5KZ46yU18Gq2+Q3qtRkl1FH8xwnYlG5ddsk
# GGxOVI7BZZJFTzHcNNNWMFjDMhu7R/zDh3mGLvmDOLAQ/1+HPcU6lFsOboCycjtR
# y8lYg2G6P4dbeMOOhA8Ys3PiH0u6SgLQ+KxbURV9hhD3eMDDYETxg0QDBpHJjERD
# C2LJ5iYQbRbTqLPqgBXP6eU282EW65pBmSdXnCQdFa1w0y77Mz0ztbdeXWgsyw6P
# 0DMyuWIM6IE8LfM/IWWHBGs0Vt6U5NJ44nhJlunuG33QY1YIEhh/kCr6ogEginrw
# /TE7HneFNN0sNVyaPmeGdDuYjgR7k208Ynpu1avmC8bjsx37mkYfgamJw4AsTuhz
# cWbwZmbcUXCJlcdxZf4=
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-Shortcut.ps1
|
New-Shortcut.ps1
|
#requires -version 2.0
function New-Shortcut {
<#
.SYNOPSIS
Creates a new shortcut (.lnk file) pointing at the specified file.
.DESCRIPTION
The New-Shortcut script creates a shortcut pointing at the target in the location you specify. You may specify the location as a folder path (which must exist), with a name for the new file (ending in .lnk), or you may specify one of the "SpecialFolder" names like "QuickLaunch" or "CommonDesktop" followed by the name.
If you specify the path for the link file without a .lnk extension, the path is assumed to be a folder.
.EXAMPLE
New-Shortcut C:\\Windows\\Notepad.exe
Will make a shortcut to notepad in the current folder named "Notepad.lnk"
.EXAMPLE
New-Shortcut C:\\Windows\\Notepad.exe QuickLaunch\\Editor.lnk -Description "Run Notepad"
Will make a shortcut to notepad on the QuickLaunch bar with the name "Editor.lnk" and the tooltip "Run Notepad"
.EXAMPLE
New-Shortcut C:\\Windows\\Notepad.exe F:\\User\\
Will make a shortcut to notepad in the F:\\User\\ folder with the name "Notepad.lnk"
.NOTE
Partial dependency on Get-SpecialPath ( http://poshcode.org/858 )
#>
[CmdletBinding()]
param(
[Param(Position=0,Mandatory=$true)]
[string]$TargetPath,
## Put the shortcut where you want: "Special Folder" names allowed!
[Param(Position=1,Mandatory=$true)]
[string]$LinkPath,
## Extra parameters for the shortcut
[string]$Arguments="",
[string]$WorkingDirectory="",
[string]$WindowStyle="Normal",
[string]$IconLocation="",
[string]$Hotkey="",
[string]$Description="",
[string]$Folder=""
)
# Values for Window Style:
# 1 - Normal -- Activates and displays a window. If the window is minimized or maximized, the system restores it to its original size and position.
# 3 - Maximized -- Activates the window and displays it as a maximized window.
# 7 - Minimized -- Minimizes the window and activates the next top-level window.
if(!(Test-Path $TargetPath) -and !($TargetPath.Contains("://"))) {
Write-Error "TargetPath must be an existing file for the link to point at (or a URL)"
return
}
function New-ShortCutFile {
param(
[string]$TargetPath=$(throw "Please specify a TargetPath for link to point to"),
[string]$LinkPath=$(throw "must pass a path for the shortcut file"),
[string]$Arguments="",
[string]$WorkingDirectory=$(Split-Path $TargetPath -parent),
[string]$WindowStyle="Normal",
[string]$IconLocation="",
[string]$Hotkey="",
[string]$Description=$(Split-Path $TargetPath -Leaf)
)
if(-not ($TargetPath.Contains("://") -or (Test-Path (Split-Path (Resolve-Path $TargetPath) -parent)))) {
Throw "Cannot create Shortcut: Parent folder does not exist"
}
if(-not (Test-Path variable:\\global:WshShell)) {
$global:WshShell = New-Object -com "WScript.Shell"
}
$Link = $global:WshShell.CreateShortcut($LinkPath)
$Link.TargetPath = $TargetPath
[IO.FileInfo]$LinkInfo = $LinkPath
## Properties for file shortcuts only
## If the $LinkPath ends in .url you can't set the arguments, icon, etc
## if you make the same shortcut with a .lnk extension
## you can still point it at a URL, but you can set hotkeys, icons, etc
if( $LinkInfo.Extension -ne ".url" ) {
$Link.WorkingDirectory = $WorkingDirectory
## Validate $WindowStyle
if($WindowStyle -is [string]) {
if( $WindowStyle -like "Normal" ) { $WindowStyle = 1 }
if( $WindowStyle -like "Maximized" ) { $WindowStyle = 3 }
if( $WindowStyle -like "Minimized" ) { $WindowStyle = 7 }
}
if( $WindowStyle -ne 1 -and $WindowStyle -ne 3 -and $WindowStyle -ne 7) { $WindowStyle = 1 }
$Link.WindowStyle = $WindowStyle
if($Hotkey.Length -gt 0 ) { $Link.HotKey = $Hotkey }
if($Arguments.Length -gt 0 ) { $Link.Arguments = $Arguments }
if($Description.Length -gt 0 ) { $Link.Description = $Description }
if($IconLocation.Length -gt 0 ) { $Link.IconLocation = $IconLocation }
}
$Link.Save()
Write-Output (get-item $LinkPath)
}
## If they didn't explicitly specify a folder
if($Folder.Length -eq 0) {
if($LinkPath.Length -gt 0) {
$path = Split-Path $LinkPath -parent
[IO.FileInfo]$LinkInfo = $LinkPath
if( $LinkInfo.Extension.Length -eq 0 ) {
$Folder = $LinkPath
} else {
# If the LinkPath is just a single word with no \\ or extension...
if($path.Length -eq 0) {
$Folder = $Pwd
} else {
$Folder = $path
}
}
}
else
{ $Folder = $Pwd }
}
## If they specified a link path, check it for an extension
if($LinkPath.Length -gt 0) {
$LinkPath = Split-Path $LinkPath -leaf
[IO.FileInfo]$LinkInfo = $LinkPath
if( $LinkInfo.Extension.Length -eq 0 ) {
# If there's no extension, it must be a folder
$Folder = $LinkPath
$LinkPath = ""
}
}
## If there's no Link name, make one up based on the target
if($LinkPath.Length -eq 0) {
if($TargetPath.Contains("://")) {
$LinkPath = "$($TargetPath.split('/')[2]).url"
} else {
[IO.FileInfo]$LinkInfo = $TargetPath
$LinkPath = "$(([IO.FileInfo]$TargetPath).BaseName).lnk"
}
}
## If the folder doesn't actually exist, maybe it's special...
if( -not (Test-Path $Folder)) {
$morepath = "";
if( $Folder.Contains("\\") ) {
$morepath = $Folder.SubString($Folder.IndexOf("\\"))
$Folder = $Folder.SubString(0,$Folder.IndexOf("\\"))
}
$Folder = Join-Path (Get-SpecialPath $Folder) $morepath
# or maybe they just screwed up
trap { throw new-object ArgumentException "Cannot create shortcut: parent folder does not exist" }
}
$LinkPath = (Join-Path $Folder $LinkPath)
New-ShortCutFile $TargetPath $LinkPath $Arguments $WorkingDirectory $WindowStyle $IconLocation $Hotkey $Description
}
|
combined_dataset/train/non-malicious/sample_44_7.ps1
|
sample_44_7.ps1
|
#
# Module manifest for module 'OCI.PSModules.Desktops'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Desktops.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '53ccf4c9-4a50-4acb-9112-909d93a939bd'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Desktops Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Desktops.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDesktopsDesktop', 'Get-OCIDesktopsDesktopPool',
'Get-OCIDesktopsDesktopPoolDesktopsList',
'Get-OCIDesktopsDesktopPoolsList',
'Get-OCIDesktopsDesktopPoolVolumesList', 'Get-OCIDesktopsList',
'Get-OCIDesktopsWorkRequest',
'Get-OCIDesktopsWorkRequestErrorsList',
'Get-OCIDesktopsWorkRequestLogsList',
'Get-OCIDesktopsWorkRequestsList',
'Move-OCIDesktopsDesktopPoolCompartment',
'New-OCIDesktopsDesktopPool', 'Remove-OCIDesktopsDesktop',
'Remove-OCIDesktopsDesktopPool', 'Start-OCIDesktopsDesktop',
'Start-OCIDesktopsDesktopPool', 'Stop-OCIDesktopsDesktop',
'Stop-OCIDesktopsDesktopPool', 'Stop-OCIDesktopsWorkRequest',
'Update-OCIDesktopsDesktop', 'Update-OCIDesktopsDesktopPool'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Desktops'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/695c148f-1099-41a1-abaf-8e0b163f9eff.ps1
|
695c148f-1099-41a1-abaf-8e0b163f9eff.ps1
|
#===================================================================================
#
# Filename: AddExecuteInPowerShellToPS1Files.ps1
#
# Author: Nigel Boulton
#
# Version: 1.00
#
# Date: 9 Nov 2008
#
# Mod dates:
#
# Purpose: To add context menu items for .ps1 files in Windows Explorer, to
# allow PowerShell scripts to be executed by right-clicking them
#
# Action: Gets the path to PowerShell.exe by reading the Path property of
# the process. If PowerShell is not running (e.g. if using a GUI/IDE),
# prompts the user to enter the path. Quotes the path if it contains
# any spaces
# Gets the class key for .ps1 files from the registry and adds the
# appropriate subkeys and values to it to add "Execute in PowerShell"
# and "Execute in PowerShell (-NoExit)" context menu items
#
# Notes: USE AT YOUR OWN RISK! Backup your system first and all that...
# Must be run as an administrator
#
#===================================================================================
# Get the full path to PowerShell.exe, or prompt if using a GUI
$PoSH = Get-Process | Where-Object {$_.Name -eq "PowerShell"} | Select-Object -First 1
If ($PoSH -eq $null) {
$PoSHPath = Read-Host "Please enter the full path to PowerShell.exe, or cancel and run this script in a PowerShell console session"
If ($PoSHPath -eq $Null) {exit 1}
}
Else
{
$PoSHPath = $PoSH.Path
}
# Quote PowerShell path if it isn't already
If ($PoSHPath.Substring(0,1) -ne "`"") {$PoSHPath = "`"" + $PoSHPath}
If ($PoSHPath.Substring($PoSHPath.Length - 1,1) -ne "`"") {$PoSHPath += "`""}
# Get class for .ps1 files
$PS1Class = (Get-ItemProperty -Path HKLM:SOFTWARE\\Classes\\.ps1)."(Default)"
# Build hash table of registry data to add
# $_.Name is the registry key and $_.Value is the data for the "(Default)" value in that key
$RegData = @{"HKLM:Software\\Classes\\$PS1Class\\shell\\Execute in PowerShell\\command" = $PoSHPath + " &'%1'";`
"HKLM:Software\\Classes\\$PS1Class\\shell\\Execute in PowerShell (-NoExit)\\command" = $PoSHPath + " -NoExit &'%1'"}
# Check for an existing "Open" action. If there isn't one we need to add one in to ensure that "Open"
# remains the default. If we didn't do this, in future double-clicking .ps1 files would execute them!
If ((Test-Path "HKLM:Software\\Classes\\$PS1Class\\shell\\open\\command") -eq $False) {$RegData.Add("HKLM:Software\\Classes\\$PS1Class\\shell\\open\\command", "notepad.exe `"%1`"")}
# Iterate hash table to create registry keys and set values
$RegData.GetEnumerator() | ForEach-Object {
# Create registry path
If ((Test-Path $_.Name) -eq $False) {New-Item -Path $_.Name -Force | Out-Null}
# Set "(Default)" value
Set-ItemProperty -Path $_.Name -Name "(Default)" -Value $_.Value
}
Write-Output "Processing complete"
|
combined_dataset/train/non-malicious/sample_8_85.ps1
|
sample_8_85.ps1
|
ConvertFrom-StringData @'
id_dpm_dpmdb_activity=Gathering DPMDB
id_dpm_dpmdb_status=Running DC_CollectDPMDB.ps1
id_dpm_notinstalled=CollectDPMLogs did not run due to missing registry key pointing to the DPM installation folder
'@
# SIG # Begin signature block
# MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzVChWXvYq/YCE
# 7ttASw4nXhQfwV3vqKmm5YNbZ7tiNKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP8w
# OnTLag/BGuv9cnJ5r5IAzAyJ1frAJ9XPD4krft0WMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEABQA1FsVcCftyuP9+YGhXijILAyQhbMCESuwK
# ifwnAoKIFRzEVCXmUjN8cZgeNrs5GYDGFTgWOa3jCw1I8bqvmC8SlsDrrdZd0y8h
# OXU52lPr3pdYFOdLU3JpvQZB78146bMJqjaGiSCfhgThB2xUUtao7twjtNzmTyw9
# MclcJsekw741bcZgqIg20DKRdiqALTdXX6xpihdFAs1MoVcjjfv6n/AIkQ5W6SV+
# ijo0GZpd07Hw+rREuHkBqtz6ymcs3xGR1R6nvM+W+VDwe4xOJkIW4PKjKGMdsvXX
# fQT3/1Rw5Cpr/84REnRkxkNT4/bYiRFWqfn6HXFp785gdFk6PaGCF5MwghePBgor
# BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCByennzBdLTNOBa2vNe2DIDvVnaDLkGchNz
# BHTsZQfFOQIGZxp6XqTkGBIyMDI0MTAyODExNDA0My43NVowBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB6+AYbLW27zjtAAEA
# AAHrMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDUzNFoXDTI1MDMwNTE4NDUzNFowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMEVaCHaVuBXd4mnTWiqJoUG
# 5hs1zuFIqaS28nXk2sH8MFuhSjDxY85M/FufuByYg4abAmR35PIXHso6fOvGegHe
# G6+/3V9m5S6AiwpOcC+DYFT+d83tnOf0qTWam4nbtLrFQMfih0WJfnUgJwqXoQbh
# zEqBwMCKeKFPzGuglZUBMvunxtt+fCxzWmKFmZy8i5gadvVNj22el0KFav0QBG4K
# jdOJEaMzYunimJPaUPmGd3dVoZN6k2rJqSmQIZXT5wrxW78eQhl2/L7PkQveiNN0
# Usvm8n0gCiBZ/dcC7d3tKkVpqh6LHR7WrnkAP3hnAM/6LOotp2wFHe3OOrZF+sI0
# v5OaL+NqVG2j8npuHh8+EcROcMLvxPXJ9dRB0a2Yn+60j8A3GLsdXyAA/OJ31NiM
# w9tiobzLnHP6Aj9IXKP5oq0cdaYrMRc+21fMBx7EnUQfvBu6JWTewSs8r0wuDVdv
# qEzkchYDSMQBmEoTJ3mEfZcyJvNqRunazYQlBZqxBzgMxoXUSxDULOAKUNghgbqt
# SG518juTwv0ooIS59FsrmV1Fg0Cp12v/JIl+5m/c9Lf6+0PpfqrUfhQ6aMMp2Ohb
# eqzslExmYf1+QWQzNvphLOvp5fUuhibc+s7Ul5rjdJjOUHdPPzg6+5VJXs1yJ1W0
# 2qJl5ZalWN9q9H4mP8k5AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUdJ4FrNZVzG7i
# pP07mNPYH6oB6uEwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAIN03y+g93wL5VZk
# /f5bztz9Bt1tYrSw631niQQ5aeDsqaH5YPYuc8lMkogRrGeI5y33AyAnzJDLBHxY
# eAM69vCp2qwtRozg2t6u0joUj2uGOF5orE02cFnMdksPCWQv28IQN71FzR0ZJV3k
# GDcJaSdXe69Vq7XgXnkRJNYgE1pBL0KmjY6nPdxGABhV9osUZsCs1xG9Ja9JRt4j
# YgOpHELjEFtGI1D7WodcMI+fSEaxd8v7KcNmdwJ+zM2uWBlPbheCG9PNgwdxeKgt
# Vij/YeTKjDp0ju5QslsrEtfzAeGyLCuJcgMKeMtWwbQTltHzZCByx4SHFtTZ3VFU
# dxC2RQTtb3PFmpnr+M+ZqiNmBdA7fdePE4dhhVr8Fdwi67xIzM+OMABu6PBNrClr
# MsG/33stEHRk5s1yQljJBCkRNJ+U3fqNb7PtH+cbImpFnce1nWVdbV/rMQIB4/71
# 3LqeZwKtVw6ptAdftmvxY9yCEckAAOWbkTE+HnGLW01GT6LoXZr1KlN5Cdlc/nTD
# 4mhPEhJCru8GKPaeK0CxItpV4yqg+L41eVNQ1nY121sWvoiKv1kr259rPcXF+8Nm
# jfrm8s6jOZA579n6m7i9jnM+a02JUhxCcXLslk6JlUMjlsh3BBFqLaq4conqW1R2
# yLceM2eJ64TvZ9Ph5aHG2ac3kdgIMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVAIAGiXW7XDDBiBS1SjAyepi9u6XeoIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZXeMCIY
# DzIwMjQxMDI4MDQ0NzI2WhgPMjAyNDEwMjkwNDQ3MjZaMHQwOgYKKwYBBAGEWQoE
# ATEsMCowCgIFAOrJld4CAQAwBwIBAAICIJgwBwIBAAICE4swCgIFAOrK514CAQAw
# NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC
# AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAQWCEOOHGLZNKrtFHENbygNuhCsGX
# 8Wcv0YXJQaTG3kfP9g/GFIaknzDj9Rzssp9Lmu0H7s67asbN6iOUB1VQCvHWSP3j
# BVI94GsTL08HCGJKoNYMg1mMBrrSt/nGPL2UyJBwrnhtzbVYYlrhmUYL2qtxihCk
# uqLC5hlLvoijuJJu0SExj/RakySj/xcWiy3a4hOTweHZGOG1WdnisnU3X7/aRmhu
# rVElfty8LQ4UfiBisaAYkMu9o9ufCB03Pzwh1izU1yHyp2DuvygFKSjrUwvnvoLF
# 1ydIbD1Wl/TuMD+zRGZNyDzWv+TC2EdtghY/D5w4DgFinT155w+YBKgqPzGCBA0w
# ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AY
# bLW27zjtAAEAAAHrMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL
# KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIHpP6V7QdlGhG1BaSKKtq84NEH59
# PPTIb63m60qZIxh0MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgzrdrvl9p
# A+F/xIENO2TYNJSAht2LNezPvqHUl2EsLPgwgZgwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAiBCBZcqWHZMKx
# dRimu9j44lJFBBgI+333/HnE4rd5WQX6MTANBgkqhkiG9w0BAQsFAASCAgBPo/Wl
# jeN7BIcg/P4SaURzIY2tnAX4jtUzKvBm0Rs7Tv8+7BYRQNikFm0b7G9ssZLkbsJq
# N+DEGHDUoszTuhUxLPYEcElvJw+JxFGuOE+x/FXFXocY7a3LcBZIQONdMTi+0vmu
# jRvHN7WjxBTW00sxX7w6XvDBY00zrr+hAFBHFfb49THU6jvObKfsiT4ARSi3ESSi
# jtITsR70Tuzp799lmBbsPbPtqLzvJ/SgTZ1BlfSlF+xuwpqNmv3dRdkj/kYclf85
# qPxtSsrucuapTnpCJA125KnycZLdPqy081ie6qS7E1lYfM2M0He3DAyI/JtcFpwv
# XkqjO0eQBBbBzZP/VIS1E160UsHZ+VaydM/Dpjnr1gI19eOwVrz0ZP3n5MzeItyI
# +Bc5QV9zQFMbhvHKFhChJ8nMCVvN3KSNK/HDIvXkRsOBDPRF2Xd7r0f6jkrg140Q
# HMOBuyDadsX2yaMPXukxPdL6usqdY2Wg+kPhki79veywa5n9udADTmxaejZ0288X
# FPxzjCtUBP8HCQUj6SPpCh16cNPC1HO84PNctrsyycCQzV4Edc4AYRaiw3Du+mDy
# UJIdUBEgYtmWQtRKWqHHLIB26ryCbCEMGOxDDUlWN2aHbEPW9ydRY50mQsLCu9u7
# fQep2uLdokqrUqiBSKVhW6S6C3Fp93hAxNXg4g==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_15.ps1
|
sample_48_15.ps1
|
# Localized 05/08/2024 05:10 AM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Ja
PromptNoString=&Nein
BundleFound=Bundle gefunden: {0}
PackageFound=Paket gefunden: {0}
EncryptedBundleFound=Verschlüsseltes Bundle gefunden: {0}
EncryptedPackageFound=Verschlüsseltes Paket gefunden: {0}
CertificateFound=Zertifikat gefunden: {0}
DependenciesFound=Abhängigkeitspaket(e) gefunden:
GettingDeveloperLicense=Entwicklerlizenz wird abgerufen...
InstallingCertificate=Zertifikat wird installiert...
InstallingPackage=\nApp wird installiert...
AcquireLicenseSuccessful=Entwicklerlizenz wurde erfolgreich abgerufen.
InstallCertificateSuccessful=das Zertifikat wurde erfolgreich installiert.
Success=\nErfolgreich: Ihre App wurde erfolgreich installiert.
WarningInstallCert=\nSie sind dabei, ein digitales Zertifikat im Zertifikatspeicher "Vertrauenswürdige Personen" Ihres Computers zu installieren. Diese Aktion stellt ein ernstzunehmendes Risiko dar und sollte nur ausgeführt werden, wenn Sie dem Aussteller dieses digitalen Zertifikats vertrauen.\n\nSie sollten das zugeordnete digitale Zertifikat manuell deinstallieren, wenn Sie mit der Verwendung dieser App fertig sind. Anweisungen zu diesem Vorgang finden Sie hier: http://go.microsoft.com/fwlink/?LinkId=243053\n\nMöchten Sie den Vorgang wirklich fortsetzen?\n\n
ElevateActions=\nFühren Sie vor dem Installieren dieser App die folgenden Schritte aus:
ElevateActionDevLicense=\t- Erwerben Sie eine Entwicklerlizenz
ElevateActionCertificate=\t- Installieren Sie das Signaturzertifikat
ElevateActionsContinue=Zum Fortfahren sind Administratoranmeldeinformationen erforderlich. Akzeptieren Sie die Aufforderung der Benutzerkontensteuerung (UAC) und geben Sie Ihr Administratorkennwort ein, wenn Sie dazu aufgefordert werden.
ErrorForceElevate=Sie müssen Administratoranmeldeinformationen eingeben, um fortzufahren. Führen Sie dieses Skript ohne den "-Force"-Parameter oder von einem PowerShell-Fenster mit erhöhten Rechten aus.
ErrorForceDeveloperLicense=Für den Erwerb einer Entwicklerlizenz ist eine Interaktion des Benutzers erforderlich. Führen Sie das Skript ohne den "-Force"-Parameter erneut aus.
ErrorLaunchAdminFailed=Fehler: Es konnte kein neuer Prozess als Administrator gestartet werden.
ErrorNoScriptPath=Fehler: Sie müssen dieses Skript aus einer Datei heraus starten.
ErrorNoPackageFound=Fehler: Im Skriptverzeichnis wurde kein Paket oder Bundle gefunden. Stellen Sie sicher, dass sich das Paket bzw. Bundle, das Sie installieren möchten, im selben Verzeichnis befindet wie dieses Skript.
ErrorManyPackagesFound=Fehler: Im Skriptverzeichnis wurde mehr als ein Paket bzw. Bundle gefunden. Stellen Sie sicher, dass sich nur das Paket bzw. Bundle, das Sie installieren möchten, im selben Verzeichnis befindet wie dieses Skript.
ErrorPackageUnsigned=Fehler: Das Paket bzw. Bundle ist nicht digital signiert, oder die Signatur ist beschädigt.
ErrorNoCertificateFound=Fehler: Im Skriptverzeichnis wurde kein Zertifikat gefunden. Stellen Sie sicher, dass sich das Zertifikat, das zum Signieren des zu installierenden Pakets oder Bundles verwendet wurde, im selben Verzeichnis befindet wie dieses Skript.
ErrorManyCertificatesFound=Fehler: Im Skriptverzeichnis wurde mehr als ein Zertifikat gefunden. Stellen Sie sicher, dass sich nur das Zertifikat, das zum Signieren des zu installierenden Pakets oder Bundles verwendet wurde, im selben Verzeichnis befindet wie dieses Skript.
ErrorBadCertificate=Fehler: Die Datei "{0}" ist kein gültiges digitales Zertifikat. CertUtil wurde mit dem Fehlercode {1} zurückgegeben.
ErrorExpiredCertificate=Fehler: Das Entwicklerzertifikat "{0}" ist abgelaufen. Eine mögliche Ursache ist, dass die Systemuhr nicht auf das richtige Datum und die richtige Uhrzeit eingestellt ist. Wenden Sie sich an den App-Inhaber, damit dieser ein Paket oder Bundle mit einem gültigen Zertifikat erstellt, wenn die Systemeinstellungen richtig sind.
ErrorCertificateMismatch=Fehler: Das Zertifikat stimmt nicht mit dem Zertifikat überein, das zum Signieren des Pakets oder Bundles verwendet wurde.
ErrorCertIsCA=Fehler: Das Zertifikat darf keine Zertifizierungsstelle sein.
ErrorBannedKeyUsage=Fehler: Das Zertifikat darf nicht über die folgende Schlüsselverwendung verfügen: {0}. Die Schlüsselverwendung darf nicht angegeben sein oder muss "DigitalSignature" entsprechen.
ErrorBannedEKU=Fehler: Das Zertifikat darf nicht die folgende erweiterte Schlüsselverwendung besitzen: {0}. Es sind nur die EKUs "Codesignieren" und "Lebensdauersignieren" zulässig.
ErrorNoBasicConstraints=Fehler: Die Basiseinschränkungsextension des Zertifikats fehlt.
ErrorNoCodeSigningEku=Fehler: Die erweiterte Schlüsselverwendung des Zertifikats für das Codesignieren fehlt.
ErrorInstallCertificateCancelled=Fehler: Die Installation des Zertifikats wurde abgebrochen.
ErrorCertUtilInstallFailed=Fehler: Das Zertifikat konnte nicht installiert werden. CertUtil wurde mit dem Fehlercode "{0}" zurückgegeben.
ErrorGetDeveloperLicenseFailed=Fehler: Es konnte keine Entwicklerlizenz erworben werden. Weitere Informationen finden Sie unter http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Fehler: Das Zertifikat konnte nicht installiert werden. Status: {0}. Weitere Informationen finden Sie unter http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Fehler: Die App konnte nicht installiert werden.
ErrorAddPackageFailedWithCert=Fehler: Die App konnte nicht installiert werden. Zur Wahrung der Sicherheit sollten Sie die Deinstallation des Signaturzertifikats in Betracht ziehen, bis Sie die App installieren können. Anweisungen zu diesem Vorgang finden Sie unter:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/3770.ps1
|
3770.ps1
|
function Test-CreateIntegrationAccountAgreementX12
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountX12AgreementName = getAssetname
$integrationAccountX12AgreementName1 = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$childItems = New-Object PSObject |
Add-Member -PassThru NoteProperty Item1 'ChildItem' |
Add-Member -PassThru NoteProperty Item2 1 |
Add-Member -PassThru NoteProperty Item3 ("Prop1","Prop2","Prop3")
$items = (New-Object PSObject |
Add-Member -PassThru NoteProperty Property1 'Main' |
Add-Member -PassThru NoteProperty Property2 $childItems
)
$metadata = $items | ConvertTo-JSON -Compress
Assert-ThrowsContains {New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifier "AA" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content -Metadata "test" } "Invalid metadata."
$integrationAccountAgreement0 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content -Metadata $metadata
Assert-AreEqual $integrationAccountX12AgreementName $integrationAccountAgreement0.Name
$integrationAccountAgreement1 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName1 -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContentFilePath $agreementX12FilePath
Assert-AreEqual $integrationAccountX12AgreementName1 $integrationAccountAgreement1.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-CreateIntegrationAccountAgreementAS2
{
$agreementAS2FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "AS2AgreementContent.json"
$agreementAS2Content = [IO.File]::ReadAllText($agreementAS2FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountAS2AgreementName = getAssetname
$integrationAccountAS2AgreementName1 = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$integrationAccountAgreement3 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAS2AgreementName -AgreementType "AS2" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementAS2Content
Assert-AreEqual $integrationAccountAS2AgreementName $integrationAccountAgreement3.Name
$integrationAccountAgreement4 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAS2AgreementName1 -AgreementType "AS2" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContentFilePath $agreementAS2FilePath
Assert-AreEqual $integrationAccountAS2AgreementName1 $integrationAccountAgreement4.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-CreateIntegrationAccountAgreementEdifact
{
$agreementEdifactFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "EdifactAgreementContent.json"
$agreementEdifactContent = [IO.File]::ReadAllText($agreementEdifactFilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountEdifactAgreementName = getAssetname
$integrationAccountEdifactAgreementName1 = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$integrationAccountAgreement5 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountEdifactAgreementName -AgreementType "Edifact" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementEdifactContent
Assert-AreEqual $integrationAccountEdifactAgreementName $integrationAccountAgreement5.Name
$integrationAccountAgreement6 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountEdifactAgreementName1 -AgreementType "Edifact" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContentFilePath $agreementEdifactFilePath
Assert-AreEqual $integrationAccountEdifactAgreementName1 $integrationAccountAgreement6.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-CreateIntegrationAccountAgreementWithFailure
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountX12AgreementName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
Assert-ThrowsContains {New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner "TestGuest" -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content} "The partner 'TestGuest' could not be found in integration account '$integrationAccountName'."
Assert-ThrowsContains {New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner "TestHost" -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content} "The partner 'TestHost' could not be found in integration account '$integrationAccountName'."
Assert-ThrowsContains {New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "BB" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "BB" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content} "The qualifier 'BB' for partner '$guestPartnerName' is invalid."
Assert-ThrowsContains {New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "OO" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "OO" -AgreementContent $agreementX12Content} "The qualifier 'OO' for partner '$hostPartnerName' is invalid."
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-GetIntegrationAccountAgreement
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
Assert-ThrowsContains { Get-AzIntegrationAccountAgreement -ResourceGroupName "Random83da135" -IntegrationAccountName "DoesNotMatter" -AgreementName "DoesNotMatter" } "Resource group 'Random83da135' could not be found."
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountX12AgreementName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$integrationAccountAgreement0 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content
$result = Get-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName
Assert-AreEqual $integrationAccountX12AgreementName $result.Name
$result1 = Get-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName
Assert-True { $result1.Count -gt 0 }
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-RemoveIntegrationAccountAgreement
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountX12AgreementName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$integrationAccountAgreement0 = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content
Remove-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -Force
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-UpdateIntegrationAccountAgreement
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
$agreementAS2FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "AS2AgreementContent.json"
$agreementAS2Content = [IO.File]::ReadAllText($agreementAS2FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountAgreementName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$integrationAccountAgreement = New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content
Assert-AreEqual $integrationAccountAgreementName $integrationAccountAgreement.Name
Assert-AreEqual "X12" $integrationAccountAgreement.AgreementType
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -Force} "Either 'Host' business Identity qualifier or qualifier value is not specified."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifierValue "AA" -GuestIdentityQualifierValue "ZZ" -Force} "Either 'Host' business Identity qualifier or qualifier value is not specified."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -HostIdentityQualifierValue "AA" -Force} "Either 'Guest' business Identity qualifier or qualifier value is not specified."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifier "AA" -HostIdentityQualifierValue "AA" -Force} "Either 'Guest' business Identity qualifier or qualifier value is not specified."
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "AS2" -AgreementContent $agreementAS2Content -Force
Assert-AreEqual "AS2" $updatedIntegrationAccountAgreement.AgreementType
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "AS2" -AgreementContentFilePath $agreementAS2FilePath -Force
Assert-AreEqual "AS2" $updatedIntegrationAccountAgreement.AgreementType
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -GuestIdentityQualifier "XX" -GuestIdentityQualifierValue "XX" -Force
Assert-AreEqual "XX" $updatedIntegrationAccountAgreement.GuestIdentity.Qualifier
Assert-AreEqual "XX" $updatedIntegrationAccountAgreement.GuestIdentity.Value
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -HostIdentityQualifier "BB" -HostIdentityQualifierValue "BB" -Force
Assert-AreEqual "BB" $updatedIntegrationAccountAgreement.HostIdentity.Qualifier
Assert-AreEqual "BB" $updatedIntegrationAccountAgreement.HostIdentity.Value
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner "TestGuest" -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -Force} "The partner 'TestGuest' could not be found in integration account '$integrationAccountName'."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner "TestHost" -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -Force} "The partner 'TestHost' could not be found in integration account '$integrationAccountName'."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "BB" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "BB" -HostIdentityQualifierValue "AA" -Force} "The qualifier 'BB' for partner '$guestPartnerName' is invalid."
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "OO" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "OO" -Force} "The qualifier 'OO' for partner '$hostPartnerName' is invalid."
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -GuestPartner $hostPartnerName -HostPartner $guestPartnerName -Force
Assert-AreEqual $hostPartnerName $updatedIntegrationAccountAgreement.GuestPartner
Assert-AreEqual $guestPartnerName $updatedIntegrationAccountAgreement.HostPartner
$childItems = New-Object PSObject |
Add-Member -PassThru NoteProperty Item1 'ChildItem' |
Add-Member -PassThru NoteProperty Item2 1 |
Add-Member -PassThru NoteProperty Item3 ("Prop1","Prop2","Prop3")
$items = (New-Object PSObject |
Add-Member -PassThru NoteProperty Property1 'Main' |
Add-Member -PassThru NoteProperty Property2 $childItems
)
$metadata = $items | ConvertTo-JSON -Compress
Assert-ThrowsContains {Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -Metadata "test" -Force} "Invalid metadata."
$updatedIntegrationAccountAgreement = Set-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountAgreementName -Metadata $metadata -Force
$result = $updatedIntegrationAccountAgreement.Metadata.ToString() | ConvertFrom-JSON
Assert-AreEqualObjectProperties $items $result
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-ListIntegrationAccountAgreement
{
$agreementX12FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "X12AgreementContent.json"
$agreementX12Content = [IO.File]::ReadAllText($agreementX12FilePath)
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$hostPartnerName = getAssetname
$guestPartnerName = getAssetname
$hostBusinessIdentities = @(("AA","AA"), ("BB","BB"))
$guestBusinessIdentities = @(("ZZ","ZZ"), ("XX","XX"))
$hostPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $hostPartnerName -BusinessIdentities $hostBusinessIdentities
$guestPartner = New-AzIntegrationAccountPartner -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -PartnerName $guestPartnerName -BusinessIdentities $guestBusinessIdentities
$val=0
while($val -ne 1)
{
$val++ ;
$integrationAccountX12AgreementName = getAssetname
New-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -AgreementName $integrationAccountX12AgreementName -AgreementType "X12" -GuestPartner $guestPartnerName -HostPartner $hostPartnerName -GuestIdentityQualifier "ZZ" -HostIdentityQualifier "AA" -GuestIdentityQualifierValue "ZZ" -HostIdentityQualifierValue "AA" -AgreementContent $agreementX12Content
}
$result = Get-AzIntegrationAccountAgreement -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName
Assert-True { $result.Count -eq 1 }
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
|
combined_dataset/train/non-malicious/sample_20_35.ps1
|
sample_20_35.ps1
|
ConvertFrom-StringData @'
FailoverClustersModuleRequired=Nenašel se požadovaný modul PowerShell (FailoverClusters). Pomocí nástroje Role a funkce nainstalujte: Nástroje pro vzdálenou správu serveru | Nástroje pro správu funkcí | Nástroje Clustering s podporou převzetí služeb při selhání | Modul clusteru s podporou převzetí služeb při selhání pro prostředí Windows PowerShell
'@
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA0nxbZJZRLr/5w
# ZUSKa2G7LtsX6w5zjr6+AT8xsEDih6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGCcdXRwdlvnmuUNZUs7umwq
# +gRIdzkcEDk0nI+7iCkpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAvlLL6zC5k8O+Dh5EBCXqA2LUQdCW4e+P1n9dBOIM1MgQS41RIvj2W8jZ
# cgtVQ8cW6q0Gx0/E4GFrjC05xDZmTPBfyZ3ViNvqd2s32ULEDxNywcOJzb4D9bGi
# Eg2eLQhMo5yupfOvvReCp1rEXd0n7s0IsbdixoJ7mxLNClTc9LgSKOSM+v09iZAQ
# jq/FY+rlTlsspmibWNyOzGEFV5iPGIex9O5M4vsQD50WjEYuggkBthwgSmIKwADP
# 0+55JUw1YLkvpYJo6bnI0GG/2zGcdDcubBmKmiPFrk0k/USu2yco+2RN3arthp4b
# axJc+iHdhW1w+kforq6IKu8QXVOLMqGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAsoUe5eOn5FX59xRTkvt9KFSRdRzKywSYs9kiRrPcrrQIGZa6UAESj
# GBMyMDI0MDEyMjIxMzE1OS42MzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC
# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ
# pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm
# scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF
# UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr
# c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T
# 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J
# IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz
# z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U
# NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O
# ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2
# UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx
# /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh
# Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t
# 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0
# GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6
# vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu
# dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY
# nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ
# 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z
# 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC
# V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH
# BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf
# v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv
# E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOlZEnwwIhgPMjAyNDAxMjMwMDEyNDRaGA8yMDI0MDEyNDAwMTI0NFowczA5Bgor
# BgEEAYRZCgQBMSswKTAKAgUA6VkSfAIBADAGAgEAAgEMMAcCAQACAhFgMAoCBQDp
# WmP8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAuFdz42Rko9M3ivrv/uG3
# QvBrIXgucD09zUgAh5KiQvvTyJhIM6Ky1mxQUGa0HyFwHfBFnXeb4rzDjWWpQLXj
# dDMDU9SYh54v43gTXWsr6WQ3XDfxOY9cs749jpwQ4qiV39UMOpCiwLQZJk+vL3Ll
# Od/6HO9LSfAvYUbiofCpaPUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCCGwWGeFQB1T0SHYwv32yTw7YNqcB81z68OLxRlt3u0WTCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4MlxBt2Crw12PTHIy5iYq
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372b
# mhxogyIAAQAAAeMwIgQgFu6r6baMtOeWRTRsHtoLRxH0nvqB5p6LBtBECvyAHE4w
# DQYJKoZIhvcNAQELBQAEggIAdHq1FFj26kp32BB92z2zFhz7D4R2LlCPkT/h+rvP
# 0cBwlAnugjeLBGzpY1W/SsqNfur8zMg+AHHwQDIgKZK8Kid/TWzS2E0mfM/zPP5W
# LnlejsZifhHt5++CT9bZ1zr7AjwW4YblINHhI129cNi7g4e+GbRgm+pHQ07I8Qr5
# KFQoHSEUMx2utubThq1I/HN9wni25N4f4rzKm0swhi7JBuhVKIwKkg+8Vz8tW0NZ
# +2LhpdPvPo6ITWPgrGhmnZX+UoS38tDmG68ByDmM0j1T5G3P3/BgGSFQ5lv5P7pW
# 2sGCTDDS/GHPn+Xh2Y6YPpE4jbGSNplTFFfysyaz2jJA5weYqfbgl6tElVIVdtSx
# f3124pazzUMNrFBuoShm2xGCIkBGq1/LA6rRCSdI+3Ki56+d6sSjM8W+XeA+XZAr
# UKiBhux4FwAnHzXZd9MZjvLrFquEqmkR5YG/ETsY3SBzGeAEIfauz4yth+bS6VI1
# vmwRcRUapoxV8dlbX07blQJvDU45OgiX/e7qs+sabndO9dgtLHjO3HM89aENz8r8
# 87j91cejc0UbzE4bTsJjaeZkd0hQP05HtmDNMgFLy4ZLhokHClXVGEpzTCSJoAOz
# kSJ9JQoSI9yNWx7Mw3BpaDznbrROf9Q8y9ennSfgRngXPzS/FtKxjrGQFEcUyclL
# R0g=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_29_99.ps1
|
sample_29_99.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets an EventHub Authorization Rule
.Description
Gets an EventHub Authorization Rule
#>
function Get-AzEventHubAuthorizationRule{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IAuthorizationRule])]
[CmdletBinding(DefaultParameterSetName = 'GetExpandedNamespace', PositionalBinding = $false, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'GetExpandedEntity', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'GetExpandedNamespace', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'GetExpandedAlias', HelpMessage = "The name of the Authorization Rule")]
[Alias('AuthorizationRuleName')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the Authorization Rule.
${Name},
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the Disaster Recovery alias")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the Disaster Recovery alias
${AliasName},
[Parameter(ParameterSetName = 'GetExpandedEntity', Mandatory, HelpMessage = "The name of the EventHub entity.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the EventHub entity.
${EventHubName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of EventHub namespace")]
[Parameter(ParameterSetName = 'GetExpandedEntity', Mandatory, HelpMessage = "The name of the EventHub namespace.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the EventHub namespace.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of EventHub namespace
${NamespaceName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'GetExpandedEntity', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'GetExpandedEntity', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', HelpMessage = "The ID of the target subscription.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName = 'GetViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
try{
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
if ($PSCmdlet.ParameterSetName -eq 'GetExpandedNamespace'){
if(-not $PSBoundParameters.ContainsKey('Name')){
Az.EventHub.private\Get-AzEventHubNamespaceAuthorizationRule_List @PSBoundParameters
}
else{
Az.EventHub.private\Get-AzEventHubNamespaceAuthorizationRule_Get @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedEntity'){
if(-not $PSBoundParameters.ContainsKey('Name')){
Az.EventHub.private\Get-AzEventHubAuthorizationRule_List @PSBoundParameters
}
else{
Az.EventHub.private\Get-AzEventHubAuthorizationRule_Get @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedAlias'){
$null = $PSBoundParameters.Remove('AliasName')
if(-not $PSBoundParameters.ContainsKey('Name')){
Az.EventHub.private\Get-AzEventHubDisasterRecoveryConfigAuthorizationRule_List -Alias $AliasName @PSBoundParameters
}
else{
Az.EventHub.private\Get-AzEventHubDisasterRecoveryConfigAuthorizationRule_Get -Alias $AliasName @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetViaIdentityExpanded'){
if($InputObject.Id -ne $null){
$ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id
}
else{
$ResourceHashTable = ParseResourceId -ResourceId $InputObject
}
if ($ResourceHashTable['EventHubName'] -ne $null){
Az.EventHub.private\Get-AzEventHubAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['AliasName'] -ne $null){
Az.EventHub.private\Get-AzEventHubDisasterRecoveryConfigAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['NamespaceName'] -ne $null){
Az.EventHub.private\Get-AzEventHubNamespaceAuthorizationRule_GetViaIdentity @PSBoundParameters
}
else{
throw 'Invalid -InputObject'
}
}
}
catch{
throw
}
}
}
function ParseResourceId{
param (
[string]$ResourceId
)
$array = $resourceID.ToLower().Split('/')
$indexSubscription = 0..($array.Length -1) | where {$array[$_] -eq 'subscriptions'}
$indexResourceGroup = 0..($array.Length -1) | where {$array[$_] -eq 'resourcegroups'}
$indexNamespace = 0..($array.Length -1) | where {$array[$_] -eq 'namespaces'}
$indexEventHub = 0..($array.Length -1) | where {$array[$_] -eq 'eventhubs'}
$indexAlias = 0..($array.Length -1) | where {$array[$_] -eq 'disasterrecoveryconfigs'}
$indexAuthRule = 0..($array.Length -1) | where {$array[$_] -eq 'authorizationrules'}
if (($indexResourceGroup+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
if (($indexNamespace+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
$result = @{
'ResourceGroupName' = $array.get($indexResourceGroup+1)
'NamespaceName' = $array.get($indexNamespace+1)
}
if ($indexEventHub -ne $null){
if (($indexEventHub+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('EventHubName', $array.get($indexEventHub+1))
}
}
if ($indexSubscription -ne $null){
if (($indexSubscription+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('SubscriptionName', $array.get($indexSubscription+1))
}
}
if ($indexAuthRule -ne $null){
if (($indexAuthRule+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('AuthorizationRuleName', $array.get($indexAuthRule+1))
}
}
if ($indexAlias -ne $null){
if (($indexAlias+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('AliasName', $array.get($indexAlias+1))
}
}
return $result
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAUkIciOHKrXjmA
# 4r2k3bpz882ZJ8BItbsfnB4hjBcZZKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFfCFh532GC59kslCDXUSy9R
# +btJVYGiuX0tj64j2viSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEALo+lD3GCaPDaJbkOEcb0mLgmF7oNpXO6Sb1CYZ0XLq76+nx8yh9WAFx+
# R4xF8NG6r84uLiX7CtAEUiBil7/qVGJnxW9J+PoAVQH7hQK8QfCWaulqnQcByTeX
# bKqw+PqgxmCRd4cNTFDPYylPdjBoGtEFtn5aXZaMQbal7ZgwdgPDRoJNf2I6ZPmF
# ut8AeSCVMi+4PWhC6deMupxvuA0ycD4sTC7sy/zF2Y73zoU+pE5B25s5lci05myW
# 79cUmDexDm6Cs2YfDUE56RhjPZwBOMq9h5pvkdpZel2xfSwb2rCb9NBkUG5nbGfb
# kdgvNBAyh6DYOgoBzekMZncRz6RPI6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAxIa3SI0y79BbtLo51JI5q30+tcXeNWPcP2ZZ1UHalEwIGZjOrDSK9
# GBMyMDI0MDUxNjA2NDIxNC4yNDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnv9IIwIhgPMjAyNDA1MTYxMDU3MDZaGA8yMDI0MDUxNzEwNTcwNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6e/0ggIBADAHAgEAAgINZTAHAgEAAgISozAKAgUA
# 6fFGAgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGNc4u32nuIXgxHNYkcO
# 2JhScVkrRtgJY2+S/5AvC0pqv867my7BJTvEwCxcT1Cbmg7CqtM8ZjjTX4Hz2bRH
# KH/PDcQ1q5CgNKnH1v48ze0qiC10uL1q6557TRJL2kCJcuWSYFiNZFPjN8Ae7AMf
# ayMCOInnQzq1zVQ58dhbcHO+MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgZAY990vK0dVTL+/LGTblWHvPd30yyNtAV2HhW6gS/rkwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIBmv6hOpkdy42CPf1nZP66TBcGvnZwDhfckDfiFvOOm5
# MA0GCSqGSIb3DQEBCwUABIICAEtniX7H5ZGShPDLMCmNQLAazPkKzTzFSCaFG5it
# fjJgHzCDNWlxvZr9lhsXwb9HgpL17Kzaq13JlR1PVr86QLhoGT4dTkPTp9GcIv9S
# eswaKecqKoWWBa/Jq0es/zlmg6C92Xl5PbtIEpHX6vaDSLpB3JJXOyFoXou4sbJS
# OUMvoSOfHlhz+VuYmEyi5nuVVO/RPZP2boQ6Zta0/Q12XDB/HqtfSCCjDZLQ9Oyx
# JLqb+HgwLCagG7KTZl15W3xTumcvrqKKx+eRnsQ0StrXPQ3GY5DdWeyvT+OHKMWc
# E5Iy9cJ8IIJVscbfdURgc3omKpDowNsp4la9jC5B0DMNK1emqLC93dYr1wGnsH9b
# ap9LGEs3WlivcBBH2OYQcHxfdjLcz8xEC2nDKKWeiAI9caoeQ8fsSIXECUiozDsp
# AD0JgNp8uz474cAve1/jCK4hNSXTZfLWstjcUA6tDLNp35cInsdolOIoZM+2S7CO
# 1cPrYodhPdYhOMZitl7zzWrYUb/Z+h6LcGQW+iSAylpDu8dMGdCib4lgUTo+IB6w
# yVJIUy2lgQfaaVQjqi0Q0IhrqLaKtBimsCMCBu6pYjoTC5WaXXy87tHew8AI/s+0
# I0ViGXcMIoIZueEBZ3yXDVGTIqg5RvescO18rR+BQfWqvfjneR3Lfou9nod8Mxrs
# oY1r
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_3.ps1
|
sample_31_3.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vbsinst'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vbsinst.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'cc03b9ae-8da9-4b89-b900-8f068d3d2c43'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vbsinst Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vbsinst.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVbsinstance', 'Get-OCIVbsinstancesList',
'Get-OCIVbsinstWorkRequest', 'Get-OCIVbsinstWorkRequestErrorsList',
'Get-OCIVbsinstWorkRequestLogsList',
'Get-OCIVbsinstWorkRequestsList', 'Move-OCIVbsinstanceCompartment',
'New-OCIVbsinstance', 'Remove-OCIVbsinstance',
'Update-OCIVbsinstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vbsinst'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_26_96.ps1
|
sample_26_96.ps1
|
#
# Module manifest for module 'OCI.PSModules.Adm'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Adm.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Adm Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAdmRemediationRecipe',
'Get-OCIAdmApplicationDependencyRecommendationsList',
'Get-OCIAdmApplicationDependencyVulnerabilitiesList',
'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList',
'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList',
'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList',
'Get-OCIAdmStage', 'Get-OCIAdmStagesList',
'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList',
'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList',
'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList',
'Invoke-OCIAdmDeactivateRemediationRecipe',
'Move-OCIAdmKnowledgeBaseCompartment',
'Move-OCIAdmRemediationRecipeCompartment',
'Move-OCIAdmRemediationRunCompartment',
'Move-OCIAdmVulnerabilityAuditCompartment',
'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe',
'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit',
'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe',
'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit',
'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest',
'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe',
'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_51_73.ps1
|
sample_51_73.ps1
|
# Localized 06/28/2023 07:58 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Vianmääritys
Troubleshoot_DetectDVDDevice=Tarkistetaan DVD-laitetta...
Troubleshoot_DetectDVDvideoDecoder=Tarkistetaan videodekooderia DVD-toistoa varten...
Troubleshoot_DetectDVDAudioDecoder=Tarkistetaan äänidekooderia DVD-toistoa varten...
Resolution_Title=Ratkaisu
CDRomDeviceName=Nimi
PnPDeviceID=Tunnus
Status=Tila
Report_Name_CDRomDeviceInformation=DVD- ja CD-asemat
Report_Description_CDRomDeviceInformation=DVD- ja CD-asemien tiedot
###PSLOC
'@
|
combined_dataset/train/non-malicious/sample_24_90.ps1
|
sample_24_90.ps1
|
const ALIAS = Symbol.for('yaml.alias');
const DOC = Symbol.for('yaml.document');
const MAP = Symbol.for('yaml.map');
const PAIR = Symbol.for('yaml.pair');
const SCALAR = Symbol.for('yaml.scalar');
const SEQ = Symbol.for('yaml.seq');
const NODE_TYPE = Symbol.for('yaml.node.type');
const isAlias = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === ALIAS;
const isDocument = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === DOC;
const isMap = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === MAP;
const isPair = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === PAIR;
const isScalar = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === SCALAR;
const isSeq = (node) => !!node && typeof node === 'object' && node[NODE_TYPE] === SEQ;
function isCollection(node) {
if (node && typeof node === 'object')
switch (node[NODE_TYPE]) {
case MAP:
case SEQ:
return true;
}
return false;
}
function isNode(node) {
if (node && typeof node === 'object')
switch (node[NODE_TYPE]) {
case ALIAS:
case MAP:
case SCALAR:
case SEQ:
return true;
}
return false;
}
const hasAnchor = (node) => (isScalar(node) || isCollection(node)) && !!node.anchor;
class NodeBase {
constructor(type) {
Object.defineProperty(this, NODE_TYPE, { value: type });
}
/** Create a copy of this node. */
clone() {
const copy = Object.create(Object.getPrototypeOf(this), Object.getOwnPropertyDescriptors(this));
if (this.range)
copy.range = this.range.slice();
return copy;
}
}
export { ALIAS, DOC, MAP, NODE_TYPE, NodeBase, PAIR, SCALAR, SEQ, hasAnchor, isAlias, isCollection, isDocument, isMap, isNode, isPair, isScalar, isSeq };
// SIG // Begin signature block
// SIG // MIIoTAYJKoZIhvcNAQcCoIIoPTCCKDkCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // 9m1NecPFDYsODOMn5mXQIIQITJH5KUVNOisj1ndntG+g
// SIG // gg2aMIIGGDCCBACgAwIBAgITMwAAA4MUYnEL35umPQAA
// SIG // AAADgzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMDcxMzIzNDUzNloX
// SIG // DTI0MDkxNTIzNDUzNlowgYgxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCAzcmQgUGFydHkg
// SIG // QXBwbGljYXRpb24gQ29tcG9uZW50MIIBIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlZ6RXxi6ssQbUoLu
// SIG // wsUg8Lzx5c2UB0kc6aIwqPLgFQAHd8Fujs2eO7JzXVxA
// SIG // 1yizqWqcy/7OQ0BytzPoM0/Dos4MCCt8Vofm41J7qoJl
// SIG // I1vRt3RH0+n1edFpKi+XbOdDqqZBPjx/fBLFa4HL5UD3
// SIG // u8adFOmz/YuCgHsv8q5oyzgtiH9cRamcUEBldYeb1jzo
// SIG // giSktqGeOO6bBVCq0Y2pOCSEOpAqRHZWuRoZrBnR9Dxb
// SIG // +54fqFuM9OaHQAt025PPApw4G2yWSerss9TEOVJ7YJ9F
// SIG // 3QnkBGwbHIqREw+zUQtdEI9kAai6NiD8U9tS/3QufZz7
// SIG // DI2Pnw3pnwQOKRUOkwIDAQABo4IBgjCCAX4wHwYDVR0l
// SIG // BBgwFgYKKwYBBAGCN0wRAQYIKwYBBQUHAwMwHQYDVR0O
// SIG // BBYEFLbqIlKYyBFhlR+UbIclG3Vb31x0MFQGA1UdEQRN
// SIG // MEukSTBHMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
// SIG // ZCBPcGVyYXRpb25zIExpbWl0ZWQxFjAUBgNVBAUTDTIz
// SIG // MTUyMis1MDExNTcwHwYDVR0jBBgwFoAUSG5k5VAF04Kq
// SIG // Fzc3IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0
// SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv
// SIG // TWljQ29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBh
// SIG // BggrBgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMv
// SIG // TWljQ29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAM
// SIG // BgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCJ
// SIG // u41n3onudflWf5dguZipzkHZ0JlADjVYe784mJX5VJmr
// SIG // HvDbRbrhTzKYbcLbmx+rWTEZRhw5jw7QOL1+jNCMOAY6
// SIG // B0oP7JBaChHiAB5TpshNEQeN5k7jTr3cGtCUj1juXunt
// SIG // Q9Acop2puL6yuximi+NR3GMAYuW/DbxpQM+ber+NUEGH
// SIG // /HuQr19f+dbkCG+BtFoVXl+ojFbLNDHIletniochj1F5
// SIG // RpXdMXJSWVeJKKNbBuGa7ln+T1XpUMUNG+UEHKmU5W1Q
// SIG // W9HrKW6FWsYeQff6INGLQ9tFf3lvnvukVdJjljyvr/Om
// SIG // Qvl1aUlShMIxc1koeIbMkmqB3Q2ASKixX1wOnxh80FcN
// SIG // RtcfvlsSfMhQ9t8BTfaQlOHASTB4ru/9bKHTQsMN99iN
// SIG // j5FP9M/GC2LRLiAw2zAcakmpj8LIdzBu3pE+5ZXROaWF
// SIG // IGcglS35OoEbt1M06gQaTm/a2NSU5KBknAaJQgCR0ldX
// SIG // mTtwoFRWbcAX2hUzf9K2xShNjKZinJHvQPR3O/MU23yL
// SIG // hzwKPQIky08+hC8FJWgT8XGyAPr1J0f3rgj+zk84SB42
// SIG // 8Au95BCZDrrElk1cWp/P3KS32Q2fVUoTGE/vvv5avrc1
// SIG // +UQft1kjY4FTDUL8PwatVilcS755GJKVhjdFOGE7+H7I
// SIG // 6qUgCthUvGTHBguMTE49qjCCB3owggVioAMCAQICCmEO
// SIG // kNIAAAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
// SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD
// SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
// SIG // Q29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
// SIG // b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4X
// SIG // DTExMDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
// SIG // b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJ
// SIG // KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t
// SIG // 2G6qghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7d
// SIG // N2vGEtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55J
// SIG // nOloXtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJS
// SIG // JhIv56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64Dhk
// SIG // rG5kNXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ9
// SIG // 7/vjK1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+
// SIG // sYxd6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4
// SIG // ftKdgCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf
// SIG // 8NBSv4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOn
// SIG // qWbsYR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj
// SIG // 43BdD1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8
// SIG // GLhEfEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO
// SIG // 3+xbn6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4
// SIG // X7IvhNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXU
// SIG // pUMvdJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxG
// SIG // oGyY0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3
// SIG // FQEEAwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVt
// SIG // qMp1ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEw
// SIG // CwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYD
// SIG // VR0jBBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYD
// SIG // VR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3Nv
// SIG // ZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2Vy
// SIG // QXV0MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcB
// SIG // AQRSMFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWlj
// SIG // cm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGU
// SIG // MIGRBgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9j
// SIG // cy9wcmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIg
// SIG // HQBMAGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABh
// SIG // AHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOC
// SIG // AgEAZ/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQ
// SIG // wWVfLiw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZdd
// SIG // ZYSQfYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9
// SIG // G6XUtR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKK
// SIG // ELukqQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP
// SIG // 80Yr3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ
// SIG // 1h/DMhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgy
// SIG // cScaf7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6C
// SIG // PxNNZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2
// SIG // l4bf2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1
// SIG // HxS+YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9
// SIG // WfOXpQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpI
// SIG // lR+r+0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h1
// SIG // 5q/6/IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BX
// SIG // IqF4ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3Zb
// SIG // CoBIa/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCB
// SIG // lTB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N
// SIG // aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMz
// SIG // AAADgxRicQvfm6Y9AAAAAAODMA0GCWCGSAFlAwQCAQUA
// SIG // oIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwG
// SIG // CisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqG
// SIG // SIb3DQEJBDEiBCB22wbKE1JVQNv9Lm34PaHZTDMqXJ5z
// SIG // qU0HDfB8YOrNEDBCBgorBgEEAYI3AgEMMTQwMqAUgBIA
// SIG // TQBpAGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5t
// SIG // aWNyb3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAAcD
// SIG // PHPvdXWhYDEhpx2BHJepqvBDLUrllbl0VmcpmEdgjbrE
// SIG // hkcE96mTgBjuPT/iSuuXTn9LYKbuTzBGgMG7bsnnfMo/
// SIG // AvZx1IdQBAWGSSCX7Mc+JVfGPoSjVzK19X+raHG5glAw
// SIG // oMPI+Q8D4O8C4fd/KpcKPGmbj//3jg8bAm4iykzlyNN5
// SIG // 67OXWrcYZLX2Zzx/XhW1cMR9qV0VeJJE227jRNpBrEul
// SIG // rvUZ0XTU9YkDNXyDpn6Sx56KZt+crLCnXHuaM6o/vCJd
// SIG // PzLTzme9fY9TOxNDTwOUKaFFS1v9Kz3qioUeOGyM3z7E
// SIG // NEuNtGIMSpw4mIfJD7L/CWcErDOfWvuhgheUMIIXkAYK
// SIG // KwYBBAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdt
// SIG // MIIXaQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZI
// SIG // hvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkK
// SIG // AwEwMTANBglghkgBZQMEAgEFAAQgboczJWA42K8ez8ur
// SIG // 64pBgsCoD3EnHDHKuaC1mQN3jZwCBmYX1i2UFhgTMjAy
// SIG // NDA0MjIyMzIwMzcuMDcyWjAEgAIB9KCB0aSBzjCByzEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
// SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
// SIG // blNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUw
// SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
// SIG // aWNloIIR6jCCByAwggUIoAMCAQICEzMAAAHnLo8vkwtP
// SIG // G+kAAQAAAecwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTE5
// SIG // WhcNMjUwMzA1MTg0NTE5WjCByzELMAkGA1UEBhMCVVMx
// SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
// SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
// SIG // dGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2Eg
// SIG // T3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1Mg
// SIG // RVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
// SIG // b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkq
// SIG // hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwlefL+CLkOuf
// SIG // VzzNQ7WljL/fx0VAuZHYhBfPWAT+v0Z+5I6jJGeREnpn
// SIG // +RJYuAi7UFUnn0aRdY+0uSyyorDFjhkWi3GlWxk33JiN
// SIG // bzESdbczMAjSKAqv78vFh/EHVdQfwG+bCvkPciL8xsOO
// SIG // 031zxPEZa2rsCv3vp1p8DLdOtGpBGYiSc9VYdS4UmCmo
// SIG // j/WdtxGZhhEwlooJCm3LgJ4b4d8qzGvPbgX2nh0GRBxk
// SIG // KnbJDOPBAXFklnaYkkgYgMcoR1JG5J5fTz87Qf0lMc0W
// SIG // Y1M1h4PW39ZqmdHCIgFgtBIyuzjYZUHykkR1SyizT6Zd
// SIG // //lC+F43NGL3anPPIDi1K//OE/f8Sua/Nrpb0adgPP2q
// SIG // /XBuFu+udLimgMUQJoC+ISoCF+f9GiALG8qiTmujiBkh
// SIG // fWvg315dS6UDzSke/drHBe7Yw+VqsCLon0vWFIhzL0S4
// SIG // 4ypNEkglf5qVwtAaD5JOWrH8a6yWwrCXjx0jhG5aSc0Z
// SIG // s2j+jjF8EXK2+01xUDrE5CrqpFr72CD71cwuvFDPjLJC
// SIG // z5XdXqnTjjCu0m239rRkmX9/ojsFkDHFlwfYMOYCtwCG
// SIG // CtPFpCSbssz6n4rYLm3UQpmK/QlbDTrlvsBw2BoXIiQx
// SIG // di5K45BVI1HF0iCXfX9rLGIrWfQrqxle+AUHH68Y75NS
// SIG // /I77Te5rpSMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTP
// SIG // /uCYgJ82OHaRH/2Za4dSu96PWDAfBgNVHSMEGDAWgBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSg
// SIG // UqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
// SIG // b3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIw
// SIG // UENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBe
// SIG // MFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
// SIG // dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
// SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
// SIG // HRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
// SIG // MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC
// SIG // AgEAdKHw25PpZVotXAup7H4nuSbadPaOm+gEQqb7Qz6t
// SIG // ihT/oYvlDTT+yxnIirnJKlwpgUxSIXwXhksb5OsnKJHU
// SIG // K9/NeaRDmmFk5x70NPvISsvOq9ReK3wbuKBweXE8tPE+
// SIG // KIaxvzmBvwf4DZ89Dper+7v6hI8+PM12emZcShsmcCpi
// SIG // mVmgXdg2BMMyqXS5AcbOgOnp1mUdI2PquRXW1eOYIRky
// SIG // oEq+RAgDpyw+J4ycH4yKtJkWVsA2UKF7SUmlR0rtpR0C
// SIG // 92BxBYpLp21EyXzXwQyy+xr/rE5kYg2ZMuTgMaCxtoGk
// SIG // 37ohW36Zknz3IJeQjlM3zEJ86Sn1+vhZCNEEDb7j6VrA
// SIG // 1PLEfrp4tlZg6O65qia6JuIoYFTXS2jHzVKrwS+WYkit
// SIG // c5mhCwSfWvmDoxOaZkmq1ubBm5+4lZBdlvSUCDh+rRli
// SIG // xSUuR7N+s2oZKB4fIg/ety3ho2apBbrCmlFu9sjI/8sU
// SIG // 3hhAzqCK9+ZMF8a9VLvs5Lq9svhbjWNKGY6ac6feQFtZ
// SIG // XoT9MWjvqAVdV372grq/weT1QKdsc66LDBFHAMKSaYqP
// SIG // lWHyLnxo+5nl3BkGFgPFJq/CugLqPiZY/CHhUupUryoa
// SIG // kKZnQcwDBqjzkCrdTsN2V8XoSu7wIopt2YgC5TNCueOp
// SIG // NLGa8XWT4KZs+zvMPYBy7smQEHswggdxMIIFWaADAgEC
// SIG // AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEB
// SIG // CwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
// SIG // aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
// SIG // ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQD
// SIG // EylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRo
// SIG // b3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5
// SIG // MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
// SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
// SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk
// SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
// SIG // MDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC
// SIG // AgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
// SIG // yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
// SIG // NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1
// SIG // hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
// SIG // Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP
// SIG // z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1w
// SIG // jjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56
// SIG // KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7
// SIG // vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2l
// SIG // IH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUD
// SIG // o9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhz
// SIG // PUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco
// SIG // dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGU
// SIG // lNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsl
// SIG // uq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W2
// SIG // 9R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZ
// SIG // MBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
// SIG // BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
// SIG // BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT
// SIG // MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
// SIG // dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv
// SIG // Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYB
// SIG // BQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEw
// SIG // CwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYD
// SIG // VR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYD
// SIG // VR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3Nv
// SIG // ZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2Vy
// SIG // QXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w
// SIG // TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3Nv
// SIG // ZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAx
// SIG // MC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1V
// SIG // ffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9
// SIG // MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
// SIG // ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
// SIG // vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz
// SIG // aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
// SIG // +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId
// SIG // w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5m
// SIG // O0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ
// SIG // /gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9
// SIG // swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu
// SIG // +yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyh
// SIG // YWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFR
// SIG // hLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0
// SIG // +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAx
// SIG // M328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQ
// SIG // wXEGahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGk
// SIG // gc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
// SIG // HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAl
// SIG // BgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5MjAwLTA1RTAt
// SIG // RDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAs3IE5xmr
// SIG // EsHv3a7vnD3tTRf78EOggYMwgYCkfjB8MQswCQYDVQQG
// SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
// SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
// SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIF
// SIG // AOnQ0xwwIhgPMjAyNDA0MjIxMjE0MjBaGA8yMDI0MDQy
// SIG // MzEyMTQyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA
// SIG // 6dDTHAIBADAHAgEAAgISzzAHAgEAAgIUPDAKAgUA6dIk
// SIG // nAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBCwUAA4IBAQAv3xPfH6/h0hSg+w1AVhmsZVqO
// SIG // pTqpXrhEXpMu8LohluDY8PS1mzjD2YE7+iGBbQDUH7L+
// SIG // JEXLB/yW7EamvBYKxZH0XPyk2WF179T3CK2SzQS2CtE+
// SIG // sG0vMuQGniyGASgM7dYYukZcXARjUamtnWNOECNi/zgc
// SIG // o3IJ5zx2y5f5YmMofkgpgqhZWFiDh4ZmOC/VwMaZylJv
// SIG // xGYho/kJv+cjGxbwDbu4TIvivpRlOPdx4dgudt0kvxqS
// SIG // WjAYuzsjlMYOTwJvPYhmUlN0QJAnf7Cy7EXbVo1ahUoz
// SIG // CkVDtKS8G5TMNVBAXUolaC9k9IciEiobMc/tvjlcCtSN
// SIG // xOCTogrxMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAA
// SIG // AecwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ
// SIG // AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg
// SIG // No2Z8XKLsXhjLtlPkjqv4OM1ilpmOnFIU5i+NIENGSUw
// SIG // gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDlNl0N
// SIG // dmqG/Q3gxVzPVBR3hF++Bb9AAb0DBu6gudZzrTCBmDCB
// SIG // gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
// SIG // HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
// SIG // AAAB5y6PL5MLTxvpAAEAAAHnMCIEIGRUNgt98HmbO7Ve
// SIG // roAKbtv+m9EAZiOOK3rA+CHOlbFpMA0GCSqGSIb3DQEB
// SIG // CwUABIICAElXPY+dAlRQkTJb36Qn+t96j7O2KeCgj6l7
// SIG // GCqtc/Z1ERfehqXKesvH+1hOyQEVx8hAj4Cn4fW7C/vR
// SIG // Wj8tLj0alTWe0w9+EVynREdskEi7YdzgkIryRB/IgcpO
// SIG // rkpfX9xnGPdAToGdth/Qkf0cTSTg3uESYOV0iKaNVOPJ
// SIG // lv9tuWg5kxYPCShw/69SKcc4MpN6eybGiY+AYqDvQJru
// SIG // zQ0hu3smw/sxVsVuRfw/uSx//+eZSdHt6TYS1SQxplGf
// SIG // 1GptVozTSKEdFjKkNFRzIdeGX7iJdkKXaYlHZGcPXMMd
// SIG // 47iZbGzTtbAOvQjxBkAxHXoaZBQ7c6uo8YZD4VUui34c
// SIG // bZcTnsGm9oRD8tPvZf4Okkf5zrM4gWmgSmP9Y3+gnSpE
// SIG // L2BFU5Xf2TljiFat8KkU5yAQIdpaiOAxehMx8UEJyTGc
// SIG // wjvXa80wZQ8N78YyUqeWg5ixmn2EUgflePmiD15Zbp+5
// SIG // z3q2TYjiIkMmlAbyQazlhP9ZBhCffzuGoMUB2aulfeA3
// SIG // Eh30U7Spo7+Nt0Q+EBGI0hq5UMFBi00KJfOFoAmp32DL
// SIG // iblBLZDYRI20MVoNnNJ3hA/KiI4Zl5cGh+rwK1vzcNES
// SIG // JY4KCCfeB+LH9mGKfSANUixzxInyPaNn/1L4RVyN48Gf
// SIG // U1Epz+IoC5gJkh1nhgd3Fu+A4Syb/Afx
// SIG // End signature block
|
combined_dataset/train/non-malicious/817.ps1
|
817.ps1
|
function My-Function ($myInput)
{
My-Function $myInput
}
$things = 4
$things
My-Function $things
Write-Output "Hello World";
Get-ChildItem
gci
dir
Write-Host
Get-ChildItem
|
combined_dataset/train/non-malicious/4398.ps1
|
4398.ps1
|
function ValidateAndGet-RequiredModuleDetails
{
param(
[Parameter()]
$ModuleManifestRequiredModules,
[Parameter()]
[PSModuleInfo[]]
$RequiredPSModuleInfos,
[Parameter(Mandatory=$true)]
[string]
$Repository,
[Parameter(Mandatory=$true)]
[PSModuleInfo]
$DependentModuleInfo,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.PSCmdlet]
$CallerPSCmdlet,
[Parameter(Mandatory = $false)]
[pscredential]
$Credential
)
$RequiredModuleDetails = @()
if(-not $RequiredPSModuleInfos)
{
return $RequiredModuleDetails
}
if($ModuleManifestRequiredModules)
{
ForEach($RequiredModule in $ModuleManifestRequiredModules)
{
$ModuleName = $null
$VersionString = $null
$ReqModuleInfo = @{}
$FindModuleArguments = @{
Repository = $Repository
Verbose = $VerbosePreference
ErrorAction = 'SilentlyContinue'
WarningAction = 'SilentlyContinue'
Debug = $DebugPreference
}
if ($PSBoundParameters.ContainsKey('Credential'))
{
$FindModuleArguments.Add('Credential',$Credential)
}
if($RequiredModule.GetType().ToString() -eq 'System.Collections.Hashtable')
{
$ModuleName = $RequiredModule.ModuleName
if($RequiredModule.Keys -Contains "RequiredVersion")
{
$FindModuleArguments['RequiredVersion'] = $RequiredModule.RequiredVersion
$ReqModuleInfo['RequiredVersion'] = $RequiredModule.RequiredVersion
}
elseif($RequiredModule.Keys -Contains "ModuleVersion")
{
$FindModuleArguments['MinimumVersion'] = $RequiredModule.ModuleVersion
$ReqModuleInfo['MinimumVersion'] = $RequiredModule.ModuleVersion
}
if($RequiredModule.Keys -Contains 'MaximumVersion' -and $RequiredModule.MaximumVersion)
{
$maximumVersion = $RequiredModule.MaximumVersion -replace '\*','99999999'
$FindModuleArguments['MaximumVersion'] = $maximumVersion
$ReqModuleInfo['MaximumVersion'] = $maximumVersion
}
}
else
{
$ModuleName = $RequiredModule.ToString()
}
if((Get-ExternalModuleDependencies -PSModuleInfo $DependentModuleInfo) -contains $ModuleName)
{
Write-Verbose -Message ($LocalizedData.SkippedModuleDependency -f $ModuleName)
continue
}
if($RequiredPSModuleInfos.Name -notcontains $ModuleName)
{
continue
}
$ReqModuleInfo['Name'] = $ModuleName
$FindModuleArguments['Name'] = $ModuleName
$psgetItemInfo = Find-Module @FindModuleArguments |
Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $ModuleName} |
Microsoft.PowerShell.Utility\Select-Object -Last 1 -ErrorAction Ignore
if(-not $psgetItemInfo)
{
$message = $LocalizedData.UnableToResolveModuleDependency -f ($ModuleName, $DependentModuleInfo.Name, $Repository, $ModuleName, $Repository, $ModuleName, $ModuleName)
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "UnableToResolveModuleDependency" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidOperation
}
$RequiredModuleDetails += $ReqModuleInfo
}
}
else
{
$FindModuleArguments = @{
Repository = $Repository
Verbose = $VerbosePreference
ErrorAction = 'SilentlyContinue'
WarningAction = 'SilentlyContinue'
Debug = $DebugPreference
}
if ($PSBoundParameters.ContainsKey('Credential'))
{
$FindModuleArguments.Add('Credential',$Credential)
}
ForEach($RequiredModuleInfo in $RequiredPSModuleInfos)
{
$ModuleName = $requiredModuleInfo.Name
if((Get-ExternalModuleDependencies -PSModuleInfo $DependentModuleInfo) -contains $ModuleName)
{
Write-Verbose -Message ($LocalizedData.SkippedModuleDependency -f $ModuleName)
continue
}
$FindModuleArguments['Name'] = $ModuleName
$FindModuleArguments['MinimumVersion'] = $requiredModuleInfo.Version
$psgetItemInfo = Find-Module @FindModuleArguments |
Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $ModuleName} |
Microsoft.PowerShell.Utility\Select-Object -Last 1 -ErrorAction Ignore
if(-not $psgetItemInfo)
{
$message = $LocalizedData.UnableToResolveModuleDependency -f ($ModuleName, $DependentModuleInfo.Name, $Repository, $ModuleName, $Repository, $ModuleName, $ModuleName)
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "UnableToResolveModuleDependency" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidOperation
}
$RequiredModuleDetails += @{
Name=$_.Name
MinimumVersion=$_.Version
}
}
}
return $RequiredModuleDetails
}
|
combined_dataset/train/non-malicious/1416.ps1
|
1416.ps1
|
function Get-CIisConfigurationSection
{
[CmdletBinding(DefaultParameterSetName='Global')]
[OutputType([Microsoft.Web.Administration.ConfigurationSection])]
param(
[Parameter(Mandatory=$true,ParameterSetName='ForSite')]
[string]
$SiteName,
[Parameter(ParameterSetName='ForSite')]
[Alias('Path')]
[string]
$VirtualPath = '',
[Parameter(Mandatory=$true,ParameterSetName='ForSite')]
[Parameter(Mandatory=$true,ParameterSetName='Global')]
[string]
$SectionPath,
[Type]
$Type = [Microsoft.Web.Administration.ConfigurationSection]
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$mgr = New-Object 'Microsoft.Web.Administration.ServerManager'
$config = $mgr.GetApplicationHostConfiguration()
$section = $null
$qualifier = ''
try
{
if( $PSCmdlet.ParameterSetName -eq 'ForSite' )
{
$qualifier = Join-CIisVirtualPath $SiteName $VirtualPath
$section = $config.GetSection( $SectionPath, $Type, $qualifier )
}
else
{
$section = $config.GetSection( $SectionPath, $Type )
}
}
catch
{
}
if( $section )
{
$section | Add-IisServerManagerMember -ServerManager $mgr -PassThru
}
else
{
Write-Error ('IIS:{0}: configuration section {1} not found.' -f $qualifier,$SectionPath)
return
}
}
|
combined_dataset/train/non-malicious/1724.ps1
|
1724.ps1
|
function Get-ServiceNowRequest {
[OutputType([System.Management.Automation.PSCustomObject])]
[CmdletBinding(DefaultParameterSetName, SupportsPaging)]
Param(
[Parameter(Mandatory = $false)]
[string]$OrderBy = 'opened_at',
[Parameter(Mandatory = $false)]
[ValidateSet('Desc', 'Asc')]
[string]$OrderDirection = 'Desc',
[Parameter(Mandatory = $false)]
[int]$Limit,
[Parameter(Mandatory = $false)]
[Alias('Fields')]
[string[]]$Properties,
[Parameter(Mandatory = $false)]
[hashtable]$MatchExact = @{},
[Parameter(Mandatory = $false)]
[hashtable]$MatchContains = @{},
[Parameter(Mandatory = $false)]
[ValidateSet('true', 'false', 'all')]
[string]$DisplayValues = 'true',
[Parameter(ParameterSetName = 'SpecifyConnectionFields', Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[Alias('ServiceNowCredential')]
[PSCredential]$Credential,
[Parameter(ParameterSetName = 'SpecifyConnectionFields', Mandatory = $true)]
[ValidateScript({Test-ServiceNowURL -Url $_})]
[Alias('Url')]
[string]$ServiceNowURL,
[Parameter(ParameterSetName = 'UseConnectionObject', Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[hashtable]$Connection
)
$newServiceNowQuerySplat = @{
OrderBy = $OrderBy
MatchExact = $MatchExact
OrderDirection = $OrderDirection
MatchContains = $MatchContains
}
$Query = New-ServiceNowQuery @newServiceNowQuerySplat
$getServiceNowTableSplat = @{
Table = 'sc_request'
Query = $Query
Fields = $Properties
DisplayValues = $DisplayValues
}
if ($null -ne $PSBoundParameters.Connection) {
$getServiceNowTableSplat.Add('Connection', $Connection)
}
elseif ($null -ne $PSBoundParameters.Credential -and $null -ne $PSBoundParameters.ServiceNowURL) {
$getServiceNowTableSplat.Add('Credential', $Credential)
$getServiceNowTableSplat.Add('ServiceNowURL', $ServiceNowURL)
}
if ($PSBoundParameters.ContainsKey('Limit')) {
$getServiceNowTableSplat.Add('Limit', $Limit)
}
($PSCmdlet.PagingParameters | Get-Member -MemberType Property).Name | Foreach-Object {
$getServiceNowTableSplat.Add($_, $PSCmdlet.PagingParameters.$_)
}
$Result = Get-ServiceNowTable @getServiceNowTableSplat
If (-not $Properties) {
$Result | ForEach-Object {$_.PSObject.TypeNames.Insert(0, "ServiceNow.Request")}
}
$Result
}
|
combined_dataset/train/non-malicious/sample_67_8.ps1
|
sample_67_8.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIImEQYJKoZIhvcNAQcCoIImAjCCJf4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl
# RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT
# Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5
# eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW
# AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1
# PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD
# s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX
# ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w
# S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
# aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO
# 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j
# cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV
# HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf
# E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L
# fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t
# ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH
# g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1
# et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG
# azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz
# WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+
# DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS
# cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/
# OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU
# pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA
# vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA
# AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY
# mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g
# BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH
# AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl
# AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC
# lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz
# /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b
# jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9
# TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b
# 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9
# pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj
# ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol
# Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ
# 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN
# Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w
# 3gI/h+5WoezrtUyFMYIaBTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB
# IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ
# KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB
# gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq
# aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa
# gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy
# QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs
# 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6
# 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf
# L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4
# XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V
# pyexP/sw9u51ejlEtaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3
# DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRAB
# BKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8
# TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZpVevLD0GBMyMDI0MDcz
# MDE5NTUxOC41MTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy
# YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcx
# JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCC
# BQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0BAQsFADB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAz
# MDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL
# Ex5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB/DBboUow8WPO
# TPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn
# 9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWVATL7p8bbfnws
# c1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5hnd3VaGTepNq
# yakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e
# 1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4fPhHETnDC78T1
# yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEX
# PttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5hH2XMibzakbp
# 2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRbK5ldRYNAqddr
# /ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm
# 3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/JOQIDAQABo4IB
# STCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaA
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh
# bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH
# MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC
# MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
# SIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh
# +WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4NrertI6FI9rhjhe
# aKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55ESTWIBNaQS9C
# po2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL
# +ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJbKxLX8wHhsiwr
# iXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jPmaojZgXQO33X
# jxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJYyQQpETSflN36
# jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADl
# m5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitAsSLaVeMqoPi+
# NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4vY5zPmtNiVIc
# QnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWhxtmnN5HYCDCC
# B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw
# gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
# KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx
# MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry
# IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT
# cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx
# XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
# HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1
# KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s
# 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg
# fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3
# Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je
# 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY
# hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY
# P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC
# NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w
# HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB
# BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD
# CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T
# AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV
# HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w
# cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE
# TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC
# AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a
# ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp
# 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq
# 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
# woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG
# +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B
# FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77
# IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ
# fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K
# 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx
# yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB
# +aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEl
# MCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCABol1u1wwwYgU
# tUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6lOieTAiGA8yMDI0MDczMDE3MzM0NVoYDzIwMjQw
# NzMxMTczMzQ1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqU6J5AgEAMAcCAQAC
# AhE0MAcCAQACAhScMAoCBQDqVPP5AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBADm/nKYKO7UFEmtiuU+NNAoUFpbP6Bp+YD4+yvzNkZNC2mhem7NAJPp3aIVs
# O/4rRAXZ76a6fP0eZoGBFLY8mYSwacChPjPYAxgRS61LQRDPuOdiDq1pbIt9N0LS
# eu9Fr0KfRM8tR1dl689ppE4n/lUHENPu9Hfw/g9ro52EkJ0BesXyIcxu+rjmsFGz
# u52ovehaEZglqcGsfl9JGhX4y45VmAjyfkOLajv8c3y1iTPamXAWqXswE4SNr90X
# Im3GEwR3tLxNOr8mfR2kWZcckJYQa8Ic+uMBcxEW1e2s3VXgZXbcIbVSEWS/Vly9
# h/rs3my04a3q2NgrGmnC9vt4NckxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCC+Piq+HUIAKQ0eI5qj3KGh29Gcws15nub76iRtpq5vSzCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbdizXsz76h1Jdh
# LCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr
# 4BhstbbvOO0AAQAAAeswIgQgeKjzJACRRNIy1MLDAuGQ2mkH5mhDjJ+VYUI/jOsc
# AicwDQYJKoZIhvcNAQELBQAEggIALLyBl7RDLFMCUijmxRy5BFm3WHZPUmIVBCYW
# LLuXa/zh/eAMoTXhwBybbuYPOz1HQP7oHb4Ars1IvX42jmE3TYUHA4ika4lBjcoY
# 0as2smwwgKYxw/U69yc7ZWBcy9Xmg/VMne8EIDrtad9SBhG1sQCoeryX0gmlIBY9
# hbixGkJPxTRWiL6n68GLeVw5vEP+ZfFtWIKwG1LjOb8PzHl3LAk1ADUY0j8Qhvjv
# TAOmrLcXBqRWIYcTrcxVJZeVNZUPK4+MAbvdIr4fs5jR9F5Jncq71Th8F8MZLni7
# 93i1Gpx+s3mrzbukbzU6PdQ8bB5HJ7EVqQVEMPd96CrG/412Y3trsoYVqn+Nraj/
# 7QEv5A0byCoxShC5KypTRY4BEmERD/WdQU84iuzZ/4b8LspZ5W22sC4Cjrlg6PRT
# tMbXuAoyQgi2RwSPj2Zyltz4MprlwA7i9HHxiztgQIZwOBJZHKO4zAQaP0SXFhOt
# SZrGuslWouj/1e5wM80EpzfnxiHSZcDMuRSlnRcEFhIgydMOucMQiFBJh4p4qurk
# UIWbhLWToyB516wNihm9JAOvk4pWm7EW32w5AG3yQCu1MQiRne8EWyH7eInLzdeZ
# 46KI3Gzn7rmP7YaRKIVmhIzM9SHPy/6kLYnVi5NNBLJ0BPC6xIC6D7/xxOPb8mC1
# Cb2ioVU=
# SIG # End signature block
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.