full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_57_91.ps1
|
sample_57_91.ps1
|
#
# Module manifest for module 'OCI.PSModules.Databasemanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Databasemanagement.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '0faf82fb-82c6-40fe-bbd2-87626481a704'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Databasemanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabasemanagementDataFiles',
'Add-OCIDatabasemanagementManagedDatabaseToManagedDatabaseGroup',
'Add-OCIDatabasemanagementmTasks',
'Confirm-OCIDatabasemanagementBasicFilter',
'Disable-OCIDatabasemanagementAutomaticInitialPlanCapture',
'Disable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask',
'Disable-OCIDatabasemanagementExternalContainerDatabaseManagementFeature',
'Disable-OCIDatabasemanagementExternalDbSystemDatabaseManagement',
'Disable-OCIDatabasemanagementExternalDbSystemStackMonitoring',
'Disable-OCIDatabasemanagementExternalExadataInfrastructureManagement',
'Disable-OCIDatabasemanagementExternalNonContainerDatabaseManagementFeature',
'Disable-OCIDatabasemanagementExternalPluggableDatabaseManagementFeature',
'Disable-OCIDatabasemanagementFeature',
'Disable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask',
'Disable-OCIDatabasemanagementPluggableDatabaseManagementFeature',
'Disable-OCIDatabasemanagementSqlPlanBaselinesUsage',
'Edit-OCIDatabasemanagementFeature',
'Edit-OCIDatabasemanagementPluggableDatabaseManagementFeature',
'Edit-OCIDatabasemanagementSnapshotSettings',
'Enable-OCIDatabasemanagementAutomaticInitialPlanCapture',
'Enable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask',
'Enable-OCIDatabasemanagementExternalContainerDatabaseManagementFeature',
'Enable-OCIDatabasemanagementExternalDbSystemDatabaseManagement',
'Enable-OCIDatabasemanagementExternalDbSystemStackMonitoring',
'Enable-OCIDatabasemanagementExternalExadataInfrastructureManagement',
'Enable-OCIDatabasemanagementExternalNonContainerDatabaseManagementFeature',
'Enable-OCIDatabasemanagementExternalPluggableDatabaseManagementFeature',
'Enable-OCIDatabasemanagementFeature',
'Enable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask',
'Enable-OCIDatabasemanagementPluggableDatabaseManagementFeature',
'Enable-OCIDatabasemanagementSqlPlanBaselinesUsage',
'Get-OCIDatabasemanagementAlertLogsList',
'Get-OCIDatabasemanagementAsmPropertiesList',
'Get-OCIDatabasemanagementAssociatedDatabasesList',
'Get-OCIDatabasemanagementAttentionLogsList',
'Get-OCIDatabasemanagementAwrDbReport',
'Get-OCIDatabasemanagementAwrDbsList',
'Get-OCIDatabasemanagementAwrDbSnapshotsList',
'Get-OCIDatabasemanagementAwrDbSqlReport',
'Get-OCIDatabasemanagementClusterCacheMetric',
'Get-OCIDatabasemanagementConsumerGroupPrivilegesList',
'Get-OCIDatabasemanagementCursorCacheStatementsList',
'Get-OCIDatabasemanagementDataAccessContainersList',
'Get-OCIDatabasemanagementDatabaseFleetHealthMetrics',
'Get-OCIDatabasemanagementDatabaseHomeMetrics',
'Get-OCIDatabasemanagementDatabaseParametersList',
'Get-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Get-OCIDatabasemanagementDbManagementPrivateEndpointsList',
'Get-OCIDatabasemanagementExecutionPlanStatsComparision',
'Get-OCIDatabasemanagementExternalAsm',
'Get-OCIDatabasemanagementExternalAsmConfiguration',
'Get-OCIDatabasemanagementExternalAsmDiskGroupsList',
'Get-OCIDatabasemanagementExternalAsmInstance',
'Get-OCIDatabasemanagementExternalAsmInstancesList',
'Get-OCIDatabasemanagementExternalAsmsList',
'Get-OCIDatabasemanagementExternalAsmUsersList',
'Get-OCIDatabasemanagementExternalCluster',
'Get-OCIDatabasemanagementExternalClusterInstance',
'Get-OCIDatabasemanagementExternalClusterInstancesList',
'Get-OCIDatabasemanagementExternalClustersList',
'Get-OCIDatabasemanagementExternalDatabasesList',
'Get-OCIDatabasemanagementExternalDbHome',
'Get-OCIDatabasemanagementExternalDbHomesList',
'Get-OCIDatabasemanagementExternalDbNode',
'Get-OCIDatabasemanagementExternalDbNodesList',
'Get-OCIDatabasemanagementExternalDbSystem',
'Get-OCIDatabasemanagementExternalDbSystemConnector',
'Get-OCIDatabasemanagementExternalDbSystemConnectorsList',
'Get-OCIDatabasemanagementExternalDbSystemDiscoveriesList',
'Get-OCIDatabasemanagementExternalDbSystemDiscovery',
'Get-OCIDatabasemanagementExternalDbSystemsList',
'Get-OCIDatabasemanagementExternalExadataInfrastructure',
'Get-OCIDatabasemanagementExternalExadataInfrastructuresList',
'Get-OCIDatabasemanagementExternalExadataStorageConnector',
'Get-OCIDatabasemanagementExternalExadataStorageConnectorsList',
'Get-OCIDatabasemanagementExternalExadataStorageGrid',
'Get-OCIDatabasemanagementExternalExadataStorageServer',
'Get-OCIDatabasemanagementExternalExadataStorageServersList',
'Get-OCIDatabasemanagementExternalListener',
'Get-OCIDatabasemanagementExternalListenerServicesList',
'Get-OCIDatabasemanagementExternalListenersList',
'Get-OCIDatabasemanagementHeatWaveFleetMetric',
'Get-OCIDatabasemanagementIormPlan', 'Get-OCIDatabasemanagementJob',
'Get-OCIDatabasemanagementJobExecution',
'Get-OCIDatabasemanagementJobExecutionsList',
'Get-OCIDatabasemanagementJobRun',
'Get-OCIDatabasemanagementJobRunsList',
'Get-OCIDatabasemanagementJobsList',
'Get-OCIDatabasemanagementManagedDatabase',
'Get-OCIDatabasemanagementManagedDatabaseGroup',
'Get-OCIDatabasemanagementManagedDatabaseGroupsList',
'Get-OCIDatabasemanagementManagedDatabasesList',
'Get-OCIDatabasemanagementManagedMySqlDatabase',
'Get-OCIDatabasemanagementManagedMySqlDatabaseConfigurationDataList',
'Get-OCIDatabasemanagementManagedMySqlDatabasesList',
'Get-OCIDatabasemanagementManagedMySqlDatabaseSqlDataList',
'Get-OCIDatabasemanagementMySqlFleetMetric',
'Get-OCIDatabasemanagementNamedCredential',
'Get-OCIDatabasemanagementNamedCredentialsList',
'Get-OCIDatabasemanagementObjectPrivilegesList',
'Get-OCIDatabasemanagementOpenAlertHistory',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecution',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionScript',
'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionsList',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionAggregationsList',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperation',
'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperationsList',
'Get-OCIDatabasemanagementPdbMetrics',
'Get-OCIDatabasemanagementPreferredCredential',
'Get-OCIDatabasemanagementPreferredCredentialsList',
'Get-OCIDatabasemanagementProxiedForUsersList',
'Get-OCIDatabasemanagementProxyUsersList',
'Get-OCIDatabasemanagementRolesList',
'Get-OCIDatabasemanagementSqlExecutionPlan',
'Get-OCIDatabasemanagementSqlPlanBaseline',
'Get-OCIDatabasemanagementSqlPlanBaselineConfiguration',
'Get-OCIDatabasemanagementSqlPlanBaselineJobsList',
'Get-OCIDatabasemanagementSqlPlanBaselinesList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskFindingsList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskRecommendationsList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTasksList',
'Get-OCIDatabasemanagementSqlTuningAdvisorTaskSummaryReport',
'Get-OCIDatabasemanagementSqlTuningSetsList',
'Get-OCIDatabasemanagementSystemPrivilegesList',
'Get-OCIDatabasemanagementTablespace',
'Get-OCIDatabasemanagementTablespacesList',
'Get-OCIDatabasemanagementTableStatisticsList',
'Get-OCIDatabasemanagementTopSqlCpuActivity',
'Get-OCIDatabasemanagementUser',
'Get-OCIDatabasemanagementUsersList',
'Get-OCIDatabasemanagementWorkRequest',
'Get-OCIDatabasemanagementWorkRequestErrorsList',
'Get-OCIDatabasemanagementWorkRequestLogsList',
'Get-OCIDatabasemanagementWorkRequestsList',
'Invoke-OCIDatabasemanagementCheckExternalDbSystemConnectorConnectionStatus',
'Invoke-OCIDatabasemanagementCheckExternalExadataStorageConnector',
'Invoke-OCIDatabasemanagementCloneSqlTuningTask',
'Invoke-OCIDatabasemanagementConfigureAutomaticCaptureFilters',
'Invoke-OCIDatabasemanagementConfigureAutomaticSpmEvolveAdvisorTask',
'Invoke-OCIDatabasemanagementDiscoverExternalExadataInfrastructure',
'Invoke-OCIDatabasemanagementDropSqlPlanBaselines',
'Invoke-OCIDatabasemanagementDropSqlsInSqlTuningSet',
'Invoke-OCIDatabasemanagementDropSqlTuningSet',
'Invoke-OCIDatabasemanagementDropSqlTuningTask',
'Invoke-OCIDatabasemanagementDropTablespace',
'Invoke-OCIDatabasemanagementFetchSqlTuningSet',
'Invoke-OCIDatabasemanagementImplementOptimizerStatisticsAdvisorRecommendations',
'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromAwr',
'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromCursorCache',
'Invoke-OCIDatabasemanagementLoadSqlTuningSet',
'Invoke-OCIDatabasemanagementPatchExternalDbSystemDiscovery',
'Invoke-OCIDatabasemanagementResizeDataFile',
'Invoke-OCIDatabasemanagementRunHistoricAddm',
'Invoke-OCIDatabasemanagementSaveSqlTuningSetAs',
'Invoke-OCIDatabasemanagementSummarizeAlertLogCounts',
'Invoke-OCIDatabasemanagementSummarizeAttentionLogCounts',
'Invoke-OCIDatabasemanagementSummarizeAwrDbCpuUsages',
'Invoke-OCIDatabasemanagementSummarizeAwrDbMetrics',
'Invoke-OCIDatabasemanagementSummarizeAwrDbParameterChanges',
'Invoke-OCIDatabasemanagementSummarizeAwrDbParameters',
'Invoke-OCIDatabasemanagementSummarizeAwrDbSnapshotRanges',
'Invoke-OCIDatabasemanagementSummarizeAwrDbSysstats',
'Invoke-OCIDatabasemanagementSummarizeAwrDbTopWaitEvents',
'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEventBuckets',
'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEvents',
'Invoke-OCIDatabasemanagementSummarizeExternalAsmMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalClusterMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalDbNodeMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalDbSystemAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeExternalListenerMetrics',
'Invoke-OCIDatabasemanagementSummarizeJobExecutionsStatuses',
'Invoke-OCIDatabasemanagementSummarizeManagedDatabaseAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeManagedMySqlDatabaseAvailabilityMetrics',
'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselines',
'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselinesByLastExecution',
'Invoke-OCIDatabasemanagementTestNamedCredential',
'Invoke-OCIDatabasemanagementTestPreferredCredential',
'Move-OCIDatabasemanagementDatabaseParameters',
'Move-OCIDatabasemanagementDbManagementPrivateEndpointCompartment',
'Move-OCIDatabasemanagementExternalDbSystemCompartment',
'Move-OCIDatabasemanagementExternalExadataInfrastructureCompartment',
'Move-OCIDatabasemanagementJobCompartment',
'Move-OCIDatabasemanagementManagedDatabaseGroupCompartment',
'Move-OCIDatabasemanagementNamedCredentialCompartment',
'Move-OCIDatabasemanagementPlanRetention',
'Move-OCIDatabasemanagementSpaceBudget',
'Move-OCIDatabasemanagementSqlPlanBaselinesAttributes',
'New-OCIDatabasemanagementAwrSnapshot',
'New-OCIDatabasemanagementDbManagementPrivateEndpoint',
'New-OCIDatabasemanagementExternalDbSystem',
'New-OCIDatabasemanagementExternalDbSystemConnector',
'New-OCIDatabasemanagementExternalDbSystemDiscovery',
'New-OCIDatabasemanagementExternalExadataInfrastructure',
'New-OCIDatabasemanagementExternalExadataStorageConnector',
'New-OCIDatabasemanagementJob',
'New-OCIDatabasemanagementManagedDatabaseGroup',
'New-OCIDatabasemanagementNamedCredential',
'New-OCIDatabasemanagementSqlTuningSet',
'New-OCIDatabasemanagementTablespace',
'Remove-OCIDatabasemanagementDataFile',
'Remove-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Remove-OCIDatabasemanagementExternalDbSystem',
'Remove-OCIDatabasemanagementExternalDbSystemConnector',
'Remove-OCIDatabasemanagementExternalDbSystemDiscovery',
'Remove-OCIDatabasemanagementExternalExadataInfrastructure',
'Remove-OCIDatabasemanagementExternalExadataStorageConnector',
'Remove-OCIDatabasemanagementJob',
'Remove-OCIDatabasemanagementManagedDatabaseFromManagedDatabaseGroup',
'Remove-OCIDatabasemanagementManagedDatabaseGroup',
'Remove-OCIDatabasemanagementNamedCredential',
'Remove-OCIDatabasemanagementPreferredCredential',
'Reset-OCIDatabasemanagementDatabaseParameters',
'Start-OCIDatabasemanagementSqlTuningTask',
'Update-OCIDatabasemanagementDbManagementPrivateEndpoint',
'Update-OCIDatabasemanagementExternalAsm',
'Update-OCIDatabasemanagementExternalAsmInstance',
'Update-OCIDatabasemanagementExternalCluster',
'Update-OCIDatabasemanagementExternalClusterInstance',
'Update-OCIDatabasemanagementExternalDbHome',
'Update-OCIDatabasemanagementExternalDbNode',
'Update-OCIDatabasemanagementExternalDbSystem',
'Update-OCIDatabasemanagementExternalDbSystemConnector',
'Update-OCIDatabasemanagementExternalDbSystemDiscovery',
'Update-OCIDatabasemanagementExternalExadataInfrastructure',
'Update-OCIDatabasemanagementExternalExadataStorageConnector',
'Update-OCIDatabasemanagementExternalExadataStorageGrid',
'Update-OCIDatabasemanagementExternalExadataStorageServer',
'Update-OCIDatabasemanagementExternalListener',
'Update-OCIDatabasemanagementJob',
'Update-OCIDatabasemanagementManagedDatabase',
'Update-OCIDatabasemanagementManagedDatabaseGroup',
'Update-OCIDatabasemanagementNamedCredential',
'Update-OCIDatabasemanagementPreferredCredential',
'Update-OCIDatabasemanagementTablespace'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4094.ps1
|
4094.ps1
|
cls
Function AutoCAD2013English{
Set-Variable -Name GUID -Value "{5783F2D7-B001-0000-0102-0060B0CE6BBA}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "AutoCAD 2013 - English"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskRevitInteroperabilityfor3dsMaxand3dsMaxDesign201364-bit{
Set-Variable -Name GUID -Value "{06E18300-BB64-1664-8E6A-2593FC67BB74}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Revit Interoperability for 3ds Max and 3ds Max Design 2013 64-bit"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskShowcase201364-bit{
Set-Variable -Name GUID -Value "{A15BFC7D-6A90-47E6-8C6E-D51B2929D8C8}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Showcase 2013 64-bit"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskDirectConnect201364-bit{
Set-Variable -Name GUID -Value "{324297F8-2898-454B-9AC4-07050AEB35B3}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk DirectConnect 2013 64-bit"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskSketchBookDesigner2013{
Set-Variable -Name GUID -Value "{3CB60177-D3D2-4E9C-BE4D-8372B34B4C7F}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk SketchBook Designer 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskDesignReview201332-bit{
Set-Variable -Name GUID -Value "{153DB567-6FF3-49AD-AC4F-86F8A3CCFDFB}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Design Review 2013 *32-bit*"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskInventorFusion2013{
Set-Variable -Name GUID -Value "{FFF5619F-2013-0064-A85E-9994F70A9E5D}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Inventor Fusion 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskMaterialLibrary201332-bit{
Set-Variable -Name GUID -Value "{117EBEEB-5DB0-43C8-9FD6-DD583DB152DD}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Material Library 2013 *32-bit*"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskMaterialLibraryBaseResolutionImageLibrary2013{
Set-Variable -Name GUID -Value "{606E12B9-641F-4644-A22A-FF38AE980AFD}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Material Library Base Resolution Image Library 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskMaterialLibraryLowResolutionImageLibrary2013{
Set-Variable -Name GUID -Value "{27C6C0A2-2EC9-4FEA-BE2B-659EAAC2C68C}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Material Library Low Resolution Image Library 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskMaterialLibraryMediumResolutionImageLibrary2013{
Set-Variable -Name GUID -Value "{58760EEC-8B6A-43F4-81AA-696E381DFADD}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Material Library Medium Resolution Image Library 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskContentService{
Set-Variable -Name GUID -Value "{62F029AB-85F2-0000-866A-9FC0DD99DDBC}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Content Service"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskSync{
Set-Variable -Name GUID -Value "{EE5F74BC-5CD5-4EF2-86BA-81E6CF46A18F}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Sync"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskRevit2013{
Set-Variable -Name GUID -Value "{7346B4A0-1300-0510-0409-705C0D862004}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Revit 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutoCADArchitecture2013{
Set-Variable -Name GUID -Value "{5783F2D7-B004-0000-0102-0060B0CE6BBA}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "AutoCAD Architecture 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate2013{
Set-Variable -Name GUID -Value "{F17E30E2-7ED4-0000-8A8E-CAB597E3F8ED}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskWorkflowsBuildingDesignSuite2013{
Set-Variable -Name GUID -Value "{06388E0D-A364-478B-8E40-7D76142A8DF2}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Workflows - Building Design Suite 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132008DWGFileReader{
Set-Variable -Name GUID -Value "{4F744A9A-3067-4605-8864-DA1658059F0B}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2008 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132009DWGFileReader{
Set-Variable -Name GUID -Value "{07DC9A9D-1793-4EB4-AC1A-70750F9FB72B}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2009 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132010DWGFileReader{
Set-Variable -Name GUID -Value "{0D53A298-B2B7-4746-BB92-B757A6E559C3}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2010 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132011DWGFileReader{
Set-Variable -Name GUID -Value "{107CB1E9-DDA9-40B5-8A6D-325361402200}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2011 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function Revit2013LanguagePackEnglish{
Set-Variable -Name GUID -Value "{7346B4A0-1300-0511-0409-705C0D862004}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Revit 2013 Language Pack - English"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132012DWGFileReader{
Set-Variable -Name GUID -Value "{90A2F9D3-3E5E-4EF4-BC83-E7795CEF1A42}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2012 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate20132013DWGFileReader{
Set-Variable -Name GUID -Value "{CBED6FC7-FB20-4920-AA80-3D6F3459F902}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 - 2013 DWG File Reader"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskNavisworksSimulate2013EnglishLanguagePack{
Set-Variable -Name GUID -Value "{F17E30E2-7ED4-0409-8A8E-CAB597E3F8ED}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Navisworks Simulate 2013 English Language Pack"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
Function AutodeskSimulationCFD2013{
Set-Variable -Name GUID -Value "{1C11BFF1-1FA3-4AA9-AA15-9AA2BB921F9E}" -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Write-Host "Autodesk Simulation CFD 2013"
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
(Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
}
AutoCAD2013English
AutodeskRevitInteroperabilityfor3dsMaxand3dsMaxDesign201364-bit
AutodeskShowcase201364-bit
AutodeskDirectConnect201364-bit
AutodeskSketchBookDesigner2013
AutodeskDesignReview201332-bit
AutodeskInventorFusion2013
AutodeskMaterialLibrary201332-bit
AutodeskMaterialLibraryBaseResolutionImageLibrary2013
AutodeskMaterialLibraryLowResolutionImageLibrary2013
AutodeskMaterialLibraryMediumResolutionImageLibrary2013
AutodeskContentService
AutodeskSync
AutodeskRevit2013
AutoCADArchitecture2013
AutodeskNavisworksSimulate2013
AutodeskWorkflowsBuildingDesignSuite2013
AutodeskNavisworksSimulate20132008DWGFileReader
AutodeskNavisworksSimulate20132009DWGFileReader
AutodeskNavisworksSimulate20132010DWGFileReader
AutodeskNavisworksSimulate20132011DWGFileReader
Revit2013LanguagePackEnglish
AutodeskNavisworksSimulate20132012DWGFileReader
AutodeskNavisworksSimulate20132013DWGFileReader
AutodeskNavisworksSimulate2013EnglishLanguagePack
AutodeskSimulationCFD2013
|
combined_dataset/train/non-malicious/GPRS Online log_6.ps1
|
GPRS Online log_6.ps1
|
<#
.SYNOPSIS
Get-GprsTime (V4.0 Update for Windows 7 and allow time correction) Check the
total connect time of any GPRS devices from a specified date.
Use 'Get-Help .\\Get-GprsTime -full' to view Help for this script.
.DESCRIPTION
Display all the GPRS modem Event Log entries. While applications issued by the
mobile phone manufacturers will invariably monitor only their own usage, this
will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc.
Use the -Verbose switch for some extra information if desired. A default value
can be set with the -Monthly switch but can be temporarily overridden with any
-Start value and deleted by entering an invalid date. Now uses .NET Parse to
use any culture date input. Switches -M and -S cannot be used together.
A Balloon prompt will be issued in the Notification area for the 5 days
before the nominal month end.
NOTE: this can effectively be suppressed by using a value higher than the SIM
card term, ie something like -Account 90 for a 30 day card which will override
the default setting.
Define a function in $profile to set any permanent switches, for example to
remove 1hour 15 minutes from the total each time.
function GPRS {
Invoke-Expression ".\\Get-GprsTime -Adjust 1:15:00- $args"
}
.EXAMPLE
.\\Get-GprsTime.ps1 -Monthly 4/8/2011
This will set the default search date to start from 4/8/2011 and is used to
reset the start date each month for the average 30/31 day SIM card.
.EXAMPLE
.\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose
Search from 12/07/2011 and also show (Verbose) details for each session. The
Account switch will override any balloon prompt near the SIM expiry date.
.EXAMPLE
.\\Get-GprsTime.ps1 5/9/2011 -v
Search one day only and show session details.
.EXAMPLE
.\\Get-GprsTime.ps1 -Today
Show all sessions for today. This always defaults to verbose output.
.EXAMPLE
.\\Get-GprsTime.ps1 -Debug
This shows the first available Event Log record & confirms switch settings.
(Note that it will probably not be the first 'RemoteAccess' or 'RasClient'
record).
.EXAMPLE
.\\Get-GprsTime -Adjust 1:20:00
If the same SIM card is used on another computer then such times will have
to be added here manually (this should be put in a function in $profile so
that it will automatically be included - see example above).
To remove an amount of time, just put a '-' sign after the desired figure.
.NOTES
A shorter total time than that actually used will result if the Event Log
does not contain earlier dates; just increase the log size in such a case.
The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a
(binary compiled) Module version of this procedure is included in the file
Gprs3xxx.zip download there; the execution time of the module being about
10 times faster than this script.
Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times.
For the Event Log to record connect & disconnect events, the modem software
should be set to RAS rather than NDIS if possible.
#>
Param ([String] $start,
[alias("PERIOD")][string] $adjust,
[String] $monthly,
[Int] $account = 0,
[Switch] $today,
[Switch] $verbose,
[Switch] $debug)
Trap [System.Management.Automation.MethodInvocationException] {
[Int]$line = $error[0].InvocationInfo.ScriptLineNumber
[System.Media.SystemSounds]::Hand.Play()
if ($line -eq 205) {
Write-Warning "[$name] Current GPRS variable has been deleted."
$monthly = ""
[Environment]::SetEnvironmentVariable("GPRS",$monthly,"User")
}
else {
Write-Warning "[$name] Date is missing or invalid $SCRIPT:form"
}
exit 1
}
#Establish the Operating System...We only need to confirm XP here.
#The result will be written to the 'out' variable '$osv'.
function Get-OSVersion($computer,[ref]$osv) {
$os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer
Switch -regex ($os.Version) {
'^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants.
default { $osv.value = "unknown" }
}
}
$osv = $null
Get-OSVersion -computer 'localhost' -osv ([ref]$osv)
if ($osv -eq 'xp') {
$logname = 'System'
$connEvent = 20158
$discEvent = 20159
$source = 'RemoteAccess'
}
else { #Treat As Vista or Windows 7.
$logname = 'Application'
$connEvent = 20225
$discEvent = 20226
$source = 'RasClient'
}
$entryType = 'Information'
$logEntry = $null
$oldest = Get-eventlog -LogName $logname | #Get the earliest Log record.
Sort-Object TimeGenerated |
Select-Object -first 1
if ($oldest.TimeGenerated) {
$logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())"
}
$name = $myInvocation.MyCommand
$newLine = "[$name] The switches -Start and -Monthly can only be used separately."
if ($debug) {
$DebugPreference = 'Continue'
}
if ($start -and $monthly) {
[System.Media.SystemSounds]::Hand.Play()
Write-Warning "$newLine"
exit 1
}
$SCRIPT:form = ""
#In certain cases Culture & UICulture can be different and have been known to
# return conflicting results regarding '-is [DateTime]' queries, etc.
if ($Host.CurrentCulture -eq $Host.CurrentUICulture) {
$SCRIPT:form = '-Use format mm/dd/year'
[Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day.
if ($culture -eq 6) {
$SCRIPT:form = '-Use format dd/mm/year'
}
}
$ErrorActionPreference = 'SilentlyContinue'
$VerbosePreference = 'SilentlyContinue'
$WarningPreference = 'Continue'
$conn = $disc = $default = $print = $null
$timeNow = [DateTime]::Now
$total = $timeNow - $timeNow #Set initial value to 00:00:00.
$insert = "since"
if ($verbose) {
$VerbosePreference = 'Continue'
}
function CreditMsg ($value, $value2) {
$value = [Math]::Abs($value)
$prefix = "CURRENT"
[DateTime] $creditDT = $value2
$creditDT = $creditDT.AddDays($value) #Add the -Account days.
$thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format.
#If we use '$number = $creditDT - (Get-Date)' instead of the line below we
#can sometimes get a value of 1 returned instead 2, hence the above lines.
$number = $creditDT - [DateTime] $thisDay
[String] $credit = $creditDT
$credit = $credit.Replace('00:00:00','') #Remove any trailing time.
$credit = "{0:d}" -f [DateTime]$credit
Switch($number.Days) {
1 {$prefix = "($value days) will expire tomorrow"; break}
0 {$prefix = "($value days) will expire today"; break}
-1 {$prefix = "($value days) expired yesterday"; break}
{($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break}
{($_ -le 5)} {$prefix = "($value days) will expire on $credit"}
Default {$prefix = "CURRENT"} #Only come here if over 5 days.
}
return $prefix
}
function Interval ([String] $value) {
Switch -regex ($value) {
'^00?:00?:\\d+(.*)$' {$suffix = "seconds"; break}
'^00?:\\d+:\\d+(.*)$' {$suffix = "minutes"; break}
'^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break}
'^(\\d+)\\D(\\d+)(.*)$' {$suffix = " hours"
$pDays = $matches[1]
$pHours = $matches[2]
[string]$pMinSec = $matches[3]
[string]$tHours = (([int]$pDays) * 24)+[int]$pHours
$value = $tHours + $pminSec; break}
default {$suffix = " hours"} #Should never come here!
}
return "$value $suffix"
}
function CheckSetting ($value) {
if ($value) { #Correct for local culture.
$print = $default.ToShortDateString()
}
else {
$print = "(Value not set)"
}
return $print
}
#The Script effectively starts here.............................................
$getGprs = [Environment]::GetEnvironmentVariable("GPRS","User")
#First check for GPRS variable and change from US date format to current locale.
if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid.
$default = "{0:d}" -f [datetime]$getGprs
$default = [DateTime]::Parse($default)
$checkParts = "{0:yyyy},{0:%M}" -f $default
$times = $checkParts.Split(',')
$dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31.
if($account -eq 0) {
$account = $dayCount
$summary = "$($dayCount.ToString()) days"
}
else {
$summary = "$($account.Tostring()) days"
}
$text = CreditMsg $account $getGprs #Check if within 5 days of expiry date.
if ($text -ne "CURRENT") {
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
$objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon
$objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation
$objNotifyIcon.BalloonTipIcon = "Info"
$objNotifyIcon.BalloonTipTitle = "GPRS online account"
$objNotifyIcon.BalloonTipText = "Credit $text"
$objNotifyIcon.Visible = $True
$objNotifyIcon.ShowBalloonTip(10000)
}
}
else {
$summary = "(Days not set)"
if ((!$today) -and (!$monthly) -and (!$start)) {
[System.Media.SystemSounds]::Hand.Play()
Write-Warning("Monthly date is either invalid or not set.")
exit 1
}
}
if ($start) {
$start = [DateTime]::Parse($start) #Trigger TRAP if invalid!
[DateTime]$limit = $start
$convert = "{0:D}" -f $limit
$print = CheckSetting $default
}
if ($monthly) {
$start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid!
Write-Output "Setting GPRS (monthly) environment variable to: $monthly"
$gprs = [String]$start.Replace('00:00:00','')
[Environment]::SetEnvironmentVariable("GPRS",$gprs,"User")
[DateTime] $limit = $start #Change to required US date format.
$convert = "{0:D}" -f $limit
$print = $limit.ToShortDateString()
$summary = "(Days undetermined)" #Will show next time around.
}
if ($today) {
$verBosePreference = 'Continue' #Show VERBOSE by default.
[DateTime] $limit = (Get-Date)
$convert = "{0:D}" -f $limit
$limit = $limit.Date #Override any start date if using -Today input.
$insert = "for today"
$print = CheckSetting $default
}
if ((!$today) -and (!$monthly) -and (!$start)) {
if ($default) {
$monthly = $default
[DateTime] $limit = $monthly
$convert = "{0:D}" -f $limit
$print = CheckSetting $default
}
}
$adjustment = $null #Otherwise 'Set-Strictmode -Version latest' will catch.
if ($adjust) {
$pattern = '^(\\d{1,3}):(\\d{1,2}):(\\d{1,2})-?$'
if ($adjust -notmatch $pattern ) {
Write-Warning "Invalid format - use <hours>:<minutes>:<seconds>"
return
} #Now create the 'adjustment' to add later.
$adjustment = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3]
$outString = $adjust.Replace('-','')
$outString = interval $outString
}
Write-Verbose "All records $($insert.Replace('for ','')) - $convert"
Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]"
Write-Output ""
Write-Output "Calculating total connect time of all GPRS modem devices..."
#We cannot proceed beyond here without a valid $limit value.
Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print"
if ($logEntry) {
Write-Debug "$logEntry"
}
$lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and `
($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)}
if ($lines) {
Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log."
}
else {
Write-Output "(There are no events indicated in the System Event Log)"
}
$lines | ForEach-Object {
try {
$source = $_.Source
}
catch {
return
}
if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect.
$disc = $_.TimeGenerated
}
else { #Event 20158 is Connect.
$conn = $_.TimeGenerated
} #We are only interested in matching pairs of DISC/CONN...
if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) {
$diff = $disc - $conn
$total += $diff
$convDisc = "{0:G}" -f $disc
$convConn = "{0:G}" -f $conn
$period = Interval $diff
Write-Verbose "Disconnect at $convDisc. Online - $period"
Write-Verbose " Connect at $convConn."
}
} #End ForEach
if (!$source) {
$source = '(Undetermined)'
}
Write-Verbose "Using local event source - System Event Log [$source]"
$period = Interval $total
function formatSpan ($timespan) { #Convert returns of '1.11:00:00'.
$addHours = $timespan.Days * 24
$addHours+= $timespan.Hours
$h = $addHours.ToString().PadLeft(2,'0') + ':'
$m = $timespan.Minutes.ToString().PadLeft(2,'0') + ':'
$s = $timespan.Seconds.ToString().PadLeft(2,'0')
return $h + $m + $s
}
if ($adjustment -and ($total -match $pattern)) {
$outDate = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3]
if (!$adjust.EndsWith('-')) {
$period = $outDate + $adjustment #The '-adjust' value added at start.
$show = formatSpan $period
$show = interval $show #Get hours,minutes suffix.
Write-Output "Total online usage $insert $convert is $show"
Write-Output "(Including $($outString.Replace(' ',' ')) adjustment time)"
}
else {
if ($outDate.TotalSeconds -gt $adjustment.TotalSeconds) {
$period = $outDate - $adjustment
$show = formatSpan $period
$show = interval $show
Write-Output "Total online usage $insert $convert is $show"
Write-Output "(Excluding $($outString.Replace(' ',' ')) adjustment time)"
}
else {
Write-Output "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))."
$adjust = $adjust.Replace('-','')
Write-Warning "Invalid amount entered ($adjust) - no adjustment performed"
}
}
}
else {
Write-OutPut "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))."
}
Write-Output ""
|
combined_dataset/train/non-malicious/sample_65_60.ps1
|
sample_65_60.ps1
|
<#
.SYNOPSIS
Queries and exports attached peripheral information
.DESCRIPTION
Queries and exports attached peripheral information for use in Microsoft Teams Bring Your Own Device (BYOD)
data entry in the Pro Management Portal (PMP) for enhanced reporting
.EXAMPLE
.\Get-TeamsBYODRoomDevices.ps1
.NOTES
Version: 1.0
Author: andthom@microsoft.com, rowille@microsoft.com
Creation Date: March 2024
#>
## Disclaimer
# (c)2024 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document,
# including URL and other Internet Web site references, may change without notice. You bear the risk of using it.
# This document does not provide you with any legal rights to any intellectual property in any Microsoft product.
# You may copy and use this document for your internal, reference purposes. You may modify this document for your internal purposes.
$CurrentDevices = [Collections.Generic.HashSet[string]]::new([string[]]@((Get-PnpDevice -PresentOnly).DeviceID), [StringComparer]::OrdinalIgnoreCase)
while ($true) {
Write-Host "Found $($CurrentDevices.Count) devices currently."
Write-Host "Please Connect The BYOD Room Devices Now"
$null = Read-Host "Press Enter When Ready"
Write-Host "Waiting 15 seconds for devices to be ready..."
Start-Sleep -Seconds 15
Write-Host "Checking for new devices..."
$NewDevices = [Collections.Generic.HashSet[string]]::new([string[]]@((Get-PnpDevice -PresentOnly).DeviceID), [StringComparer]::OrdinalIgnoreCase)
$NewDevices.ExceptWith($CurrentDevices)
if (!$NewDevices.Count) {
Write-Host "No new devices found, Are you sure you connected the devices when prompted?" -ForegroundColor Red
if (!$env:RUN_FOR_ALL_DEVICES -or $env:RUN_FOR_ALL_DEVICES -eq '0') { return }
$NewDevices = $CurrentDevices
}
Write-Host "Found $($NewDevices.Count) new devices, getting device information..."
$UPN = $null
$DisplayName = $null
$GroupID = $null
while (!$UPN) {
$UPN = Read-Host "Enter the BYOD Room Account's User Principal Name (UPN)"
}
$DisplayName = Read-Host "Enter the BYOD Room Account's Display Name (default: none)"
$GroupID = Read-Host "Enter the Grouping ID to use for this data collection (default: none)"
if (!$Local:OutputFilePath -or !(Test-Path $OutputFilePath)) {
$DefaultFilePath = [Environment]::GetFolderPath('Desktop')
$OutputFilePath = Read-Host "Enter the folder path where the PERIPHERALS.csv file will be saved (default: $DefaultFilePath)"
if (!$OutputFilePath) {
$OutputFilePath = $DefaultFilePath
}
$OutputFilePath = [IO.Path]::Combine($OutputFilePath, 'PERIPHERALS.csv')
}
else {
Write-Host "Using the existing file $OutputFilePath to store the data."
}
Write-Host "Gathering peripheral data for the newly connected devices..."
function Get-DeviceProperties {
[CmdletBinding()]
[OutputType([PSCustomObject])]
param(
[Parameter(Mandatory = $true, ValueFromPipeline, ValueFromPipelineByPropertyName, Position = 0)]
[string]
$DeviceID,
[hashtable]
$Properties = @{
'DEVPKEY_NAME' = 'Name'
'DEVPKEY_Device_BusReportedDeviceDesc' = 'NameFromBus'
'DEVPKEY_Device_Service' = 'Service'
'DEVPKEY_Device_Class' = 'PNPClass'
'DEVPKEY_Device_Parent' = 'ParentID'
}
)
process {
$Instance = [Management.ManagementObject]::new('Win32_PnPEntity.DeviceID="{0}"' -f $DeviceID.Replace('\','\\'))
$params = $Instance.GetMethodParameters('GetDeviceProperties')
$params['devicePropertyKeys'] = [string[]]$Properties.Keys
$result = $Instance.InvokeMethod('GetDeviceProperties', $params, $null)
$objHash = [ordered]@{
DeviceID = $DeviceID
}
foreach ($property in $result['deviceProperties']) {
$name = $property['KeyName']
if ([string]::IsNullOrEmpty($name)) {
$name = $property['key']
}
$objHash[$Properties[$name]] = $property['Data']
}
[PSCustomObject]$objHash
}
}
$Devices = $NewDevices | Get-DeviceProperties
$USBCompositeDevices = @($Devices | Where-Object { $_.PNPClass -in 'USB' })
$Stack = [Collections.Generic.Stack[object]]$USBCompositeDevices
$ProcessedIDs = [Collections.Generic.HashSet[string]]::new([StringComparer]::OrdinalIgnoreCase)
while ($Stack.Count) {
$CurrentDevice = $Stack.Pop()
if (!$ProcessedIDs.Add($CurrentDevice.DeviceID)) {
continue
}
$Children = $Devices.Where({ $CurrentDevice.DeviceID -eq $_.ParentID })
$CurrentDevice | Add-Member -NotePropertyName Children -NotePropertyValue $Children
foreach ($Child in $CurrentDevice.Children) {
$Stack.Push($Child)
$Devices = $Devices.Where({ $_.DeviceID -ne $Child.DeviceID })
}
}
Write-Host "Processing the discovered peripheral data..."
try {
$null = [Native.HID+DeviceInfo]::new()
}
catch {
$Signature = @'
const uint FILE_SHARE_READ = 0x00000001;
const uint FILE_SHARE_WRITE = 0x00000002;
const uint OPEN_EXISTING = 0x00000003;
const uint GENERIC_READ = 0x80000000;
const uint GENERIC_WRITE = 0x40000000;
const uint FILE_FLAG_OVERLAPPED = 0x40000000;
const int ERROR_INVALID_USER_BUFFER = 0x6F8;
[DllImport("kernel32", SetLastError = true)]
static extern SafeFileHandle CreateFile(string lpFileName, uint dwDesiredAccess, uint dwShareMode, IntPtr lpSecurityAttributes, uint dwCreationDisposition, uint dwFlagsAndAttributes, IntPtr hTemplateFile);
[DllImport("kernel32", SetLastError = true)]
static extern bool CloseHandle(IntPtr hObject);
internal struct HIDD_ATTRIBUTES
{
public int Size;
public ushort VendorID;
public ushort ProductID;
public ushort VersionNumber;
public static HIDD_ATTRIBUTES Create()
{
return new HIDD_ATTRIBUTES()
{
Size = Marshal.SizeOf(typeof(HIDD_ATTRIBUTES))
};
}
}
static SafeFileHandle GetDeviceHandle(string lpFileName)
{
var hDevice = CreateFile(lpFileName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, IntPtr.Zero, OPEN_EXISTING, FILE_FLAG_OVERLAPPED, IntPtr.Zero);
if (Marshal.GetLastWin32Error() != 0)
{
return SafeFileHandle.Null;
}
return hDevice;
}
[DllImport("hid", SetLastError = true)]
static extern bool HidD_GetAttributes(SafeFileHandle hidDeviceObject, out HIDD_ATTRIBUTES attributes);
[DllImport("hid", SetLastError = true, CharSet = CharSet.Unicode)]
static extern bool HidD_GetSerialNumberString(SafeFileHandle hidDeviceObject, StringBuilder buffer, int bufferLength);
static string HIDGetSerialNumberString(SafeFileHandle hDevice)
{
var builder = new StringBuilder(256);
while (builder.Capacity < 4094)
{
if (HidD_GetSerialNumberString(hDevice, builder, builder.Capacity))
return builder.ToString();
if (Marshal.GetLastWin32Error() != ERROR_INVALID_USER_BUFFER)
break;
builder.Capacity *= 2;
}
return null;
}
public static DeviceInfo GetHidDevice(string devicePath)
{
using (var hDevice = GetDeviceHandle(devicePath))
{
if (hDevice.IsInvalid)
return null;
var attributes = HIDD_ATTRIBUTES.Create();
HidD_GetAttributes(hDevice, out attributes);
if (Marshal.GetLastWin32Error() != 0)
return null;
return new DeviceInfo
{
SerialNumber = HIDGetSerialNumberString(hDevice),
VendorId = attributes.VendorID,
ProductId = attributes.ProductID,
};
}
}
public class DeviceInfo
{
public string SerialNumber { get; set; }
public ushort VendorId { get; set; }
public ushort ProductId { get; set; }
}
internal static readonly IntPtr INVALID_HANDLE = new IntPtr(-1);
public class SafeFileHandle : SafeHandle
{
public static readonly SafeFileHandle Invalid = new SafeFileHandle();
public static readonly SafeFileHandle Null = new SafeFileHandle(IntPtr.Zero, false);
public SafeFileHandle()
: base(INVALID_HANDLE, true)
{
}
public SafeFileHandle(IntPtr preexistingHandle, bool ownsHandle = true)
: base(INVALID_HANDLE, ownsHandle)
{
this.SetHandle(preexistingHandle);
}
public override bool IsInvalid { get { return this.handle == INVALID_HANDLE || this.handle == IntPtr.Zero; } }
protected override bool ReleaseHandle() { return CloseHandle(this.handle); }
}
'@
Add-Type -MemberDefinition $Signature -Name HID -Namespace Native -UsingNamespace System.Text
}
$DeviceSerialNumbers = @{}
$NewDevices | ForEach-Object {
[Native.HID]::GetHidDevice('\\?\' + $_.Replace('\','#') + '#{4d1e55b2-f16f-11cf-88cb-001111000030}')
} | Where-Object { $null -ne $_ } | ForEach-Object {
$Lookup = "$($_.VendorId)-$($_.ProductId)"
if ($DeviceSerialNumbers.ContainsKey($Lookup) -and $DeviceSerialNumbers[$Lookup] -ne $_.SerialNumber) {
Write-Warning "Duplicate device found with Vendor ID: $($_.VendorId) and Product ID: $($_.ProductId). Changing serial number from $($DeviceSerialNumbers[$Lookup]) to $($_.SerialNumber)."
}
$DeviceSerialNumbers[$Lookup] = $_.SerialNumber
}
$USBDeviceIDPattern = 'VID_(?<vid>[0-9A-F]{4})&PID_(?<pid>[0-9A-F]{4})'
$MediaDevices = foreach ($Device in $USBCompositeDevices |
Where-Object { $_.Children |
Where-Object { $_.PNPClass -in @('Image','Camera') -or ($_.Children |
Where-Object { $_.PNPClass -eq 'AudioEndpoint' }) } }) {
if ($Device.DeviceID -notmatch $USBDeviceIDPattern) {
continue
}
$DeviceVID = [Int32]::Parse($Matches['vid'],[Globalization.NumberStyles]::AllowHexSpecifier)
$DevicePID = [Int32]::Parse($Matches['pid'],[Globalization.NumberStyles]::AllowHexSpecifier)
$DeviceSerialNumber = $DeviceSerialNumbers["$DeviceVID-$DevicePID"]
$Camera = @($Device.Children | Where-Object { $_.PNPClass -in @('Camera','Image') } | Sort-Object DeviceID)
$Audio = @($Device.Children | Where-Object { $_.Children | Where-Object { $_.PNPClass -eq 'AudioEndpoint' } } | Sort-Object DeviceID)
$AudioEndpoints = @($Audio.Children | Where-Object { $_.PNPClass -eq 'AudioEndpoint' -and $_.DeviceID } | ForEach-Object { [PSCustomObject]@{Id=$_.DeviceID.Split('\',3)[2]; Name=$_.Name} })
$Speaker = @($AudioEndpoints | Where-Object { $_.Id.StartsWith('{0.0.0.') } | Sort-Object Id)
$Microphone = @($AudioEndpoints | Where-Object { $_.Id.StartsWith('{0.0.1.') } | Sort-Object Id)
if (!$Camera -and !$Speaker -and !$Microphone) {
continue
}
$DeviceType = & {
if ($Speaker -and !$Microphone -and !$Camera) {
return 'Speaker'
}
if (!$Speaker -and $Microphone -and !$Camera) {
return 'Microphone'
}
if (!$Speaker -and !$Microphone -and $Camera) {
return 'Camera'
}
if ($Speaker -and $Microphone -and !$Camera) {
return 'CompositeAudioDevice'
}
if ($Speaker -and $Microphone -and $Camera) {
return 'CompositeAudioVideoDevice'
}
return 'CompositeVideoDevice'
}
$DeviceName = switch ($DeviceType) {
'Speaker' { $Speaker[0].Name }
'Microphone' { $Microphone[0].Name }
'Camera' { $Camera[0].Name }
'CompositeAudioDevice' { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Microphone[0].Name }) }
'CompositeVideoDevice' { 'Composite - ' + $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Camera[0].Name }) }
'CompositeAudioVideoDevice' { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Camera[0].Name }) }
default { $(if (![string]::IsNullOrEmpty($Device.NameFromBus)) { $Device.NameFromBus } else { $Device.Name }) }
}
[PSCustomObject][ordered]@{
'Product ID' = "$DevicePID"
'Vendor ID' = "$DeviceVID"
'Serial Number' = "$DeviceSerialNumber"
'Peripheral Name' = "$DeviceName"
'Peripheral Type' = "$DeviceType"
}
}
$MonitorDevices = foreach ($Device in $Devices | Where-Object { $_.PNPClass -eq 'Monitor' -and $_.DeviceID }) {
$scope = [Management.ManagementScope]::new('root/WMI')
$scope.Connect()
$QueryString = 'SELECT InstanceName,ProductCodeID,ManufacturerName,SerialNumberID,UserFriendlyName FROM WmiMonitorID WHERE Active = TRUE AND InstanceName LIKE ''{0}%''' -f $Device.DeviceID.Replace('\','\\')
$query = [Management.ObjectQuery]::new('WQL', $QueryString)
$searcher = [Management.ManagementObjectSearcher]::new($scope, $query)
$WmiMonitorID = try { $searcher.Get() | Select-Object -First 1 } catch {}
if (!$WmiMonitorID) {
continue
}
$QueryString = 'SELECT VideoOutputTechnology FROM WmiMonitorConnectionParams WHERE InstanceName LIKE ''{0}%''' -f $WmiMonitorID['InstanceName'].Replace('\','\\')
$query = [Management.ObjectQuery]::new('WQL', $QueryString)
$searcher = [Management.ManagementObjectSearcher]::new($scope, $query)
$GoodOutputType = try { $searcher.Get() | Where-Object { $_['VideoOutputTechnology'] -notin @(6, 11, 13, 0x80000000) } } catch {}
if (!$GoodOutputType -or $GoodOutputType.Count -eq 0) {
continue
}
$DevicePID = [Convert]::ToUInt32([Text.Encoding]::ASCII.GetString($WmiMonitorID['ProductCodeID'], 0, 4), 16)
$DeviceVID = ($WmiMonitorID['ManufacturerName'][0] - 64 -shl 10) -bor ($WmiMonitorID['ManufacturerName'][1] - 64 -shl 5) -bor ($WmiMonitorID['ManufacturerName'][2] - 64)
$DeviceSerialNumber = [Text.Encoding]::ASCII.GetString($WmiMonitorID['SerialNumberID']).TrimEnd([char]0)
$DeviceName = [Text.Encoding]::ASCII.GetString($WmiMonitorID['UserFriendlyName']).TrimEnd([char]0)
[PSCustomObject][ordered]@{
'Product ID' = "$DevicePID"
'Vendor ID' = "$DeviceVID"
'Serial Number' = "$DeviceSerialNumber"
'Peripheral Name' = "$DeviceName"
'Peripheral Type' = 'Screen'
}
}
$DataToExport = @($MediaDevices) + $($MonitorDevices) | Select-Object @{
Name = 'Account'; Expression = { $UPN }
}, @{
Name = 'Display Name'; Expression = { $DisplayName }
}, *, @{
Name = 'GROUP_ID'; Expression = { $GroupID }
} | Where-Object {
$_.'Peripheral Type' -notin @('Unknown','Camera')
}
if ((Test-Path $OutputFilePath)) {
while($true) {
try {
$CurrentContents = Import-Csv -Path $OutputFilePath -ErrorAction Stop
break
}
catch [IO.IOException] {
if (!(Test-Path $OutputFilePath)) {
$CurrentContents = @()
break
}
Write-Warning "The file $OutputFilePath is currently in use. Please close the file and press Enter to retry."
$null = Read-Host
}
}
$DataToExport = @($DataToExport) + @($CurrentContents) |
Sort-Object -Property 'Product ID', 'Vendor ID', 'Serial Number', 'Peripheral Name', 'Peripheral Type', GROUP_ID -Unique
}
# Update the CSV file
while($true) {
try {
$DataToExport | Export-Csv -Path $OutputFilePath -NoTypeInformation -ErrorAction Stop
break
}
catch [IO.IOException] {
Write-Warning "The file $OutputFilePath is currently in use. Please close the file and press Enter to retry."
$null = Read-Host
}
}
Write-Host "Your discovered peripheral data has been collected and exported to $OutputFilePath." -ForegroundColor Green
Write-Host "Here is a preview of the results that were exported:"
$DataToExport | Format-Table -AutoSize
$Continue = Read-Host 'Are you finished collecting BYOD Rooms? (default: no)'
if ($Continue -and $Continue[0] -eq 'y') {
break
}
}
|
combined_dataset/train/non-malicious/Hex dump sample.ps1
|
Hex dump sample.ps1
|
C:\\WINDOWS\\system32
PS > hexdmp wsock32.dll
4d 5a 90 00 03 00 00 00 04 00 MZ........
00 00 ff ff 00 00 b8 00 00 00 ..ˇˇ......
00 00 00 00 40 00 00 00 00 00 ..........
e0 00 00 00 0e 1f ba 0e 00 b4 ‡.....∫...
09 cd 21 b8 01 4c cd 21 54 68 .Õ...LÕ.Th
69 73 20 70 72 6f 67 72 61 6d is.program
20 63 61 6e 6e 6f 74 20 62 65 .cannot.be
20 72 75 6e 20 69 6e 20 44 4f .run.in.DO
53 20 6d 6f 64 65 2e 0d 0d 0a S.mode....
|
combined_dataset/train/non-malicious/938.ps1
|
938.ps1
|
$apiVersion = "2015-04-08"
$resourceGroupName = "myResourceGroup"
$accountName = "mycosmosaccount"
$databaseName = "database1"
$databaseThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/throughput"
$databaseThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/settings"
$graphName = "graph1"
$graphThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/" + $graphName + "/throughput"
$graphThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/graphs/settings"
$throughput = 500
$updateResource = "database"
$properties = @{
"resource"=@{"throughput"=$throughput}
}
if($updateResource -eq "database"){
Set-AzResource -ResourceType $databaseThroughputResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $databaseThroughputResourceName -PropertyObject $properties
}
elseif($updateResource -eq "graph"){
Set-AzResource -ResourceType $graphThroughputResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $graphThroughputResourceName -PropertyObject $properties
}
else {
Write-Host("Must select database or graph")
}
|
combined_dataset/train/non-malicious/Get-LocalGroupMembership.ps1
|
Get-LocalGroupMembership.ps1
|
# #############################################################################
# NAME: FUNCTION-Get-LocalGroupMembership.ps1
#
# AUTHOR: Francois-Xavier Cat
# DATE: 2012/12/27
# EMAIL: fxcat@lazywinadmin.com
# WEBSITE: LazyWinAdmin.com
# TWiTTER: @lazywinadm
#
# COMMENT: This function get the local group membership on a local or remote
# machine using ADSI/WinNT. By default it will run on the localhost
# and check the group "Administrators".
#
# VERSION HISTORY
# 1.0 2012.12.27 Initial Version.
#
# #############################################################################
Function Get-LocalGroupMembership {
<#
.Synopsis
Get the local group membership.
.Description
Get the local group membership.
.Parameter ComputerName
Name of the Computer to get group members. Default is "localhost".
.Parameter GroupName
Name of the GroupName to get members from. Default is "Administrators".
.Example
Get-LocalGroupMembership
Description
-----------
Get the Administrators group membership for the localhost
.Example
Get-LocalGroupMembership -ComputerName SERVER01 -GroupName "Remote Desktop Users"
Description
-----------
Get the membership for the the group "Remote Desktop Users" on the computer SERVER01
.OUTPUTS
PSCustomObject
.INPUTS
Array
.Link
N/A
.Notes
NAME: Get-LocalGroupMembership
AUTHOR: Francois-Xavier Cat
WEBSITE: www.LazyWinAdmin.com
#>
[Cmdletbinding()]
Param (
[Parameter(ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true)]
[string]$ComputerName = $env:COMPUTERNAME,
[string]$GroupName = "Administrators"
)
# Create the array that will contains all the output of this function
$Output = @()
# Get the members for the group and computer specified
$Group = [ADSI]"WinNT://$ComputerName/$GroupName"
$Members = @($group.psbase.Invoke("Members"))
# Format the Output
$members | foreach {
$name = $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)
$class = $_.GetType().InvokeMember("Class", 'GetProperty', $null, $_, $null)
$path = $_.GetType().InvokeMember("ADsPath", 'GetProperty', $null, $_, $null)
# Find out if this is a local or domain object
if ($path -like "*/$ComputerName/*"){
$Type = "Local"
}
else {$Type = "Domain"
}
$Details = "" | Select ComputerName,Account,Class,Group,Path,Type
$Details.ComputerName = $ComputerName
$Details.Account = $name
$Details.Class = $class
$Details.Group = $GroupName
$details.Path = $path
$details.Type = $type
# Send the current result to the $output variable
$output = $output + $Details
}
# Finally show the Output to the user.
$output
}
|
combined_dataset/train/non-malicious/ConvertFrom-SDDL.ps1
|
ConvertFrom-SDDL.ps1
|
filter ConvertFrom-SDDL
{
<#
.SYNOPSIS
Convert a raw security descriptor from SDDL form to a parsed security descriptor.
Author: Matthew Graeber (@mattifestation)
.DESCRIPTION
ConvertFrom-SDDL generates a parsed security descriptor based upon any string in raw security descriptor definition language (SDDL) form. ConvertFrom-SDDL will parse the SDDL regardless of the type of object the security descriptor represents.
.PARAMETER RawSDDL
Specifies the security descriptor in raw SDDL form.
.EXAMPLE
ConvertFrom-SDDL -RawSDDL 'D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0x80120089;;;NS)'
.EXAMPLE
'O:BAG:SYD:(D;;0xf0007;;;AN)(D;;0xf0007;;;BG)(A;;0xf0005;;;SY)(A;;0x5;;;BA)', 'O:BAG:SYD:PAI(D;OICI;FA;;;BG)(A;OICI;FA;;;BA)(A;OICIIO;FA;;;CO)(A;OICI;FA;;;SY)' | ConvertFrom-SDDL
.INPUTS
System.String
ConvertFrom-SDDL accepts SDDL strings from the pipeline
.OUTPUTS
System.Management.Automation.PSObject
.LINK
http://www.exploit-monday.com
#>
Param (
[Parameter( Position = 0, Mandatory = $True, ValueFromPipeline = $True )]
[ValidateNotNullOrEmpty()]
[String[]]
$RawSDDL
)
Set-StrictMode -Version 2
# Get reference to sealed RawSecurityDescriptor class
$RawSecurityDescriptor = [Int].Assembly.GetTypes() | ? { $_.FullName -eq 'System.Security.AccessControl.RawSecurityDescriptor' }
# Create an instance of the RawSecurityDescriptor class based upon the provided raw SDDL
try
{
$Sddl = [Activator]::CreateInstance($RawSecurityDescriptor, [Object[]] @($RawSDDL))
}
catch [Management.Automation.MethodInvocationException]
{
throw $Error[0]
}
if ($Sddl.Group -eq $null)
{
$Group = $null
}
else
{
$SID = $Sddl.Group
$Group = $SID.Translate([Security.Principal.NTAccount]).Value
}
if ($Sddl.Owner -eq $null)
{
$Owner = $null
}
else
{
$SID = $Sddl.Owner
$Owner = $SID.Translate([Security.Principal.NTAccount]).Value
}
$ObjectProperties = @{
Group = $Group
Owner = $Owner
}
if ($Sddl.DiscretionaryAcl -eq $null)
{
$Dacl = $null
}
else
{
$DaclArray = New-Object PSObject[](0)
# System.Security.AccessControl.FileSystemRights contains the most generic forms of access rights.
# Because we don't necessarily know the object type ahead of time,
# this may lead to some false positives due to some overlap in access control types.
$EnumValueStrings = [Enum]::GetNames([System.Security.AccessControl.FileSystemRights])
$EnumValues = $EnumValueStrings | % { [System.Security.AccessControl.FileSystemRights] $_ }
foreach ($DaclEntry in $Sddl.DiscretionaryAcl)
{
$SID = $DaclEntry.SecurityIdentifier
$Account = $SID.Translate([Security.Principal.NTAccount]).Value
$Values = New-Object String[](0)
# Resolve access mask
foreach ($Value in $EnumValues)
{
if (($DaclEntry.Accessmask -band $Value) -eq $Value)
{
$Values += $Value.ToString()
}
}
$Access = [Security.AccessControl.FileSystemRights] "$($Values -join ',')"
$DaclTable = @{
Rights = $Access
IdentityReference = $Account
IsInherited = $DaclEntry.IsInherited
InheritanceFlags = $DaclEntry.InheritanceFlags
PropagationFlags = $DaclEntry.PropagationFlags
}
if ($DaclEntry.AceType.ToString().Contains('Allowed'))
{
$DaclTable['AccessControlType'] = [Security.AccessControl.AccessControlType]::Allow
}
else
{
$DaclTable['AccessControlType'] = [Security.AccessControl.AccessControlType]::Deny
}
$DaclArray += New-Object PSObject -Property $DaclTable
}
$Dacl = $DaclArray
}
$ObjectProperties['Access'] = $Dacl
$SecurityDescriptor = New-Object PSObject -Property $ObjectProperties
Write-Output $SecurityDescriptor
}
|
combined_dataset/train/non-malicious/4428.ps1
|
4428.ps1
|
function Register-PSRepository {
[CmdletBinding(DefaultParameterSetName = 'NameParameterSet',
HelpUri = 'https://go.microsoft.com/fwlink/?LinkID=517129')]
Param
(
[Parameter(Mandatory = $true,
Position = 0,
ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[string]
$Name,
[Parameter(Mandatory = $true,
Position = 1,
ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[Uri]
$SourceLocation,
[Parameter(ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[Uri]
$PublishLocation,
[Parameter(ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[Uri]
$ScriptSourceLocation,
[Parameter(ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[Uri]
$ScriptPublishLocation,
[Parameter(ValueFromPipelineByPropertyName = $true,
ParameterSetName = 'NameParameterSet')]
[PSCredential]
$Credential,
[Parameter(Mandatory = $true,
ParameterSetName = 'PSGalleryParameterSet')]
[Switch]
$Default,
[Parameter()]
[ValidateSet('Trusted', 'Untrusted')]
[string]
$InstallationPolicy = 'Untrusted',
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNullOrEmpty()]
[Uri]
$Proxy,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[PSCredential]
$ProxyCredential,
[Parameter(ParameterSetName = 'NameParameterSet')]
[ValidateNotNullOrEmpty()]
[string]
$PackageManagementProvider
)
DynamicParam {
if (Get-Variable -Name SourceLocation -ErrorAction SilentlyContinue) {
Set-Variable -Name selectedProviderName -value $null -Scope 1
if (Get-Variable -Name PackageManagementProvider -ErrorAction SilentlyContinue) {
$selectedProviderName = $PackageManagementProvider
$null = Get-DynamicParameters -Location $SourceLocation -PackageManagementProvider ([REF]$selectedProviderName)
}
else {
$dynamicParameters = Get-DynamicParameters -Location $SourceLocation -PackageManagementProvider ([REF]$selectedProviderName)
Set-Variable -Name PackageManagementProvider -Value $selectedProviderName -Scope 1
$null = $dynamicParameters
}
}
}
Begin {
Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -Proxy $Proxy -ProxyCredential $ProxyCredential
if ($PackageManagementProvider) {
$providers = PackageManagement\Get-PackageProvider | Where-Object { $_.Name -ne $script:PSModuleProviderName -and $_.Features.ContainsKey($script:SupportsPSModulesFeatureName) }
if (-not $providers -or $providers.Name -notcontains $PackageManagementProvider) {
$possibleProviderNames = $script:NuGetProviderName
if ($providers) {
$possibleProviderNames = ($providers.Name -join ',')
}
$message = $LocalizedData.InvalidPackageManagementProviderValue -f ($PackageManagementProvider, $possibleProviderNames, $script:NuGetProviderName)
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $message `
-ErrorId "InvalidPackageManagementProviderValue" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidArgument `
-ExceptionObject $PackageManagementProvider
return
}
}
}
Process {
if ($PSCmdlet.ParameterSetName -eq 'PSGalleryParameterSet') {
if (-not $Default) {
return
}
$PSBoundParameters['Name'] = $Script:PSGalleryModuleSource
$null = $PSBoundParameters.Remove('Default')
}
else {
if ($Name -eq $Script:PSGalleryModuleSource) {
$message = $LocalizedData.UseDefaultParameterSetOnRegisterPSRepository
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $message `
-ErrorId 'UseDefaultParameterSetOnRegisterPSRepository' `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidArgument `
-ExceptionObject $Name
return
}
$SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) `
-LocationParameterName 'SourceLocation' `
-Credential $Credential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-CallerPSCmdlet $PSCmdlet
if (-not $SourceLocation) {
return
}
$pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $Credential -Proxy $Proxy -ProxyCredential $ProxyCredential
$retrievedCredential = $null
if (!$Credential -and $pingResult -and $pingResult.ContainsKey($Script:StatusCode) `
-and ($pingResult[$Script:StatusCode] -eq 401)) {
$retrievedCredential = Get-CredsFromCredentialProvider -SourceLocation $SourceLocation
$SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) `
-LocationParameterName 'SourceLocation' `
-Credential $retrievedCredential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-CallerPSCmdlet $PSCmdlet
if (-not $SourceLocation) {
return
}
$pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $retrievedCredential -Proxy $Proxy -ProxyCredential $ProxyCredential
if (!$retrievedCredential -or ($pingResult -and $pingResult.ContainsKey($Script:StatusCode) `
-and ($pingResult[$Script:StatusCode] -eq 401))) {
$retriedRetrievedCredential = Get-CredsFromCredentialProvider -SourceLocation $SourceLocation -IsRetry $true
$SourceLocation = Resolve-Location -Location (Get-LocationString -LocationUri $SourceLocation) `
-LocationParameterName 'SourceLocation' `
-Credential $retriedRetrievedCredential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-CallerPSCmdlet $PSCmdlet
if (-not $SourceLocation) {
return
}
$pingResult = Ping-Endpoint -Endpoint (Get-LocationString -LocationUri $SourceLocation) -Credential $retrievedCredential -Proxy $Proxy -ProxyCredential $ProxyCredential
if (!$retriedRetrievedCredential -or ($pingResult -and $pingResult.ContainsKey($Script:StatusCode) `
-and ($pingResult[$Script:StatusCode] -eq 401))) {
$message = $LocalizedData.RepositoryCannotBeRegistered -f ($Name)
Write-Error -Message $message -ErrorId "RepositoryCannotBeRegistered" -Category InvalidOperation
return
}
}
}
$providerName = $null
if ($PackageManagementProvider) {
$providerName = $PackageManagementProvider
}
elseif ($selectedProviderName) {
$providerName = $selectedProviderName
}
else {
$providerName = Get-PackageManagementProviderName -Location $SourceLocation
}
if ($providerName) {
$PSBoundParameters[$script:PackageManagementProviderParam] = $providerName
}
if ($PublishLocation) {
$PSBoundParameters[$script:PublishLocation] = Get-LocationString -LocationUri $PublishLocation
}
if ($ScriptPublishLocation) {
$PSBoundParameters[$script:ScriptPublishLocation] = Get-LocationString -LocationUri $ScriptPublishLocation
}
if ($ScriptSourceLocation) {
$PSBoundParameters[$script:ScriptSourceLocation] = Get-LocationString -LocationUri $ScriptSourceLocation
}
$PSBoundParameters["Location"] = Get-LocationString -LocationUri $SourceLocation
$null = $PSBoundParameters.Remove("SourceLocation")
}
if ($InstallationPolicy -eq "Trusted") {
$PSBoundParameters['Trusted'] = $true
}
$null = $PSBoundParameters.Remove("InstallationPolicy")
$PSBoundParameters["Provider"] = $script:PSModuleProviderName
$PSBoundParameters["MessageResolver"] = $script:PackageManagementMessageResolverScriptBlock
$null = PackageManagement\Register-PackageSource @PSBoundParameters
$nugetCmd = Microsoft.PowerShell.Core\Get-Command -Name $script:NuGetExeName `
-ErrorAction SilentlyContinue -WarningAction SilentlyContinue
if ($nugetCmd) {
$nugetSourceExists = nuget sources list | where-object { $_.Trim() -in $SourceLocation }
if (!$nugetSourceExists) {
nuget sources add -name $Name -source $SourceLocation
}
}
}
}
|
combined_dataset/train/non-malicious/sample_25_61.ps1
|
sample_25_61.ps1
|
#
# Module manifest for module 'OCI.PSModules.Waa'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Waa.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5e9163aa-454b-4b6c-b240-a7136ba9f82a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Waa Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waa.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWaaWebAppAcceleration',
'Get-OCIWaaWebAppAccelerationPoliciesList',
'Get-OCIWaaWebAppAccelerationPolicy',
'Get-OCIWaaWebAppAccelerationsList', 'Get-OCIWaaWorkRequest',
'Get-OCIWaaWorkRequestErrorsList', 'Get-OCIWaaWorkRequestLogsList',
'Get-OCIWaaWorkRequestsList',
'Invoke-OCIWaaPurgeWebAppAccelerationCache',
'Move-OCIWaaWebAppAccelerationCompartment',
'Move-OCIWaaWebAppAccelerationPolicyCompartment',
'New-OCIWaaWebAppAcceleration',
'New-OCIWaaWebAppAccelerationPolicy',
'Remove-OCIWaaWebAppAcceleration',
'Remove-OCIWaaWebAppAccelerationPolicy',
'Update-OCIWaaWebAppAcceleration',
'Update-OCIWaaWebAppAccelerationPolicy'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waa'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-UIChildItem.ps1
|
Get-UIChildItem.ps1
|
#requires -version 2.0
[CmdletBinding()]
param($Path)
<#
Quick check to see if we have necessary module...
#>
if (!(Get-Module ShowUI)) {
try {
Import-Module ShowUI
} catch {
Write-Warning "Can't load ShowUI module. I quit! For more details about error use -Verbose parameter."
Write-Verbose $_
}
}
<#
Show UI builds UI structure...
#>
Show-UI -Parameters $Path {
param ($Path)
DockPanel -Height 400 {
ScrollViewer {
ItemsControl {
<#
Hash that will set common button's options and some effects...
#>
$Effect = @{
Effect = {
New-Object Windows.Media.Effects.BlurEffect -Property @{
Radius = 3
}
}
On_MouseEnter = {
$Clear = DoubleAnimation -From 3 -To 1 -Duration '0:0:0.5'
$DependencyRadius = $This.Effect.GetType()::RadiusProperty
$This.Effect.BeginAnimation($DependencyRadius,$Clear)
}
On_MouseLeave = {
$Blur = DoubleAnimation -From 1 -To 3 -Duration '0:0:0.5'
$DependencyRadius = $This.Effect.GetType()::RadiusProperty
$This.Effect.BeginAnimation($DependencyRadius,$Blur)
}
}
<#
Time to read our folder. We ignore folders, only files will be listed.
As you can see it's pretty easy to pass $Path parameter to UI, and it's not global... :)
#>
foreach ($File in Get-ChildItem $Path | where { !$_.PSIsContainer } ) {
Button @Effect -Content $File.Name -On_Click ([scriptblock]::Create(@"
Write-UIOutput $($File.FullName)
`$ShowUI.ActiveWindow.Close()
"@)) -ToolTip "File size: $($File.Length) bytes, Last modified: $($File.LastWriteTime.ToShortDateString())"
}
} # END ItemsControl
} # END ScrollViewer
} # END DockPanel
} # END Show-UI
|
combined_dataset/train/non-malicious/sample_48_55.ps1
|
sample_48_55.ps1
|
#
# Module manifest for module 'OCI.PSModules.Databasemigration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Databasemigration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects',
'Connect-OCIDatabasemigrationionDiagnostics',
'Get-OCIDatabasemigrationAdvisorReport',
'Get-OCIDatabasemigrationAgent',
'Get-OCIDatabasemigrationAgentImagesList',
'Get-OCIDatabasemigrationAgentsList',
'Get-OCIDatabasemigrationConnection',
'Get-OCIDatabasemigrationConnectionsList',
'Get-OCIDatabasemigrationExcludedObjectsList',
'Get-OCIDatabasemigrationJob',
'Get-OCIDatabasemigrationJobOutputContent',
'Get-OCIDatabasemigrationJobOutputsList',
'Get-OCIDatabasemigrationJobsList',
'Get-OCIDatabasemigrationMigration',
'Get-OCIDatabasemigrationMigrationObjectsList',
'Get-OCIDatabasemigrationMigrationObjectTypesList',
'Get-OCIDatabasemigrationMigrationsList',
'Get-OCIDatabasemigrationWorkRequest',
'Get-OCIDatabasemigrationWorkRequestErrorsList',
'Get-OCIDatabasemigrationWorkRequestLogsList',
'Get-OCIDatabasemigrationWorkRequestsList',
'Invoke-OCIDatabasemigrationCloneMigration',
'Invoke-OCIDatabasemigrationEvaluateMigration',
'Invoke-OCIDatabasemigrationResumeJob',
'Invoke-OCIDatabasemigrationRetrieveSupportedPhases',
'Move-OCIDatabasemigrationAgentCompartment',
'Move-OCIDatabasemigrationConnectionCompartment',
'Move-OCIDatabasemigrationMigrationCompartment',
'New-OCIDatabasemigrationConnection',
'New-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationAgent',
'Remove-OCIDatabasemigrationConnection',
'Remove-OCIDatabasemigrationJob',
'Remove-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationMigrationObjects',
'Start-OCIDatabasemigrationMigration',
'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent',
'Update-OCIDatabasemigrationConnection',
'Update-OCIDatabasemigrationJob',
'Update-OCIDatabasemigrationMigration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2348.ps1
|
2348.ps1
|
$sDefaultGpoGuid = '{F6FE3FDE-4CD0-455D-B9BC-D134111BBF09}';
$sDefaultGpoGuid = "*$($sDefaultGpoGuid)*";
$ErrorActionPreference = "Stop";
$aComputerGPOs = Get-ADObject -Filter {(ObjectClass -eq "groupPolicyContainer")}
$test = @();
if ($aComputerGpos -ne $null) {
$aReport = @()
foreach ($oGpo in $aComputerGpos) {
[XML]$xGpoReport = Get-GPOReport -Guid $oGpo.Name -ReportType XML;
try {
if (($xGpoReport.GPO.Computer.Enabled -eq 'true') -and (Test-Member $xGpoReport.GPO.Computer 'ExtensionData')) {
$aSettings = @();
foreach ($oExt in $xGpoReport.GPO.Computer.ExtensionData) {
$aSettings += $oExt.Extension.ChildNodes
}
if ($aSettings.Count -ne 0) {
echo '11111111'
echo "======NAME:$($xGpoReport.GPO.Name)========="
$aSettings
echo '22222222'
foreach ($oSetting in $aSettings) {
if ($oSetting.Name -match '^q\d+:RegistrySetting') {
$xGpoReport.GPO.Name
} elseif ($oSetting.Name -notmatch '^q\d+') {
}
}
}
}
} catch {
Write-Error $_.Exception
}
}
}
$test | Select -Unique
|
combined_dataset/train/non-malicious/sample_49_36.ps1
|
sample_49_36.ps1
|
<#
THE SCRIPT IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SCRIPT OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
.SYNOPSIS
This script is used to start the configuration process for all supported AWS S3 logs sources.
Log sources currently supported are: VPC flows, CloudTrail, GuardDuty
.PARAMETER LogPath
Specifies the path to save the script log. If not specified, the current path is used.
.PARAMETER AwsLogType
Specifies the Aws log type to configure. Valid options are: "VPC", "CloudTrail", "GuardDuty", "CustomLog"
.EXAMPLE
.\Config-AwsConnector.ps1
Executes the script with defaults
#>
[CmdletBinding()]
param (
[Parameter()]
[string]
$LogPath=(Join-Path (Get-Location).Path Logs),
[Parameter()]
[ValidateSet("VPC","CloudTrail","GuardDuty", "CloudWatch", "CustomLog")][string]$AwsLogType
)
# Include helper scripts
. ".\Utils\HelperFunctions.ps1"
. ".\Utils\AwsResourceCreator.ps1"
. ".\Utils\CommonAwsPolicies.ps1"
. ".\Utils\AwsPoliciesUpdate.ps1"
. ".\Utils\AwsSentinelTag.ps1"
. ".\Enviornment\EnviornmentConstants.ps1"
# Verify that the AWS CLI is available
if ($null -eq (Get-Command "aws" -ErrorAction SilentlyContinue))
{
Write-Error "The AWS CLI is not available in the path"
Write-Output "`nPlease install the latest AWS CLI from https://aws.amazon.com/cli/"
Write-Output "If the CLI is already installed, make sure it is added to the path.`n"
exit
}
# Setup basic logging
New-Item -ItemType Directory -Force -Path $LogPath | Out-Null
$TimeStamp = Get-Date -Format MMddHHmm
$LogFileName = '{0}-{1}.csv' -f "AwsS3", $TimeStamp
$LogFileName = Join-Path $LogPath $LogFileName
Write-Log -Message "Starting ConfigAwsConnector at: $(Get-Date)" -LogFileName $LogFileName -Severity Information -LinePadding 2
Write-Log -Message "Log created: $LogFileName" -LogFileName $LogFileName -Severity Information -Indent 2
Write-Log -Message "To begin you will choose the AWS logs to configure." -LogFileName $LogFileName -Severity Information -LinePadding 2
# If LogType parameter was not specified, prompt the user to choose.
if ($AwsLogType -eq "")
{
do
{
try
{
[ValidateSet("VPC","CloudTrail","GuardDuty", "CloudWatch", "CustomLog")]$AwsLogType = Read-ValidatedHost -Prompt "Please enter the AWS log type to configure (VPC, CloudTrail, GuardDuty, CloudWatch, CustomLog)"
}
catch{}
} until ($?)
}
switch ($AwsLogType)
{
"VPC" {.\ConfigVpcFlowDataConnector.ps1; break}
"CloudTrail" {.\ConfigCloudTrailDataConnector.ps1 ; break }
"GuardDuty" {.\ConfigGuardDutyDataConnector.ps1 ; break }
"CloudWatch" {.\ConfigCloudWatchDataConnector.ps1 ; break }
"CustomLog" {.\ConfigCustomLogDataConnector.ps1 ; break }
default {Write-Log -Message "Invalid log type" -LogFileName $LogFileName -Severity Error; exit}
}
Write-Host -NoNewLine `n`n'Press any key to continue...'
$null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown')
|
combined_dataset/train/non-malicious/sample_56_98.ps1
|
sample_56_98.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vault'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vault.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vault Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList',
'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList',
'Invoke-OCIVaultRotateSecret',
'Invoke-OCIVaultScheduleSecretDeletion',
'Invoke-OCIVaultScheduleSecretVersionDeletion',
'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret',
'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretRotation',
'Stop-OCIVaultSecretVersionDeletion', 'Update-OCIVaultSecret'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Run-Query (SharePoint)_4.ps1
|
Run-Query (SharePoint)_4.ps1
|
function Run-Query($siteUrl, $queryText)
{
[reflection.assembly]::loadwithpartialname("microsoft.sharePOint") | out-null
[reflection.assembly]::loadwithpartialname("microsoft.office.server") | out-null
[reflection.assembly]::loadwithpartialname("microsoft.office.server.search") | out-null
$s = [microsoft.sharepoint.spsite]$siteUrl
$q = new-object microsoft.office.server.search.query.fulltextsqlquery -arg $s
$q.querytext = $queryText
$q.RowLimit = 100
$q.ResultTypes = "RelevantResults"
$dt = $q.Execute()
$r = $dt["RelevantResults"]
$output = @()
while ($r.Read()) {
$o = new-object PSObject
0..($r.FieldCount-1) | foreach {
add-member -inputObject $o -memberType "NoteProperty" -name $r.GetName($_) -value $r[$_].ToString()
}
$output += $o
}
return $output
}
@@
@@
@@#Sample usage:
@@#Run-Query -siteUrl "http://dev/" -queryText "SELECT PreferredName, WorkPhone FROM SCOPE() WHERE ""scope""='People' AND PreferredName LIKE '%JIM%'"
@@
@@
|
combined_dataset/train/non-malicious/2504.ps1
|
2504.ps1
|
[CmdletBinding()]
param()
cls
[array]$Clients = @();
[array]$Clients = Invoke-SQLCMD -ServerInstance XUTILSQL2 -Database DexmaSites -Query "SELECT DISTINCT dv.dv_value AS DocServer
, [ce].[DatabaseName]
, [ce].[DatabaseServer]
FROM [DexmaSites].dbo.[clients] AS c
JOIN dexmaSites.dbo.client_data_xref cdx
ON cdx.[cl_id] = c.[cl_id]
JOIN dexmaSites.dbo.data_values dv
ON cdx.dv_id = dv.dv_id
JOIN dexmaSites.dbo.ClientEnvironment AS ce
ON ce.[ClientID] = cdx.[cl_id]
WHERE dv.di_id = 96
AND [ce].[EnvironmentID] = 13
ORDER BY [ce].[DatabaseName]"
foreach ( $Client in $Clients ) {
Write-Host "Beginning $($Client.DatabaseName)" -ForegroundColor DarkGray
if (($Client.DocServer -eq "PADoc5") -or ($Client.DocServer -eq "PDocDirect10"))
{
Write-Verbose -Message "$($Client.DatabaseName) on $($Client.DocServer) has not been migrated to the new datacenter.";
}
else
{
Write-Verbose -Message "Beginning $($Client.DatabaseName)";
[array]$CopyFrom = @();
if (Test-Path -Path "\\PDocDirect10\$($Client.DatabaseName)")
{
Write-Verbose -Message "`t\\PDocDirect10\$($Client.DatabaseName) found, enumerating files(source).";
$CopyFrom += @(Get-ChildItem -path "\\PDocDirect10\$($Client.DatabaseName)\Billing\*" )
}
if (Test-Path -Path "\\PADoc5\$($Client.DatabaseName)")
{
Write-Verbose -Message "`t\\PADoc5\$($Client.DatabaseName) folder found, enumerating files(source).";
$CopyFrom += @(Get-ChildItem -path "\\PADoc5\$($Client.DatabaseName)\Billing\*");
}
$DestPath = "\\" + $Client.DocServer + "\" + $Client.DatabaseName + "\Billing";
[array]$CopyTo = @();
if (!(Test-Path -Path $DestPath))
{
Write-Verbose -Message "`t$($DestPath) not found! Creating directory...";
New-Item -ItemType directory -Path $DestPath;
if (!(Test-Path -Path $DestPath))
{
Write-Verbose -Message "Failed creating $($DestPath)...";
continue;
}
else
{
Write-Verbose -Message "`t$($DestPath) created, enumerating files(dest).";
$CopyTo += @(Get-ChildItem -path "$DestPath\*");
}
}
else
{
Write-Verbose -Message "`t$($DestPath) found, enumerating files(dest).";
$CopyTo += @(Get-ChildItem -path "$DestPath\*");
}
Write-Verbose -Message "`tComparing directory contents...";
$Files2Copy = Compare-Object -ReferenceObject $CopyFrom -DifferenceObject $CopyTo -Property name, length -PassThru | Where-Object {$_.SideIndicator -eq "<="};
if ($Files2Copy -ne $NULL)
{
foreach ($File in $Files2Copy)
{
Write-Verbose -Message "`tThis will copy File $($File.FullName) to $DestPath\$($File.Name)";
Copy-Item -Path $($File.FullName) -Destination $DestPath\$($File.Name)
}
}
else
{
Write-Verbose -Message "`tNo files to copy for $($Client.DatabaseName)!";
}
if ($Client.DocServer -eq "PDoc1")
{
$DropPath = "\\PDoc2\Relateprod\PrimeAlliance\" + $Client.DatabaseName + "\Billing";
}
else
{
$DropPath = "\\PDoc1\Relateprod\PrimeAlliance\" + $Client.DatabaseName + "\Billing";
}
if (Test-Path -Path $DropPath)
{
Write-Verbose -Message "`tDropping the $($DropPath) folder!";
Remove-Item -Recurse -Path $DropPath
}
else
{
Write-Verbose -Message "`tNo files to delete for $($Client.DatabaseName)!";
}
Write-Verbose -Message "End $($Client.DatabaseName)";
}
Write-Host "End $($Client.DatabaseName)" -ForegroundColor DarkGray
}
|
combined_dataset/train/non-malicious/sample_7_63.ps1
|
sample_7_63.ps1
|
ConvertFrom-StringData @'
id_adapterkb980486check=Checking 6to4 and physical adapters
id_adapterkb980486checkdesc=Checking the number of 6to4 and physical adapters (KB 980486)
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDelKpUGGvRC0Ym
# QzXXSwktyobma3eap5nGwNCbKf9b6KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINVJ
# NrHkV0e/rnV6ovXwQEOH1wY6RBAwqpvHItBymecpMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAm3XFZ2KOXTTqWabEJU2dpqVb0CzjWtOxEhFs
# HDCGQBQkBtOdK/3bgMlDcNHgaagQhnVGJkVy+MZfpd5bmikvcqBcnC/UMdCAA/fY
# Mj3lfD5emw3dJ8R82WSULLbvbQuUU+1k+6ZNsiydpY3e9HhWngmMSN1XyAUHdHJU
# 524qD/UbRMnC4DBXJVnsYStnNxhb/OaJaXT3TtJP3lAAM9qSMaxdscRZLkak15ed
# neiBkTdbwVhndHPV7Q8HGUZKM2AgFX8nui2OguzaMpeV9NOfAxn2kcFAIBSCBc8g
# +F00Zn/PvV71eFtYPXFT1sf4hndDHhiCEhGPTajultwAXGYUvKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBKffctAO5NjwRpdgM8FvKQ6uzdA69cFvMh
# fQqF3ivx4gIGZusyQ1cjGBMyMDI0MTAyODExNDA0MC4xNDZaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5
# aFrNDGHtAAEAAAH9MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjJEMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# oWWs+D+Ou4JjYnRHRedu0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQy
# G2zpxYceTjIF7HiQWbt6FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+S
# D0S+hTP1TCA/we38yZ3BEtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sK
# ikeWDSnHQeTprO0zIm/btagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz
# 7tURyiD3kOxNnw5ox1eZX/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6
# ++Wb6+1ltMCPoMJHUtPP3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk
# 0IqxBDZgMoY+Ef7ffFRP2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x
# /+QLE0pcSEh/XE1w1fcp6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0g
# EDytapGn1ONjVkiKpVP2uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBH
# dpl28+k+ZY6m4dPFnEoGcJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0
# oH7RKMQgmsy7CVD7v55dOhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTpDMXA4ZW8+yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAY9hYX+T5AmCrYGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+p
# jlNv5XSXZrKGv8e4s5dJ5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSK
# s2KlhYiqzbRe8QbMfKXEDtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/
# Zq+vO5523Jld6ssVuzs9uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTL
# lOL8LpXooqnr+QLYE4BpUep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vS
# heEkmjHA2zuM+Tgn4j5n+Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTO
# fMqFa3Ab8KDKicmp0AthRNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUV
# kSJ5Fo/ctfDSPdCTVaIXXF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/R
# qTPvCyAhIxBVKfN/hfs4CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi
# 6Guo+z3LPFl/exQaRubErsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs
# +AOoWx24+XcyxpUkAajDhky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSK
# oqtrjinRAsBUdoOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0
# MTAyOTA3NTMwM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEA
# AgIJ5zAHAgEAAgISQjAKAgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQA/CC/LZ2oFgj4yM+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCW
# F4kzzIktKGUnhyd/L3j7RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trn
# zQMegLEIZHFbBaiR6h9j/oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fF
# Mtqdncqg8a2hOSPYghtyl1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0un
# mdz7ZrxHx5mL0kEArzE1Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6l
# fDhbaf2LYZ2H/D5el6NP4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgW/Xtfh2nJNUYyNU+Zx+vicsICOLg/REyxUM52VbJtS8wgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8l
# RB4NRzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# /XP5aFrNDGHtAAEAAAH9MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FY
# t/GwMA0GCSqGSIb3DQEBCwUABIICAJssQa/FxPn9SBfhic8qoyqAACatM1ZszB/o
# BRXytEB2xbNnK6QKxcj/n0pvhGInLqKIf0c/zbfhsZEE/gMfZg7Pji50HK2xI4Zn
# pWozfRmh3FHepXz5Z0yFhnjPSbXjRlNZeNrLC/MPzHO2uMXe4DeZh4E+X2+Epm+C
# W32gEHazt6glhzlXqMwQr20/muWb9K6EvAXfBHro4oKybLPX73koaQ62LSqHqVsR
# 5JbLMelWs4z4OZLx7ihDfQqrf16i7r5rWfHdrbe9rJf6ZGwAjHawcqjwheCaLdKl
# e/rPQ0zk6dsRsnaeSBYpD9Cfo8QEBxOJHy4WZWXyMFPwk2tQju8rYOK/MnWiPguT
# oYniDKe7a67a2qt5pAIgGR7QP5xGHxUCQ0s5x5w48/MGmdd+IaW1+BCdbk2UUbBj
# b64gTGoPLeJuxcLW19GUJJeRSqcJMFZFN8Wl6LdNiWB4M21TV4mTdquMy+QLUsJa
# h9U1nt7M5csN3SWVzLOtyf5zrKV5PuS1yq6iTfEJLmAT5NBxO0br4eWBJk6GwKuJ
# 4SZ07ZVGl0G2vTnVb3xJ0btAXktHCCfmk8koBfX6Qnc9gLP0gtsL1xocWhsPniB/
# 5imazla9GDxQ3D9wgemUbzjYOLbBnuOzO2P7U0uQeuxM/TPx9GCRbpF01cqKsuRC
# AIB3B40r
# SIG # End signature block
|
combined_dataset/train/non-malicious/1798.ps1
|
1798.ps1
|
Describe "Get-ChildItem" -Tags "CI" {
Context 'FileSystem provider' {
BeforeAll {
$item_a = "a3fe710a-31af-4834-bc29-d0b584589838"
$item_B = "B1B691A9-B7B1-4584-AED7-5259511BEEC4"
$item_c = "c283d143-2116-4809-bf11-4f7d61613f92"
$item_D = "D39B4FD9-3E1D-4DD5-8718-22FE2C934CE3"
$item_E = "EE150FEB-0F21-4AFF-8066-AF59E925810C"
$item_F = ".F81D8514-8862-4227-B041-0529B1656A43"
$item_G = "5560A62F-74F1-4FAE-9A23-F4EBD90D2676"
$null = New-Item -Path $TestDrive -Name $item_a -ItemType "File" -Force
$null = New-Item -Path $TestDrive -Name $item_B -ItemType "File" -Force
$null = New-Item -Path $TestDrive -Name $item_c -ItemType "File" -Force
$null = New-Item -Path $TestDrive -Name $item_D -ItemType "File" -Force
$null = New-Item -Path $TestDrive -Name $item_E -ItemType "Directory" -Force
$null = New-Item -Path $TestDrive -Name $item_F -ItemType "File" -Force | ForEach-Object {$_.Attributes = "hidden"}
$null = New-Item -Path (Join-Path -Path $TestDrive -ChildPath $item_E) -Name $item_G -ItemType "File" -Force
$searchRoot = Join-Path $TestDrive -ChildPath "TestPS"
$file1 = Join-Path $searchRoot -ChildPath "D1" -AdditionalChildPath "File1.txt"
$file2 = Join-Path $searchRoot -ChildPath "File1.txt"
$PathWildCardTestCases = @(
@{Parameters = @{Path = $searchRoot; Recurse = $true; Directory = $true }; ExpectedCount = 1; Title = "directory without wildcard"},
@{Parameters = @{Path = (Join-Path $searchRoot '*'); Recurse = $true; Directory = $true }; ExpectedCount = 1; Title = "directory with wildcard"},
@{Parameters = @{Path = $searchRoot; Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file without wildcard"},
@{Parameters = @{Path = (Join-Path $searchRoot '*'); Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file with wildcard"},
@{Parameters = @{Path = (Join-Path $searchRoot 'F*.txt'); Recurse = $true; File = $true }; ExpectedCount = 1; Title = "file with wildcard filename"}
)
$SkipAppExeCLinks = $true
if ($IsWindows -and (Get-ChildItem -Path ~\AppData\Local\Microsoft\WindowsApps\*.exe -ErrorAction Ignore) -ne $null)
{
$SkipAppExeCLinks = $false
}
}
It "Should list the contents of the current folder" {
(Get-ChildItem .).Name.Length | Should -BeGreaterThan 0
}
It "Should list the contents of the root folder using Drive:\ notation" {
(Get-ChildItem TestDrive:\).Name.Length | Should -BeGreaterThan 0
}
It "Should list the contents of the root folder using Drive:\ notation from within another folder" {
try
{
Push-Location -Path TestDrive:\$item_E
(Get-ChildItem TestDrive:\ -File).Name.Length | Should -BeExactly 4
}
finally
{
Pop-Location
}
}
It "Should list the contents of the current folder using Drive: notation when in the root" {
(Get-ChildItem TestDrive:).Name.Length | Should -BeGreaterThan 0
}
It "Should list the contents of the current folder using Drive: notation when not in the root" {
try
{
Push-Location -Path TestDrive:\$item_E
(Get-ChildItem TestDrive:).Name | Should -BeExactly $item_G
}
finally
{
Pop-Location
}
}
It "Should list the contents of the home directory" {
Push-Location $HOME
(Get-ChildItem .).Name.Length | Should -BeGreaterThan 0
Pop-Location
}
It "Should have all the proper fields and be populated" {
$var = Get-Childitem .
$var.Name.Length | Should -BeGreaterThan 0
$var.Mode.Length | Should -BeGreaterThan 0
$var.LastWriteTime | Should -BeGreaterThan 0
$var.Length.Length | Should -BeGreaterThan 0
}
It "Should have mode property populated for protected files on Windows" -Skip:(!$IsWindows) {
$files = Get-Childitem -Force ~\NT*
$files.Count | Should -BeGreaterThan 0
foreach ($file in $files)
{
$file.Mode | Should -Not -BeNullOrEmpty
}
}
It "Should list files in sorted order" {
$files = Get-ChildItem -Path $TestDrive
$files[0].Name | Should -Be $item_E
$files[1].Name | Should -Be $item_a
$files[2].Name | Should -Be $item_B
$files[3].Name | Should -Be $item_c
$files[4].Name | Should -Be $item_D
}
It "Should list hidden files as well when 'Force' parameter is used" {
$files = Get-ChildItem -path $TestDrive -Force
$files | Should -Not -BeNullOrEmpty
$files.Count | Should -Be 6
$files.Name.Contains($item_F) | Should -BeTrue
}
It "Should list only hidden files when 'Hidden' parameter is used" {
$files = Get-ChildItem -path $TestDrive -Hidden
$files | Should -Not -BeNullOrEmpty
$files.Count | Should -Be 1
$files[0].Name | Should -BeExactly $item_F
}
It "Should find the hidden file if specified with hidden switch" {
$file = Get-ChildItem -Path (Join-Path $TestDrive $item_F) -Hidden
$file | Should -Not -BeNullOrEmpty
$file.Count | Should -Be 1
$file.Name | Should -BeExactly $item_F
}
It "Should list items in current directory only with depth set to 0" {
(Get-ChildItem -Path $TestDrive -Depth 0).Count | Should -Be 5
(Get-ChildItem -Path $TestDrive -Depth 0 -Include *).Count | Should -Be 5
(Get-ChildItem -Path $TestDrive -Depth 0 -Exclude IntentionallyNonexistent).Count | Should -Be 5
}
It "Should return items recursively when using 'Include' or 'Exclude' parameters" {
(Get-ChildItem -Path $TestDrive -Depth 1).Count | Should -Be 6
(Get-ChildItem -Path $TestDrive -Depth 1 -Include $item_G).Count | Should -Be 1
(Get-ChildItem -Path $TestDrive -Depth 1 -Exclude $item_a).Count | Should -Be 5
}
It "Should return items recursively when using 'Include' or 'Exclude' parameters with -LiteralPath" {
(Get-ChildItem -LiteralPath $TestDrive -Recurse -Exclude *).Count | Should Be 0
(Get-ChildItem -LiteralPath $TestDrive -Recurse -Include *.dll).Count | Should Be (Get-ChildItem $TestDrive -Recurse -Include *.dll).Count
(Get-ChildItem -LiteralPath $TestDrive -Depth 1 -Include $item_G).Count | Should Be 1
(Get-ChildItem -LiteralPath $TestDrive -Depth 1 -Exclude $item_a).Count | Should Be 5
}
It "get-childitem path wildcard - <title>" -TestCases $PathWildCardTestCases {
param($Parameters, $ExpectedCount)
$null = New-Item $file1 -Force -ItemType File
(Get-ChildItem @Parameters).Count | Should -Be $ExpectedCount
}
It "get-childitem with and without file in search root" {
$null = New-Item $file2 -Force -ItemType File
(Get-ChildItem -Path $searchRoot -File -Recurse).Count | Should -Be 2
(Get-ChildItem -Path $searchRoot -Directory -Recurse).Count | Should -Be 1
Remove-Item $file2 -ErrorAction SilentlyContinue -Force
(Get-ChildItem -Path $searchRoot -File -Recurse).Count | Should -Be 1
(Get-ChildItem -Path $searchRoot -Directory -Recurse).Count | Should -Be 1
}
It "Should give .sys file if the fullpath is specified with hidden and force parameter" -Pending {
$file = Get-ChildItem -path "$env:SystemDrive\\pagefile.sys" -Hidden
$file | Should not be $null
$file.Count | Should be 1
$file.Name | Should be "pagefile.sys"
}
It "-Filter *. finds extension-less files" {
$null = New-Item -Path TestDrive:/noextension -ItemType File
(Get-ChildItem -File -LiteralPath TestDrive:/ -Filter noext*.*).Name | Should -BeExactly 'noextension'
}
It "Understand APPEXECLINKs" -Skip:($SkipAppExeCLinks) {
$app = Get-ChildItem -Path ~\appdata\local\microsoft\windowsapps\*.exe | Select-Object -First 1
$app.Target | Should -Not -Be $app.FullName
$app.LinkType | Should -BeExactly 'AppExeCLink'
}
It "Wildcard matching behavior is the same between -Path and -Include parameters when using escape characters" {
$oldLocation = Get-Location
try {
Set-Location $TestDrive
$expectedPath = 'a`[b]'
$escapedPath = 'a```[b`]'
New-Item -Type File $expectedPath -ErrorAction SilentlyContinue > $null
$WithInclude = Get-ChildItem * -Include $escapedPath
$WithPath = Get-ChildItem -Path $escapedPath
$WithInclude.Name | Should -BeExactly $expectedPath
$WithPath.Name | Should -BeExactly $expectedPath
} finally {
Set-Location $oldLocation
}
}
}
Context 'Env: Provider' {
It 'can handle mixed case in Env variables' {
try
{
$env:__FOOBAR = 'foo'
$env:__foobar = 'bar'
$foobar = Get-Childitem env: | Where-Object {$_.Name -eq '__foobar'}
$count = if ($IsWindows) { 1 } else { 2 }
($foobar | Measure-Object).Count | Should -Be $count
}
catch
{
Get-ChildItem env: | Where-Object {$_.Name -eq '__foobar'} | Remove-Item -ErrorAction SilentlyContinue
}
}
}
}
Describe "Get-ChildItem with special path" -Tags "CI" {
BeforeAll {
$bracketDirName = "Test[Dir]"
$bracketDir = "Test``[Dir``]"
$bracketPath = Join-Path $TestDrive $bracketDir
$null = New-Item -Path $TestDrive -Name $bracketDirName -ItemType Directory -Force
}
It "Should list files in directory with name containing bracket char" {
$null = New-Item -Path $bracketPath -Name file1.txt -ItemType File
$null = New-Item -Path $bracketPath -Name file2.txt -ItemType File
Get-ChildItem -Path $bracketPath | Should -HaveCount 2
}
}
Describe 'FileSystem Provider Formatting' -Tag "CI","RequireAdminOnWindows" {
BeforeAll {
$modeTestDir = New-Item -Path "$TestDrive/testmodedirectory" -ItemType Directory -Force
$targetFile1 = New-Item -Path "$TestDrive/targetFile1" -ItemType File -Force
$targetFile2 = New-Item -Path "$TestDrive/targetFile2" -ItemType File -Force
$targetDir1 = New-Item -Path "$TestDrive/targetDir1" -ItemType Directory -Force
$targetDir2 = New-Item -Path "$TestDrive/targetDir2" -ItemType Directory -Force
$testcases = @(
@{ expectedMode = "d----"; expectedModeWithoutHardlink = "d----"; itemType = "Directory"; itemName = "Directory"; fileAttributes = [System.IO.FileAttributes] "Directory"; target = $null }
@{ expectedMode = "l----"; expectedModeWithoutHardlink = "l----"; itemType = "SymbolicLink"; itemName = "SymbolicLink-Directory"; fileAttributes = [System.IO.FileAttributes]::Directory -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetDir2.FullName }
)
if ($IsWindows)
{
$testcases += @{ expectedMode = "l----"; expectedModeWithoutHardlink = "l----"; itemType = "Junction"; itemName = "Junction-Directory"; fileAttributes = [System.IO.FileAttributes]::Directory -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetDir1.FullName }
$testcases += @{ expectedMode = "-a---"; expectedModeWithoutHardlink = "-a---"; itemType = "File"; itemName = "ArchiveFile"; fileAttributes = [System.IO.FileAttributes] "Archive"; target = $null }
$testcases += @{ expectedMode = "la---"; expectedModeWithoutHardlink = "la---"; itemType = "SymbolicLink"; itemName = "SymbolicLink-File"; fileAttributes = [System.IO.FileAttributes]::Archive -bor [System.IO.FileAttributes]::ReparsePoint; target = $targetFile1.FullName }
$testcases += @{ expectedMode = "la---"; expectedModeWithoutHardlink = "-a---"; itemType = "HardLink"; itemName = "HardLink"; fileAttributes = [System.IO.FileAttributes] "Archive"; target = $targetFile2.FullName }
}
}
It 'Validate Mode property - <itemName>' -TestCases $testcases {
param($expectedMode, $expectedModeWithoutHardlink, $itemType, $itemName, $fileAttributes, $target)
$item = if ($target)
{
New-Item -Path $modeTestDir -Name $itemName -ItemType $itemType -Target $target
}
else
{
New-Item -Path $modeTestDir -Name $itemName -ItemType $itemType
}
$item | Should -BeOfType "System.IO.FileSystemInfo"
$actualMode = [Microsoft.PowerShell.Commands.FileSystemProvider]::Mode($item)
$actualMode | Should -BeExactly $expectedMode
$actualModeWithoutHardlink = [Microsoft.PowerShell.Commands.FileSystemProvider]::ModeWithoutHardlink($item)
$actualModeWithoutHardlink | Should -BeExactly $expectedModeWithoutHardlink
$item.Attributes | Should -Be $fileAttributes
}
}
|
combined_dataset/train/non-malicious/sample_28_8.ps1
|
sample_28_8.ps1
|
#
# Module manifest for module 'OCI.PSModules.Workrequests'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Workrequests.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'bfd147d7-2910-4621-842b-b948c79cda01'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Workrequests Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Workrequests.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWorkrequestsList', 'Get-OCIWorkrequestsWorkRequest',
'Get-OCIWorkrequestsWorkRequestErrorsList',
'Get-OCIWorkrequestsWorkRequestLogsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Workrequests'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2594.ps1
|
2594.ps1
|
param($Path = "C:\Users\mmessano\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows PowerShell.lnk" )
$Black = 0
$DarkBlue = 1
$DarkGreen = 2
$DarkCyan = 3
$DarkRed = 4
$DarkMagenta = 5
$DarkYellow = 6
$Gray = 7
$DarkGray = 8
$Blue = 9
$Green = 10
$Cyan = 11
$Red = 12
$Magenta = 13
$Yellow = 14
$White = 15
$lnk = E:\Dexma\powershell_bits\Get-Link.ps1 $Path
$lnk.ConsoleColors[$Black] = "
$lnk.ConsoleColors[$DarkBlue] = "
$lnk.ConsoleColors[$DarkGreen] = "
$lnk.ConsoleColors[$DarkCyan] = "
$lnk.ConsoleColors[$DarkRed] = "
$lnk.ConsoleColors[$DarkMagenta] = "
$lnk.ConsoleColors[$DarkYellow] = "
$lnk.ConsoleColors[$Gray] = "
$lnk.ConsoleColors[$DarkGray] = "
$lnk.ConsoleColors[$Blue] = "
$lnk.ConsoleColors[$Green] = "
$lnk.ConsoleColors[$Cyan] = "
$lnk.ConsoleColors[$Red] = "
$lnk.ConsoleColors[$Magenta] = "
$lnk.ConsoleColors[$Yellow] = "
$lnk.ConsoleColors[$White] = "
$lnk.Save()
|
combined_dataset/train/non-malicious/1392.ps1
|
1392.ps1
|
function Set-CDotNetConnectionString
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Parameter(Mandatory=$true)]
[string]
$Value,
[string]
$ProviderName,
[Switch]
$Framework,
[Switch]
$Framework64,
[Switch]
$Clr2,
[Switch]
$Clr4
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( -not ($Framework -or $Framework64) )
{
Write-Error "You must supply either or both of the Framework and Framework64 switches."
return
}
if( -not ($Clr2 -or $Clr4) )
{
Write-Error "You must supply either or both of the Clr2 and Clr4 switches."
return
}
$runtimes = @()
if( $Clr2 )
{
$runtimes += 'v2.0'
}
if( $Clr4 )
{
$runtimes += 'v4.0'
}
$runtimes | ForEach-Object {
$params = @{
FilePath = (Join-Path $CarbonBinDir 'Set-DotNetConnectionString.ps1' -Resolve);
ArgumentList = @(
(ConvertTo-CBase64 -Value $Name),
(ConvertTo-CBase64 -Value $Value),
(ConvertTo-CBase64 -Value $ProviderName)
);
Runtime = $_;
ExecutionPolicy = [Microsoft.PowerShell.ExecutionPolicy]::RemoteSigned;
}
if( $Framework )
{
Invoke-CPowerShell @params -x86
}
if( $Framework64 )
{
Invoke-CPowerShell @params
}
}
}
|
combined_dataset/train/non-malicious/3901.ps1
|
3901.ps1
|
function Test-RemoveComputeNodes
{
param([string]$poolId)
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$deallocationOption = ([Microsoft.Azure.Batch.Common.ComputeNodeRebootOption]::Terminate)
$resizeTimeout = ([TimeSpan]::FromMinutes(8))
$computeNodes = Get-AzBatchComputeNode -PoolId $poolId -BatchContext $context
$computeNodeId = $computeNodes[0].Id
$computeNodeId2 = $computeNodes[1].Id
Remove-AzBatchComputeNode -PoolId $poolId @($computeNodeId, $computeNodeId2) -Force -BatchContext $context
$select = "id,state"
$computeNodes = Get-AzBatchComputeNode -PoolId $poolId -Select $select -BatchContext $context
$start = [DateTime]::Now
$timeout = Compute-TestTimeout 30
$end = $start.AddSeconds($timeout)
while ($computeNodes[0].State -ne 'LeavingPool' -and $computeNodes[1].State -ne 'LeavingPool')
{
if ([DateTime]::Now -gt $end)
{
throw [System.TimeoutException] "Timed out waiting for compute nodes to enter LeavingPool state"
}
Start-TestSleep 1000
$computeNodes = Get-AzBatchComputeNode -PoolId $poolId -Select $select -BatchContext $context
}
}
function Test-RebootAndReimageComputeNode
{
param([string]$poolId, [string]$computeNodeId, [string]$computeNodeId2)
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$rebootOption = ([Microsoft.Azure.Batch.Common.ComputeNodeRebootOption]::Terminate)
$reimageOption = ([Microsoft.Azure.Batch.Common.ComputeNodeReimageOption]::Terminate)
Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Restart-AzBatchComputeNode -RebootOption $rebootOption -BatchContext $context
$computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -BatchContext $context
Assert-AreEqual 'Rebooting' $computeNode.State
Get-AzBatchComputeNode $poolId $computeNodeId2 -BatchContext $context | Reset-AzBatchComputeNode -ReimageOption $reimageOption -BatchContext $context
$computeNode2 = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId2 -BatchContext $context
Assert-AreEqual 'Reimaging' $computeNode2.State
}
function Test-DisableAndEnableComputeNodeScheduling
{
param([string]$poolId, [string]$computeNodeId)
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$disableOption = ([Microsoft.Azure.Batch.Common.DisableComputeNodeSchedulingOption]::Terminate)
Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Disable-AzBatchComputeNodeScheduling -DisableSchedulingOption $disableOption -BatchContext $context
$computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -Select "id,schedulingState" -BatchContext $context
Assert-AreEqual 'Disabled' $computeNode.SchedulingState
$computeNode | Enable-AzBatchComputeNodeScheduling -BatchContext $context
$computeNode = Get-AzBatchComputeNode -PoolId $poolId $computeNodeId -Select "id,schedulingState" -BatchContext $context
Assert-AreEqual 'Enabled' $computeNode.SchedulingState
}
function Test-GetRemoteLoginSettings
{
param([string]$poolId, [string]$computeNodeId)
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$remoteLoginSettings = Get-AzBatchComputeNode $poolId $computeNodeId -BatchContext $context | Get-AzBatchRemoteLoginSettings -BatchContext $context
Assert-AreNotEqual $null $remoteLoginSettings.IPAddress
Assert-AreNotEqual $null $remoteLoginSettings.Port
}
|
combined_dataset/train/non-malicious/2760.ps1
|
2760.ps1
|
function Get-LogonSession
{
param
(
[Parameter(Mandatory = $true)]
[UInt32]
$LogonId
)
$LogonMap = @{}
Get-WmiObject Win32_LoggedOnUser | %{
$Identity = $_.Antecedent | Select-String 'Domain="(.*)",Name="(.*)"'
$LogonSession = $_.Dependent | Select-String 'LogonId="(\d+)"'
$LogonMap[$LogonSession.Matches[0].Groups[1].Value] = New-Object PSObject -Property @{
Domain = $Identity.Matches[0].Groups[1].Value
UserName = $Identity.Matches[0].Groups[2].Value
}
}
Get-WmiObject Win32_LogonSession -Filter "LogonId = `"$($LogonId)`"" | %{
$LogonType = $Null
switch($_.LogonType) {
$null {$LogonType = 'None'}
0 { $LogonType = 'System' }
2 { $LogonType = 'Interactive' }
3 { $LogonType = 'Network' }
4 { $LogonType = 'Batch' }
5 { $LogonType = 'Service' }
6 { $LogonType = 'Proxy' }
7 { $LogonType = 'Unlock' }
8 { $LogonType = 'NetworkCleartext' }
9 { $LogonType = 'NewCredentials' }
10 { $LogonType = 'RemoteInteractive' }
11 { $LogonType = 'CachedInteractive' }
12 { $LogonType = 'CachedRemoteInteractive' }
13 { $LogonType = 'CachedUnlock' }
default { $LogonType = $_.LogonType}
}
New-Object PSObject -Property @{
UserName = $LogonMap[$_.LogonId].UserName
Domain = $LogonMap[$_.LogonId].Domain
LogonId = $_.LogonId
LogonType = $LogonType
AuthenticationPackage = $_.AuthenticationPackage
Caption = $_.Caption
Description = $_.Description
InstallDate = $_.InstallDate
Name = $_.Name
StartTime = $_.ConvertToDateTime($_.StartTime)
}
}
}
function New-InMemoryModule
{
Param
(
[Parameter(Position = 0)]
[ValidateNotNullOrEmpty()]
[String]
$ModuleName = [Guid]::NewGuid().ToString()
)
$AppDomain = [Reflection.Assembly].Assembly.GetType('System.AppDomain').GetProperty('CurrentDomain').GetValue($null, @())
$LoadedAssemblies = $AppDomain.GetAssemblies()
foreach ($Assembly in $LoadedAssemblies) {
if ($Assembly.FullName -and ($Assembly.FullName.Split(',')[0] -eq $ModuleName)) {
return $Assembly
}
}
$DynAssembly = New-Object Reflection.AssemblyName($ModuleName)
$Domain = $AppDomain
$AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, 'Run')
$ModuleBuilder = $AssemblyBuilder.DefineDynamicModule($ModuleName, $False)
return $ModuleBuilder
}
function func
{
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[String]
$DllName,
[Parameter(Position = 1, Mandatory = $True)]
[string]
$FunctionName,
[Parameter(Position = 2, Mandatory = $True)]
[Type]
$ReturnType,
[Parameter(Position = 3)]
[Type[]]
$ParameterTypes,
[Parameter(Position = 4)]
[Runtime.InteropServices.CallingConvention]
$NativeCallingConvention,
[Parameter(Position = 5)]
[Runtime.InteropServices.CharSet]
$Charset,
[String]
$EntryPoint,
[Switch]
$SetLastError
)
$Properties = @{
DllName = $DllName
FunctionName = $FunctionName
ReturnType = $ReturnType
}
if ($ParameterTypes) { $Properties['ParameterTypes'] = $ParameterTypes }
if ($NativeCallingConvention) { $Properties['NativeCallingConvention'] = $NativeCallingConvention }
if ($Charset) { $Properties['Charset'] = $Charset }
if ($SetLastError) { $Properties['SetLastError'] = $SetLastError }
if ($EntryPoint) { $Properties['EntryPoint'] = $EntryPoint }
New-Object PSObject -Property $Properties
}
function Add-Win32Type
{
[OutputType([Hashtable])]
Param(
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[String]
$DllName,
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[String]
$FunctionName,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[String]
$EntryPoint,
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[Type]
$ReturnType,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Type[]]
$ParameterTypes,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Runtime.InteropServices.CallingConvention]
$NativeCallingConvention = [Runtime.InteropServices.CallingConvention]::StdCall,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Runtime.InteropServices.CharSet]
$Charset = [Runtime.InteropServices.CharSet]::Auto,
[Parameter(ValueFromPipelineByPropertyName = $True)]
[Switch]
$SetLastError,
[Parameter(Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[ValidateNotNull()]
[String]
$Namespace = ''
)
BEGIN
{
$TypeHash = @{}
}
PROCESS
{
if ($Module -is [Reflection.Assembly])
{
if ($Namespace)
{
$TypeHash[$DllName] = $Module.GetType("$Namespace.$DllName")
}
else
{
$TypeHash[$DllName] = $Module.GetType($DllName)
}
}
else
{
if (!$TypeHash.ContainsKey($DllName))
{
if ($Namespace)
{
$TypeHash[$DllName] = $Module.DefineType("$Namespace.$DllName", 'Public,BeforeFieldInit')
}
else
{
$TypeHash[$DllName] = $Module.DefineType($DllName, 'Public,BeforeFieldInit')
}
}
$Method = $TypeHash[$DllName].DefineMethod(
$FunctionName,
'Public,Static,PinvokeImpl',
$ReturnType,
$ParameterTypes)
$i = 1
foreach($Parameter in $ParameterTypes)
{
if ($Parameter.IsByRef)
{
[void] $Method.DefineParameter($i, 'Out', $null)
}
$i++
}
$DllImport = [Runtime.InteropServices.DllImportAttribute]
$SetLastErrorField = $DllImport.GetField('SetLastError')
$CallingConventionField = $DllImport.GetField('CallingConvention')
$CharsetField = $DllImport.GetField('CharSet')
$EntryPointField = $DllImport.GetField('EntryPoint')
if ($SetLastError) { $SLEValue = $True } else { $SLEValue = $False }
if ($PSBoundParameters['EntryPoint']) { $ExportedFuncName = $EntryPoint } else { $ExportedFuncName = $FunctionName }
$Constructor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([String])
$DllImportAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($Constructor,
$DllName, [Reflection.PropertyInfo[]] @(), [Object[]] @(),
[Reflection.FieldInfo[]] @($SetLastErrorField,
$CallingConventionField,
$CharsetField,
$EntryPointField),
[Object[]] @($SLEValue,
([Runtime.InteropServices.CallingConvention] $NativeCallingConvention),
([Runtime.InteropServices.CharSet] $Charset),
$ExportedFuncName))
$Method.SetCustomAttribute($DllImportAttribute)
}
}
END
{
if ($Module -is [Reflection.Assembly])
{
return $TypeHash
}
$ReturnTypes = @{}
foreach ($Key in $TypeHash.Keys)
{
$Type = $TypeHash[$Key].CreateType()
$ReturnTypes[$Key] = $Type
}
return $ReturnTypes
}
}
function psenum
{
[OutputType([Type])]
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[Parameter(Position = 1, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[String]
$FullName,
[Parameter(Position = 2, Mandatory = $True)]
[Type]
$Type,
[Parameter(Position = 3, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[Hashtable]
$EnumElements,
[Switch]
$Bitfield
)
if ($Module -is [Reflection.Assembly])
{
return ($Module.GetType($FullName))
}
$EnumType = $Type -as [Type]
$EnumBuilder = $Module.DefineEnum($FullName, 'Public', $EnumType)
if ($Bitfield)
{
$FlagsConstructor = [FlagsAttribute].GetConstructor(@())
$FlagsCustomAttribute = New-Object Reflection.Emit.CustomAttributeBuilder($FlagsConstructor, @())
$EnumBuilder.SetCustomAttribute($FlagsCustomAttribute)
}
foreach ($Key in $EnumElements.Keys)
{
$null = $EnumBuilder.DefineLiteral($Key, $EnumElements[$Key] -as $EnumType)
}
$EnumBuilder.CreateType()
}
function field
{
Param
(
[Parameter(Position = 0, Mandatory = $True)]
[UInt16]
$Position,
[Parameter(Position = 1, Mandatory = $True)]
[Type]
$Type,
[Parameter(Position = 2)]
[UInt16]
$Offset,
[Object[]]
$MarshalAs
)
@{
Position = $Position
Type = $Type -as [Type]
Offset = $Offset
MarshalAs = $MarshalAs
}
}
function struct
{
[OutputType([Type])]
Param
(
[Parameter(Position = 1, Mandatory = $True)]
[ValidateScript({($_ -is [Reflection.Emit.ModuleBuilder]) -or ($_ -is [Reflection.Assembly])})]
$Module,
[Parameter(Position = 2, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[String]
$FullName,
[Parameter(Position = 3, Mandatory = $True)]
[ValidateNotNullOrEmpty()]
[Hashtable]
$StructFields,
[Reflection.Emit.PackingSize]
$PackingSize = [Reflection.Emit.PackingSize]::Unspecified,
[Switch]
$ExplicitLayout
)
if ($Module -is [Reflection.Assembly])
{
return ($Module.GetType($FullName))
}
[Reflection.TypeAttributes] $StructAttributes = 'AnsiClass,
Class,
Public,
Sealed,
BeforeFieldInit'
if ($ExplicitLayout)
{
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::ExplicitLayout
}
else
{
$StructAttributes = $StructAttributes -bor [Reflection.TypeAttributes]::SequentialLayout
}
$StructBuilder = $Module.DefineType($FullName, $StructAttributes, [ValueType], $PackingSize)
$ConstructorInfo = [Runtime.InteropServices.MarshalAsAttribute].GetConstructors()[0]
$SizeConst = @([Runtime.InteropServices.MarshalAsAttribute].GetField('SizeConst'))
$Fields = New-Object Hashtable[]($StructFields.Count)
foreach ($Field in $StructFields.Keys)
{
$Index = $StructFields[$Field]['Position']
$Fields[$Index] = @{FieldName = $Field; Properties = $StructFields[$Field]}
}
foreach ($Field in $Fields)
{
$FieldName = $Field['FieldName']
$FieldProp = $Field['Properties']
$Offset = $FieldProp['Offset']
$Type = $FieldProp['Type']
$MarshalAs = $FieldProp['MarshalAs']
$NewField = $StructBuilder.DefineField($FieldName, $Type, 'Public')
if ($MarshalAs)
{
$UnmanagedType = $MarshalAs[0] -as ([Runtime.InteropServices.UnmanagedType])
if ($MarshalAs[1])
{
$Size = $MarshalAs[1]
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo,
$UnmanagedType, $SizeConst, @($Size))
}
else
{
$AttribBuilder = New-Object Reflection.Emit.CustomAttributeBuilder($ConstructorInfo, [Object[]] @($UnmanagedType))
}
$NewField.SetCustomAttribute($AttribBuilder)
}
if ($ExplicitLayout) { $NewField.SetOffset($Offset) }
}
$SizeMethod = $StructBuilder.DefineMethod('GetSize',
'Public, Static',
[Int],
[Type[]] @())
$ILGenerator = $SizeMethod.GetILGenerator()
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder)
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call,
[Type].GetMethod('GetTypeFromHandle'))
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Call,
[Runtime.InteropServices.Marshal].GetMethod('SizeOf', [Type[]] @([Type])))
$ILGenerator.Emit([Reflection.Emit.OpCodes]::Ret)
$ImplicitConverter = $StructBuilder.DefineMethod('op_Implicit',
'PrivateScope, Public, Static, HideBySig, SpecialName',
$StructBuilder,
[Type[]] @([IntPtr]))
$ILGenerator2 = $ImplicitConverter.GetILGenerator()
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Nop)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldarg_0)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ldtoken, $StructBuilder)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call,
[Type].GetMethod('GetTypeFromHandle'))
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Call,
[Runtime.InteropServices.Marshal].GetMethod('PtrToStructure', [Type[]] @([IntPtr], [Type])))
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Unbox_Any, $StructBuilder)
$ILGenerator2.Emit([Reflection.Emit.OpCodes]::Ret)
$StructBuilder.CreateType()
}
$Mod = New-InMemoryModule -ModuleName Thread
$LuidAttributes = psenum $Mod Thread.LuidAttributes UInt32 @{
DISABLED = '0x00000000'
SE_PRIVILEGE_ENABLED_BY_DEFAULT = '0x00000001'
SE_PRIVILEGE_ENABLED = '0x00000002'
SE_PRIVILEGE_REMOVED = '0x00000004'
SE_PRIVILEGE_USED_FOR_ACCESS = '0x80000000'
} -Bitfield
$MemProtection = psenum $Mod Thread.MemProtection UInt32 @{
PAGE_EXECUTE = 0x10
PAGE_EXECUTE_READ = 0x20
PAGE_EXECUTE_READWRITE = 0x40
PAGE_EXECUTE_WRITECOPY = 0x80
PAGE_NOACCESS = 0x01
PAGE_READONLY = 0x02
PAGE_READWRITE = 0x04
PAGE_WRITECOPY = 0x08
PAGE_TARGETS_INVALID = 0x40000000
PAGE_TARGETS_NO_UPDATE = 0x40000000
PAGE_GUARD = 0x100
PAGE_NOCACHE = 0x200
PAGE_WRITECOMBINE = 0x400
} -Bitfield
$MemState = psenum $Mod Thread.MemState UInt32 @{
MEM_COMMIT = 0x1000
MEM_RESERVE = 0x2000
MEM_FREE = 0x10000
}
$MemType = psenum $Mod Thread.MemType UInt32 @{
MEM_PRIVATE = 0x20000
MEM_MAPPED = 0x40000
MEM_IMAGE = 0x1000000
}
$SecurityEntity = psenum $Mod Thread.SecurityEntity UInt32 @{
SeCreateTokenPrivilege = 1
SeAssignPrimaryTokenPrivilege = 2
SeLockMemoryPrivilege = 3
SeIncreaseQuotaPrivilege = 4
SeUnsolicitedInputPrivilege = 5
SeMachineAccountPrivilege = 6
SeTcbPrivilege = 7
SeSecurityPrivilege = 8
SeTakeOwnershipPrivilege = 9
SeLoadDriverPrivilege = 10
SeSystemProfilePrivilege = 11
SeSystemtimePrivilege = 12
SeProfileSingleProcessPrivilege = 13
SeIncreaseBasePriorityPrivilege = 14
SeCreatePagefilePrivilege = 15
SeCreatePermanentPrivilege = 16
SeBackupPrivilege = 17
SeRestorePrivilege = 18
SeShutdownPrivilege = 19
SeDebugPrivilege = 20
SeAuditPrivilege = 21
SeSystemEnvironmentPrivilege = 22
SeChangeNotifyPrivilege = 23
SeRemoteShutdownPrivilege = 24
SeUndockPrivilege = 25
SeSyncAgentPrivilege = 26
SeEnableDelegationPrivilege = 27
SeManageVolumePrivilege = 28
SeImpersonatePrivilege = 29
SeCreateGlobalPrivilege = 30
SeTrustedCredManAccessPrivilege = 31
SeRelabelPrivilege = 32
SeIncreaseWorkingSetPrivilege = 33
SeTimeZonePrivilege = 34
SeCreateSymbolicLinkPrivilege = 35
}
$SidNameUser = psenum $Mod Thread.SID_NAME_USE UInt32 @{
SidTypeUser = 1
SidTypeGroup = 2
SidTypeDomain = 3
SidTypeAlias = 4
SidTypeWellKnownGroup = 5
SidTypeDeletedAccount = 6
SidTypeInvalid = 7
SidTypeUnknown = 8
SidTypeComputer = 9
}
$TokenInformationClass = psenum $Mod Thread.TOKEN_INFORMATION_CLASS UInt16 @{
TokenUser = 1
TokenGroups = 2
TokenPrivileges = 3
TokenOwner = 4
TokenPrimaryGroup = 5
TokenDefaultDacl = 6
TokenSource = 7
TokenType = 8
TokenImpersonationLevel = 9
TokenStatistics = 10
TokenRestrictedSids = 11
TokenSessionId = 12
TokenGroupsAndPrivileges = 13
TokenSessionReference = 14
TokenSandBoxInert = 15
TokenAuditPolicy = 16
TokenOrigin = 17
TokenElevationType = 18
TokenLinkedToken = 19
TokenElevation = 20
TokenHasRestrictions = 21
TokenAccessInformation = 22
TokenVirtualizationAllowed = 23
TokenVirtualizationEnabled = 24
TokenIntegrityLevel = 25
TokenUIAccess = 26
TokenMandatoryPolicy = 27
TokenLogonSid = 28
TokenIsAppContainer = 29
TokenCapabilities = 30
TokenAppContainerSid = 31
TokenAppContainerNumber = 32
TokenUserClaimAttributes = 33
TokenDeviceClaimAttributes = 34
TokenRestrictedUserClaimAttributes = 35
TokenRestrictedDeviceClaimAttributes = 36
TokenDeviceGroups = 37
TokenRestrictedDeviceGroups = 38
TokenSecurityAttributes = 39
TokenIsRestricted = 40
MaxTokenInfoClass = 41
}
$LUID = struct $Mod Thread.Luid @{
LowPart = field 0 $SecurityEntity
HighPart = field 1 Int32
}
$LUID_AND_ATTRIBUTES = struct $Mod Thread.LuidAndAttributes @{
Luid = field 0 $LUID
Attributes = field 1 UInt32
}
$MEMORYBASICINFORMATION = struct $Mod Thread.MEMORY_BASIC_INFORMATION @{
BaseAddress = field 0 UIntPtr
AllocationBase = field 1 UIntPtr
AllocationProtect = field 2 UInt32
RegionSize = field 3 UIntPtr
State = field 4 UInt32
Protect = field 5 UInt32
Type = field 6 UInt32
}
$SID_AND_ATTRIBUTES = struct $Mod Thread.SidAndAttributes @{
Sid = field 0 IntPtr
Attributes = field 1 UInt32
}
$THREADENTRY32 = struct $Mod Thread.THREADENTRY32 @{
dwSize = field 0 UInt32
cntUsage = field 1 UInt32
th32ThreadID = field 2 UInt32
th32OwnerProcessID = field 3 UInt32
tpBasePri = field 4 UInt32
tpDeltaPri = field 5 UInt32
dwFlags = field 6 UInt32
}
$TOKEN_MANDATORY_LABEL = struct $Mod Thread.TokenMandatoryLabel @{
Label = field 0 $SID_AND_ATTRIBUTES;
}
$TOKEN_ORIGIN = struct $Mod Thread.TokenOrigin @{
OriginatingLogonSession = field 0 UInt64
}
$TOKEN_PRIVILEGES = struct $Mod Thread.TokenPrivileges @{
PrivilegeCount = field 0 UInt32
Privileges = field 1 $LUID_AND_ATTRIBUTES.MakeArrayType() -MarshalAs @('ByValArray', 50)
}
$TOKEN_USER = struct $Mod Thread.TOKEN_USER @{
User = field 0 $SID_AND_ATTRIBUTES
}
$FunctionDefinitions = @(
(func kernel32 CloseHandle ([bool]) @(
[IntPtr]
) -SetLastError),
(func advapi32 ConvertSidToStringSid ([bool]) @(
[IntPtr]
[IntPtr].MakeByRefType()
) -SetLastError),
(func kernel32 CreateToolhelp32Snapshot ([IntPtr]) @(
[UInt32],
[UInt32]
) -SetLastError),
(func advapi32 GetTokenInformation ([bool]) @(
[IntPtr],
[Int32],
[IntPtr],
[UInt32],
[UInt32].MakeByRefType()
) -SetLastError),
(func ntdll NtQueryInformationThread ([UInt32]) @(
[IntPtr],
[Int32],
[IntPtr],
[Int32],
[IntPtr]
)),
(func kernel32 OpenProcess ([IntPtr]) @(
[UInt32],
[bool],
[UInt32]
) -SetLastError),
(func advapi32 OpenProcessToken ([bool]) @(
[IntPtr],
[UInt32],
[IntPtr].MakeByRefType()
) -SetLastError),
(func kernel32 OpenThread ([IntPtr]) @(
[UInt32],
[bool],
[UInt32]
) -SetLastError),
(func advapi32 OpenThreadToken ([bool]) @(
[IntPtr],
[UInt32],
[bool],
[IntPtr].MakeByRefType()
) -SetLastError),
(func kernel32 QueryFullProcessImageName ([bool]) @(
[IntPtr]
[UInt32]
[System.Text.StringBuilder]
[UInt32].MakeByRefType()
) -SetLastError),
(func kernel32 ReadProcessMemory ([Bool]) @(
[IntPtr],
[IntPtr],
[Byte[]],
[Int],
[Int].MakeByRefType()
) -SetLastError),
(func kernel32 TerminateThread ([bool]) @(
[IntPtr],
[UInt32]
) -SetLastError),
(func kernel32 Thread32First ([bool]) @(
[IntPtr],
$THREADENTRY32.MakeByRefType()
) -SetLastError)
(func kernel32 Thread32Next ([bool]) @(
[IntPtr],
$THREADENTRY32.MakeByRefType()
) -SetLastError),
(func kernel32 VirtualQueryEx ([Int32]) @(
[IntPtr],
[IntPtr],
$MEMORYBASICINFORMATION.MakeByRefType(),
[UInt32]
) -SetLastError)
)
$Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32SysInfo'
$Kernel32 = $Types['kernel32']
$Ntdll = $Types['ntdll']
$Advapi32 = $Types['advapi32']
$DELETE = 0x00010000
$READ_CONTROL = 0x00020000
$SYNCHRONIZE = 0x00100000
$WRITE_DAC = 0x00040000
$WRITE_OWNER = 0x00080000
$PROCESS_CREATE_PROCESS = 0x0080
$PROCESS_CREATE_THREAD = 0x0002
$PROCESS_DUP_HANDLE = 0x0040
$PROCESS_QUERY_INFORMATION = 0x0400
$PROCESS_QUERY_LIMITED_INFORMATION = 0x1000
$PROCESS_SET_INFORMATION = 0x0200
$PROCESS_SET_QUOTA = 0x0100
$PROCESS_SUSPEND_RESUME = 0x0800
$PROCESS_TERMINATE = 0x0001
$PROCESS_VM_OPERATION = 0x0008
$PROCESS_VM_READ = 0x0010
$PROCESS_VM_WRITE = 0x0020
$PROCESS_ALL_ACCESS = $DELETE -bor
$READ_CONTROL -bor
$SYNCHRONIZE -bor
$WRITE_DAC -bor
$WRITE_OWNER -bor
$PROCESS_CREATE_PROCESS -bor
$PROCESS_CREATE_THREAD -bor
$PROCESS_DUP_HANDLE -bor
$PROCESS_QUERY_INFORMATION -bor
$PROCESS_QUERY_LIMITED_INFORMATION -bor
$PROCESS_SET_INFORMATION -bor
$PROCESS_SET_QUOTA -bor
$PROCESS_SUSPEND_RESUME -bor
$PROCESS_TERMINATE -bor
$PROCESS_VM_OPERATION -bor
$PROCESS_VM_READ -bor
$PROCESS_VM_WRITE
$THREAD_DIRECT_IMPERSONATION = 0x0200
$THREAD_GET_CONTEXT = 0x0008
$THREAD_IMPERSONATE = 0x0100
$THREAD_QUERY_INFORMATION = 0x0040
$THREAD_QUERY_LIMITED_INFORMATION = 0x0800
$THREAD_SET_CONTEXT = 0x0010
$THREAD_SET_INFORMATION = 0x0020
$THREAD_SET_LIMITED_INFORMATION = 0x0400
$THREAD_SET_THREAD_TOKEN = 0x0080
$THREAD_SUSPEND_RESUME = 0x0002
$THREAD_TERMINATE = 0x0001
$THREAD_ALL_ACCESS = $DELETE -bor
$READ_CONTROL -bor
$SYNCHRONIZE -bor
$WRITE_DAC -bor
$WRITE_OWNER -bor
$THREAD_DIRECT_IMPERSONATION -bor
$THREAD_GET_CONTEXT -bor
$THREAD_IMPERSONATE -bor
$THREAD_QUERY_INFORMATION -bor
$THREAD_QUERY_LIMITED_INFORMATION -bor
$THREAD_SET_CONTEXT -bor
$THREAD_SET_LIMITED_INFORMATION -bor
$THREAD_SET_THREAD_TOKEN -bor
$THREAD_SUSPEND_RESUME -bor
$THREAD_TERMINATE
$STANDARD_RIGHTS_REQUIRED = 0x000F0000
$TOKEN_ASSIGN_PRIMARY = 0x0001
$TOKEN_DUPLICATE = 0x0002
$TOKEN_IMPERSONATE = 0x0004
$TOKEN_QUERY = 0x0008
$TOKEN_QUERY_SOURCE = 0x0010
$TOKEN_ADJUST_PRIVILEGES = 0x0020
$TOKEN_ADJUST_GROUPS = 0x0040
$TOKEN_ADJUST_DEFAULT = 0x0080
$TOKEN_ADJUST_SESSIONID = 0x0100
$TOKEN_ALL_ACCESS = $STANDARD_RIGHTS_REQUIRED -bor
$TOKEN_ASSIGN_PRIMARY -bor
$TOKEN_DUPLICATE -bor
$TOKEN_IMPERSONATE -bor
$TOKEN_QUERY -bor
$TOKEN_QUERY_SOURCE -bor
$TOKEN_ADJUST_PRIVILEGES -bor
$TOKEN_ADJUST_GROUPS -bor
$TOKEN_ADJUST_DEFAULT
$UNTRUSTED_MANDATORY_LEVEL = "S-1-16-0"
$LOW_MANDATORY_LEVEL = "S-1-16-4096"
$MEDIUM_MANDATORY_LEVEL = "S-1-16-8192"
$MEDIUM_PLUS_MANDATORY_LEVEL = "S-1-16-8448"
$HIGH_MANDATORY_LEVEL = "S-1-16-12288"
$SYSTEM_MANDATORY_LEVEL = "S-1-16-16384"
$PROTECTED_PROCESS_MANDATORY_LEVEL = "S-1-16-20480"
$SECURE_PROCESS_MANDATORY_LEVEL = "S-1-16-28672"
function CloseHandle
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$Handle
)
$Success = $Kernel32::CloseHandle($Handle); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "Close Handle Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
}
function ConvertSidToStringSid
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$SidPointer
)
$StringPtr = [IntPtr]::Zero
$Success = $Advapi32::ConvertSidToStringSid($SidPointer, [ref]$StringPtr); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "ConvertSidToStringSid Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output ([System.Runtime.InteropServices.Marshal]::PtrToStringAuto($StringPtr))
}
function CreateToolhelp32Snapshot
{
param
(
[Parameter(Mandatory = $true)]
[UInt32]
$ProcessId,
[Parameter(Mandatory = $true)]
[UInt32]
$Flags
)
$hSnapshot = $Kernel32::CreateToolhelp32Snapshot($Flags, $ProcessId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $hSnapshot)
{
Write-Debug "CreateToolhelp32Snapshot Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $hSnapshot
}
function GetTokenInformation
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$TokenHandle,
[Parameter(Mandatory = $true)]
$TokenInformationClass
)
$TokenPtrSize = 0
$Success = $Advapi32::GetTokenInformation($TokenHandle, $TokenInformationClass, 0, $TokenPtrSize, [ref]$TokenPtrSize)
[IntPtr]$TokenPtr = [System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize)
$Success = $Advapi32::GetTokenInformation($TokenHandle, $TokenInformationClass, $TokenPtr, $TokenPtrSize, [ref]$TokenPtrSize); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($Success)
{
switch($TokenInformationClass)
{
1
{
$TokenUser = $TokenPtr -as $TOKEN_USER
ConvertSidToStringSid -SidPointer $TokenUser.User.Sid
}
3
{
$TokenPrivileges = $TokenPtr -as $TOKEN_PRIVILEGES
$sb = New-Object System.Text.StringBuilder
for($i=0; $i -lt $TokenPrivileges.PrivilegeCount; $i++)
{
if((($TokenPrivileges.Privileges[$i].Attributes -as $LuidAttributes) -band $LuidAttributes::SE_PRIVILEGE_ENABLED) -eq $LuidAttributes::SE_PRIVILEGE_ENABLED)
{
$sb.Append(", $($TokenPrivileges.Privileges[$i].Luid.LowPart.ToString())") | Out-Null
}
}
Write-Output $sb.ToString().TrimStart(', ')
}
17
{
$TokenOrigin = $TokenPtr -as $LUID
Write-Output (Get-LogonSession -LogonId $TokenOrigin.LowPart)
}
22
{
}
25
{
$TokenIntegrity = $TokenPtr -as $TOKEN_MANDATORY_LABEL
switch(ConvertSidToStringSid -SidPointer $TokenIntegrity.Label.Sid)
{
$UNTRUSTED_MANDATORY_LEVEL
{
Write-Output "UNTRUSTED_MANDATORY_LEVEL"
}
$LOW_MANDATORY_LEVEL
{
Write-Output "LOW_MANDATORY_LEVEL"
}
$MEDIUM_MANDATORY_LEVEL
{
Write-Output "MEDIUM_MANDATORY_LEVEL"
}
$MEDIUM_PLUS_MANDATORY_LEVEL
{
Write-Output "MEDIUM_PLUS_MANDATORY_LEVEL"
}
$HIGH_MANDATORY_LEVEL
{
Write-Output "HIGH_MANDATORY_LEVEL"
}
$SYSTEM_MANDATORY_LEVEL
{
Write-Output "SYSTEM_MANDATORY_LEVEL"
}
$PROTECTED_PROCESS_MANDATORY_LEVEL
{
Write-Output "PROTECTED_PROCESS_MANDATORY_LEVEL"
}
$SECURE_PROCESS_MANDATORY_LEVEL
{
Write-Output "SECURE_PROCESS_MANDATORY_LEVEL"
}
}
}
}
}
else
{
Write-Debug "GetTokenInformation Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
try
{
[System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr)
}
catch
{
}
}
function NtQueryInformationThread
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ThreadHandle
)
$buf = [System.Runtime.InteropServices.Marshal]::AllocHGlobal([IntPtr]::Size)
$Success = $Ntdll::NtQueryInformationThread($ThreadHandle, 9, $buf, [IntPtr]::Size, [IntPtr]::Zero); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "NtQueryInformationThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output ([System.Runtime.InteropServices.Marshal]::ReadIntPtr($buf))
}
function OpenProcess
{
param
(
[Parameter(Mandatory = $true)]
[UInt32]
$ProcessId,
[Parameter(Mandatory = $true)]
[UInt32]
$DesiredAccess,
[Parameter()]
[bool]
$InheritHandle = $false
)
$hProcess = $Kernel32::OpenProcess($DesiredAccess, $InheritHandle, $ProcessId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($hProcess -eq 0)
{
Write-Debug "OpenProcess Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $hProcess
}
function OpenProcessToken
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ProcessHandle,
[Parameter(Mandatory = $true)]
[UInt32]
$DesiredAccess
)
$hToken = [IntPtr]::Zero
$Success = $Advapi32::OpenProcessToken($ProcessHandle, $DesiredAccess, [ref]$hToken); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "OpenProcessToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $hToken
}
function OpenThread
{
param
(
[Parameter(Mandatory = $true)]
[UInt32]
$ThreadId,
[Parameter(Mandatory = $true)]
[UInt32]
$DesiredAccess,
[Parameter()]
[bool]
$InheritHandle = $false
)
$hThread = $Kernel32::OpenThread($DesiredAccess, $InheritHandle, $ThreadId); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($hThread -eq 0)
{
Write-Debug "OpenThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $hThread
}
function OpenThreadToken
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ThreadHandle,
[Parameter(Mandatory = $true)]
[UInt32]
$DesiredAccess,
[Parameter()]
[bool]
$OpenAsSelf = $false
)
$hToken = [IntPtr]::Zero
$Success = $Advapi32::OpenThreadToken($ThreadHandle, $DesiredAccess, $OpenAsSelf, [ref]$hToken); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "OpenThreadToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
throw "OpenThreadToken Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $hToken
}
function QueryFullProcessImageName
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ProcessHandle,
[Parameter()]
[UInt32]
$Flags = 0
)
$capacity = 2048
$sb = New-Object -TypeName System.Text.StringBuilder($capacity)
$Success = $Kernel32::QueryFullProcessImageName($ProcessHandle, $Flags, $sb, [ref]$capacity); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "QueryFullProcessImageName Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $sb.ToString()
}
function ReadProcessMemory
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ProcessHandle,
[Parameter(Mandatory = $true)]
[IntPtr]
$BaseAddress,
[Parameter(Mandatory = $true)]
[Int]
$Size
)
$buf = New-Object byte[]($Size)
[Int32]$NumberOfBytesRead = 0
$Success = $Kernel32::ReadProcessMemory($ProcessHandle, $BaseAddress, $buf, $buf.Length, [ref]$NumberOfBytesRead); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "ReadProcessMemory Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $buf
}
function TerminateThread
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ThreadHandle,
[Parameter()]
[UInt32]
$ExitCode = 0
)
$Success = $Kernel32::TerminateThread($ThreadHandle, $ExitCode); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "TerminateThread Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
}
function Thread32First
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$SnapshotHandle
)
$Thread = [Activator]::CreateInstance($THREADENTRY32)
$Thread.dwSize = $THREADENTRY32::GetSize()
$Success = $Kernel32::Thread32First($hSnapshot, [Ref]$Thread); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "Thread32First Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $Thread
}
function VirtualQueryEx
{
param
(
[Parameter(Mandatory = $true)]
[IntPtr]
$ProcessHandle,
[Parameter(Mandatory = $true)]
[IntPtr]
$BaseAddress
)
$memory_basic_info = [Activator]::CreateInstance($MEMORYBASICINFORMATION)
$Success = $Kernel32::VirtualQueryEx($ProcessHandle, $BaseAddress, [Ref]$memory_basic_info, $MEMORYBASICINFORMATION::GetSize()); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error()
if(-not $Success)
{
Write-Debug "VirtualQueryEx Error: $(([ComponentModel.Win32Exception] $LastError).Message)"
}
Write-Output $memory_basic_info
}
$hSnapshot = CreateToolhelp32Snapshot -ProcessId 0 -Flags 4
$Thread = Thread32First -SnapshotHandle $hSnapshot
do
{
$proc = Get-Process -Id $Thread.th32OwnerProcessId
if($Thread.th32OwnerProcessId -ne 0 -and $Thread.th32OwnerProcessId -ne 4)
{
$hThread = OpenThread -ThreadId $Thread.th32ThreadID -DesiredAccess $THREAD_ALL_ACCESS -InheritHandle $false
if($hThread -ne 0)
{
$BaseAddress = NtQueryInformationThread -ThreadHandle $hThread
$hProcess = OpenProcess -ProcessId $Thread.th32OwnerProcessID -DesiredAccess $PROCESS_ALL_ACCESS -InheritHandle $false
if($hProcess -ne 0)
{
$memory_basic_info = VirtualQueryEx -ProcessHandle $hProcess -BaseAddress $BaseAddress
$AllocatedMemoryProtection = $memory_basic_info.AllocationProtect -as $MemProtection
$MemoryProtection = $memory_basic_info.Protect -as $MemProtection
$MemoryState = $memory_basic_info.State -as $MemState
$MemoryType = $memory_basic_info.Type -as $MemType
if($MemoryState -eq $MemState::MEM_COMMIT -and $MemoryType -ne $MemType::MEM_IMAGE)
{
$buf = ReadProcessMemory -ProcessHandle $hProcess -BaseAddress $BaseAddress -Size 100
$proc = Get-WmiObject Win32_Process -Filter "ProcessId = '$($Thread.th32OwnerProcessID)'"
$KernelPath = QueryFullProcessImageName -ProcessHandle $hProcess
$PathMismatch = $proc.Path.ToLower() -ne $KernelPath.ToLower()
try
{
$hThreadToken = OpenThreadToken -ThreadHandle $hThread -DesiredAccess $TOKEN_ALL_ACCESS
$SID = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 1
$Privs = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 3
$LogonSession = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 17
$Integrity = GetTokenInformation -TokenHandle $hThreadToken -TokenInformationClass 25
$IsUniqueThreadToken = $true
}
catch
{
$hProcessToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess $TOKEN_ALL_ACCESS
$SID = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 1
$Privs = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 3
$LogonSession = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 17
$Integrity = GetTokenInformation -TokenHandle $hProcessToken -TokenInformationClass 25
$IsUniqueThreadToken = $false
}
$ThreadDetail = New-Object PSObject
$ThreadDetail | Add-Member -MemberType Noteproperty -Name ProcessName -Value $proc.Name
$ThreadDetail | Add-Member -MemberType Noteproperty -Name ProcessId -Value $proc.ProcessId
$ThreadDetail | Add-Member -MemberType Noteproperty -Name Path -Value $proc.Path
$ThreadDetail | Add-Member -MemberType Noteproperty -Name KernelPath -Value $KernelPath
$ThreadDetail | Add-Member -MemberType Noteproperty -Name CommandLine -Value $proc.CommandLine
$ThreadDetail | Add-Member -MemberType Noteproperty -Name PathMismatch -Value $PathMismatch
$ThreadDetail | Add-Member -MemberType Noteproperty -Name ThreadId -Value $Thread.th32ThreadId
$ThreadDetail | Add-Member -MemberType Noteproperty -Name AllocatedMemoryProtection -Value $AllocatedMemoryProtection
$ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryProtection -Value $MemoryProtection
$ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryState -Value $MemoryState
$ThreadDetail | Add-Member -MemberType Noteproperty -Name MemoryType -Value $MemoryType
$ThreadDetail | Add-Member -MemberType Noteproperty -Name BasePriority -Value $Thread.tpBasePri
$ThreadDetail | Add-Member -MemberType Noteproperty -Name IsUniqueThreadToken -Value $IsUniqueThreadToken
$ThreadDetail | Add-Member -MemberType Noteproperty -Name Integrity -Value $Integrity
$ThreadDetail | Add-Member -MemberType Noteproperty -Name Privilege -Value $Privs
$ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonId -Value $LogonSession.LogonId
$ThreadDetail | Add-Member -MemberType Noteproperty -Name SecurityIdentifier -Value $SID
$ThreadDetail | Add-Member -MemberType Noteproperty -Name UserName -Value "$($LogonSession.Domain)\$($LogonSession.UserName)"
$ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonSessionStartTime -Value $LogonSession.StartTime
$ThreadDetail | Add-Member -MemberType Noteproperty -Name LogonType -Value $LogonSession.LogonType
$ThreadDetail | Add-Member -MemberType Noteproperty -Name AuthenticationPackage -Value $LogonSession.AuthenticationPackage
$ThreadDetail | Add-Member -MemberType Noteproperty -Name BaseAddress -Value $BaseAddress
$ThreadDetail | Add-Member -MemberType Noteproperty -Name Size -Value $memory_basic_info.RegionSize
$ThreadDetail | Add-Member -MemberType Noteproperty -Name Bytes -Value $buf
$ThreadDetail
}
CloseHandle($hProcess)
}
}
CloseHandle($hThread)
}
} while($Kernel32::Thread32Next($hSnapshot, [ref]$Thread))
CloseHandle($hSnapshot)
|
combined_dataset/train/non-malicious/sample_56_81.ps1
|
sample_56_81.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Tests whether an output’s datasource is reachable and usable by the Azure Stream Analytics service.
.Description
Tests whether an output’s datasource is reachable and usable by the Azure Stream Analytics service.
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
DATASOURCE <IOutputDataSource>: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests.
Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests.
INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter
[ClusterName <String>]: The name of the cluster.
[FunctionName <String>]: The name of the function.
[Id <String>]: Resource identity path
[InputName <String>]: The name of the input.
[JobName <String>]: The name of the streaming job.
[Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/
[OutputName <String>]: The name of the output.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[TransformationName <String>]: The name of the transformation.
OUTPUT <IOutput>: An output object, containing all information associated with the named output. All outputs are contained under a streaming job.
[Datasource <IOutputDataSource>]: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests.
Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests.
[ETag <String>]:
[SerializationType <EventSerializationType?>]: Indicates the type of serialization that the input or output uses. Required on PUT (CreateOrReplace) requests.
[SizeWindow <Single?>]:
[TimeWindow <String>]:
.Link
https://learn.microsoft.com/powershell/module/az.streamanalytics/test-azstreamanalyticsoutput
#>
function Test-AzStreamAnalyticsOutput {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus])]
[CmdletBinding(DefaultParameterSetName='TestExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the streaming job.
${JobName},
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Alias('OutputName')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the output.
${Name},
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='TestExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
$InputObject = Get-AzStreamAnalyticsOutput @PSBoundParameters
$resourceId = $InputObject.Id
$PSBoundParameters.Add("InputObject", $resourceId)
$PSBoundParameters.Add("Output", $InputObject)
if ($PSBoundParameters.ContainsKey("JobName"))
{
$null = $PSBoundParameters.Remove("JobName")
}
if ($PSBoundParameters.ContainsKey("Name"))
{
$null = $PSBoundParameters.Remove("Name")
}
if ($PSBoundParameters.ContainsKey("ResourceGroupName"))
{
$null = $PSBoundParameters.Remove("ResourceGroupName")
}
if ($PSBoundParameters.ContainsKey("SubscriptionId"))
{
$null = $PSBoundParameters.Remove("SubscriptionId")
}
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', $true)
}
Az.StreamAnalytics.Internal\Test-AzStreamAnalyticsOutput @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCae/LokSBRlkmp
# E8FbTx3gEKeHqusVcNDdUmZSoojEpKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINRg
# tekkkmII/R24pD2Ctb2AOvTUQurUQrv+vVKaDQfnMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAdl1MLMFK0hY6Fs45VKEX/lgm4T+J5wKSq4yn
# FbCd0dVrulFy4GA6bsxDXDyOCI7QKbUVB4zf7y4Iv4tXyTC+2Y8VC2pTQGDmvrb8
# GJdRbEhLEfwjDar4KHbuQ9Pea+PDsnOFNVJX3RJf9/0L1XUfiloH6Qk4xLCEN2I5
# oUZsHcXEFylXegcKjBueSTyD7Eu80d1lgUqJCKmfCDGVsU1GQ1RyPe0Y8jDO6a0l
# ivH4P5ZzVJ5zWWj6egQRCuigrXhl5fmRu3rnG1VXvvsMSQ/LQZfmcTxoyGLC0iui
# uuMhfXPBslbMPXfQThxwP3V9BOQm7mzYX5Uv39cXkKvTN0siGaGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCMEEsMoaPXtaZHmBYYRROqfPwQ4f9FP6Wk
# ziBMIcOkwAIGZh/SmF+2GBMyMDI0MDQyMzEzMTUyNi45NDRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA
# 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7
# 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY
# SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4
# dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq
# cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE
# izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J
# VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/
# 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu
# QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm
# z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc
# c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd
# JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG
# gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup
# gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU
# wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg
# oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD
# YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu
# dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3
# 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu
# uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD
# C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY
# FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD
# d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQy
# NDA5NDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS
# 7DAHAgEAAgISrzAKAgUA6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# ADCABKpo/NApeGAt90g97xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2f
# GPvThUiQemQ8jwI/aA1i5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60
# f1cT69nPDTDg+i6ONCMmCZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA
# AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQg0Q256WScT5hIqpaTDTKXyXz1Yj0Fmapg+vRvUxHC
# HtEwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb
# 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNaw
# ncfq1eDXUwS6ExT0PRgiMA0GCSqGSIb3DQEBCwUABIICAGUkYnS4TFWfH7QTA8TS
# yIQg3BWHqvp2EMmzXHFddctHZE2ghvOLPx5vH/N/jqBQ6BmjKRbjZgAJUrWKQVBL
# 20h38vIUjzsLNnlH8X1335BZmI320E2cj7Wg+Ya/vJP3ULlixS+d5P/2oY2Iib31
# Ks/q7Mr3wKxlodRbCJP+e3T2PqRlI14IjqZqbZpd8CXzHAu4Of1JZm3JYPqmgqHT
# DpsT6v84bCQdhDKhquAWajIMpfURyh6tGMlG7fdCafL1/K3hs29Y+mxJUy6M7vIj
# +aJy1zaCU2KIdrm7xFDYxD3Js4fY2DEoLq9ThHJOlaV8RvicTPSFA52Wp976sA6L
# WCECybILbxwj7F9tt9enGxRDojkcDCElrfezccFa0etFDunj4f1OwRSL1FsZu1V8
# Mdtfsed6WqpeYuVUMVN+86Rm680YC4eJ2xt48qw+fWChWgUZih9dTud3O+9Ck0S+
# KoJ2S1Py7PRAhGkgKpGpvJPH8SkYIImqie3bI5XR/bDg9ZvJ+ALw1IvvXysO0LLC
# 6Pixu3DLprUZfohMlbxjaIErzhGeLoqMvsVHs7GaxWaKneTbPHIPXkswIL0eoNmJ
# FaCN1jomuvRvwDs36MoF15NWzfb9Ik3/jsebue9PCCr6EYJFKayR7vWgmAVQ/tkW
# xD04mVvuvaMoVepiexmoXkPT
# SIG # End signature block
|
combined_dataset/train/non-malicious/ResetOutlookLivePassword.ps1
|
ResetOutlookLivePassword.ps1
|
function Reset-OutlookLivePassword {
<#
.SYNOPSIS
Resets an Outlook Live account password.
.DESCRIPTION
The Reset-OutlookLivePassword function resets an Outlook Live (Live@edu) acccount password.
A remote session is opened to the Outlook Live service. Connecting to the remote service requires administrative credentials to
Outlook Live. The function optionally stores the credential for subsequent use with the SaveCredential parameter.
The stored credential is protected using the Windows Data Protection API (DPAPI).
.PARAMETER Identity
Specifies the identity of the Outlook Live user account. Acceptable values include:
* User principal name (UPN)
.PARAMETER Password
Specifies a new password for the account.
A plain text string may be supplied or by not specifing the parameter a prompt for secure entry will appear.
.PARAMETER ResetPasswordOnNextLogon
Specifies that the user will be forced to reset their password at next logon.
.PARAMETER Credential
Specifies a credential for connecting to the Outlook Live remote session.
.PARAMETER SaveCredential
Specifies that the credential provided to connect to the Outlook Live remote session will be saved for subsequent use.
The Windows Data Protection API (DPAPI) is used to encrypt the password string representation.
.EXAMPLE
Reset-OutlookLivePassword unique.name@mydomain.edu
Resets the Outlook Live password on the account unique.name@mydomain.edu to the password specified in a secure entry prompt.
.EXAMPLE
Reset-OutlookLivePassword unique.name@mydomain.edu -Password HelloDave
Resets the Outlook Live password on the account unique.name@mydomain.edu to the password HelloDave.
.EXAMPLE
Reset-OutlookLivePassword unique.name@mydomain.edu -Password HelloDave -SaveCredential
Resets the Outlook Live password on the account unique.name@mydomain.edu to the password HelloDave and saves the remote session credential.
.INPUTS
System.String, System.Security.SecureString
.OUTPUTS
None
.NOTES
Name: Reset-OutlookLivePassword
Author: Rich Kusak
Created: 2010-07-30
LastEdit: 2011-08-28 16:27
Version: 2.0.0.0
.LINK
http://outlookliveanswers.com/forums/p/10/15.aspx
#>
[CmdletBinding(DefaultParameterSetName='Default', SupportsShouldProcess=$true)]
param (
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)]
[string]$Identity,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[ValidateScript({
if ($_ -is [System.String] -or $_ -is [System.Security.SecureString]) {$true} else {
throw "The argument '$_' is not of type System.String or System.Security.SecureString."
}
})]
$Password = (Read-Host 'Enter New Password' -AsSecureString),
[Parameter(ValueFromPipelineByPropertyName=$true)]
[switch]$ResetPasswordOnNextLogon,
[Parameter(ParameterSetName='Default', ValueFromPipelineByPropertyName=$true)]
[Parameter(ParameterSetName='Save', Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[System.Management.Automation.PSCredential]$Credential,
[Parameter(ParameterSetName='Save', ValueFromPipelineByPropertyName=$true)]
[switch]$SaveCredential
)
begin {
function Save-Credential {
param ($Path, $Credential)
if (Test-Path $Path) {
$attribs = [IO.FileAttributes]('Normal')
Set-ItemProperty $Path -Name Attributes -Value $attribs -Force
}
New-Object PSObject -Property @{
'UserName' = $Credential.UserName
'Password' = $Credential.Password | ConvertFrom-SecureString
} | Export-Csv $Path -NoTypeInformation -Force
$attribs = [IO.FileAttributes]('Hidden', 'ReadOnly')
Set-ItemProperty $Path -Name Attributes -Value $attribs -Force
} # function Save-Credential
# The location where a credential will be saved
$psFolder = Split-Path $PROFILE
$credFile = Join-Path $psFolder -ChildPath 'b94437da-2522-4bd4-903f-4b3f8ec7132a.csv'
if (Test-Path $credFile) {
if ($Credential -and $SaveCredential) {
Write-Warning 'A saved credential already exists.'
do {
$prompt = Read-Host 'Do you want to overwrite the saved credential? (Y)es or (N)o.'
} until ('^Yes$|^No$' -match $prompt)
}
switch ($prompt) {
{$_ -match 'Y'} {
Write-Debug "Performing operation 'Save-Credential' on target '$credFile'."
Save-Credential -Path $credFile -Credential $Credential
$importedCredFile = Import-Csv $credFile
$liveUserName = $importedCredFile.UserName
$livePassword = $importedCredFile.Password | ConvertTo-SecureString
break
}
{$_ -match 'N'} {
$liveUserName = $Credential.UserName
$livePassword = $Credential.Password
break
}
default {
$importedCredFile = Import-Csv $credFile
$liveUserName = $importedCredFile.UserName
$livePassword = $importedCredFile.Password | ConvertTo-SecureString
}
} # switch
$liveCred = New-Object System.Management.Automation.PSCredential($liveUserName, $livePassword)
} else {
if (-not $Credential) {
try {
$Credential = Get-Credential -ErrorAction Stop
} catch {
throw $_
}
}
$liveCred = New-Object System.Management.Automation.PSCredential($Credential.UserName, $Credential.Password)
if ($SaveCredential) {
if (-not (Test-Path $psFolder)) {
New-Item $psFolder -ItemType Directory -Force | Out-Null
}
Write-Debug "Performing operation 'Save-Credential' on target '$credFile'."
Save-Credential -Path $credFile -Credential $Credential
}
}
# Remote session parameters
$connectionUri = 'https://ps.outlook.com/powershell/'
$newPSSessionParameters = @{
'ConfigurationName' = 'Microsoft.Exchange'
'ConnectionUri' = $connectionUri
'Credential' = $liveCred
'Authentication' = 'Basic'
'AllowRedirection' = $true
}
try {
Write-Debug "Performing operation 'New-PSSession' on target '$connectionUri'."
$session = New-PSSession @newPSSessionParameters -ErrorAction Stop
Write-Verbose "Successfully opened new remote session to '$connectionUri'."
if ($PSBoundParameters['Verbose']) {
$session
Write-Host
}
} catch {
throw $_
}
} # begin
process {
if ($Password -is [System.String]) {
Write-Debug "Performing operation 'ConvertTo-SecureString' on target 'Password'."
$Password = $Password | ConvertTo-SecureString -AsPlainText -Force
}
if ($PSBoundParameters['WarningAction']) {
$WarningAction = $PSBoundParameters['WarningAction']
} else {
$WarningAction = $WarningPreference
}
if ($PSBoundParameters['WhatIf']) {
$WhatIf = $PSBoundParameters['WhatIf']
} else {
$WhatIf = $WhatIfPreference
}
$setMailboxParameters = @{
'Identity' = $Identity
'Password' = $Password
'ResetPasswordOnNextLogon' = $ResetPasswordOnNextLogon
'WarningAction' = $WarningAction
'WhatIf' = $WhatIf
}
try {
Write-Debug "Performing operation 'Invoke-Command' on target '$($session.ComputerName)'."
# Invoke remote command to set a new password
Invoke-Command -Session $session -ArgumentList $setMailboxParameters -ErrorAction Stop -ScriptBlock {
param ($setMailboxParameters)
Set-Mailbox @setMailboxParameters
}
} catch {
return Write-Error $_
}
} # process
end {
Write-Debug "Performing operation 'Remove-PSSession' on target '$($session.ComputerName)'."
# Close the remote session
Remove-PSSession $session -ErrorAction Stop -WhatIf:$false
Write-Verbose "Successfully removed remote session to '$connectionUri'."
} # end
} # function Reset-OutlookLivePassword
|
combined_dataset/train/non-malicious/537.ps1
|
537.ps1
|
function Add-SPOTextFieldtoList
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string] $listTitle,
[Parameter(Mandatory=$true, Position=2)]
[string] $fieldName
)
$newField = "<Field Type='Text' DisplayName='$fieldName' Name='$fieldName' required='FALSE' />"
Add-SPOField $listTitle $fieldName $newField
}
|
combined_dataset/train/non-malicious/copy-data.ps1
|
copy-data.ps1
|
function copy-data {
param($source, $dest)
$counter = 0
$files = Get-ChildItem $source -Force -Recurse
foreach($file in $files)
{
$status = "Copying file {0} of {1}: {2}" -f $counter, $files.count, $file.name
Write-Progress -Activity "Copyng Files" -Status $status -PercentComplete ($counter/$files.count * 100)
Copy-Item $file.pspath $dest -Force
$counter++
}
}
|
combined_dataset/train/non-malicious/LibraryPrompt.ps1
|
LibraryPrompt.ps1
|
##############################################################################\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\nSet-StrictMode -Version Latest\n\nfunction Prompt\n{\n $id = 1\n $historyItem = Get-History -Count 1\n if($historyItem)\n {\n $id = $historyItem.Id + 1\n }\n\n Write-Host -ForegroundColor DarkGray "`n[$(Get-Location)]"\n Write-Host -NoNewLine "PS:$id > "\n $host.UI.RawUI.WindowTitle = "$(Get-Location)"\n\n "`b"\n}
|
combined_dataset/train/non-malicious/sample_7_48.ps1
|
sample_7_48.ps1
|
#************************************************
# TS_ClusterCAUWMINamespaceCheck.ps1
# Version 1.0.1
# Date: 1/16/2013
# Author: v-kaw
# Description: [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP)
# Rule number: 6519
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6519
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 6519
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_ClusterCAUWMINamespaceCheck"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
Function IsCluster #Check if this machine is cluster.
{
$ClusterKeyName = "HKLM:\Cluster"
if (Test-Path -Path $ClusterKeyName)
{
return $true
}
else
{
return $false
}
}
Function AppliesToSystem
{
#Add your logic here to specify on which environments this rule will appy
return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2) -and (IsCluster) ) #win8
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_
if($_.Exception.ErrorCode -ne $null)
{
$Script:ErrorCode = "0X{0:X}" -f $_.Exception.ErrorCode
}
elseif ($_.Exception.HResult -ne $null)
{
$Script:ErrorCode = "0X{0:X}" -f $_.Exception.HResult
}
elseif (($_.Exception -eq $null) -and ($_.HResult -ne $null))
{
$Script:ErrorCode = "0X{0:X}" -f $_.HResult
}
if ($_.Exception.Message -ne $null)
{
$Script:ErrorMessage = $_.Exception.Message
}
elseif ($_.ErrorDetails.Message -ne $null)
{
$Script:ErrorMessage = $_.ErrorDetails.Message
}
elseif($_.FullyQualifiedErrorId -ne $null)
{
$Script:ErrorMessage = $_.FullyQualifiedErrorId
}
continue
}
$Error.Clear()
$Scope = [System.Management.ManagementScope] "\\.\root\Microsoft\Windows\ClusterUpdate"
$Scope.Connect()
if ($Error.Count -eq 0)
{
$query = [System.Management.ObjectQuery] "Select * from MSFT_CAUNode"
$Searcher = New-Object System.Management.ManagementObjectSearcher
$Searcher.Scope = $Scope
$Searcher.Query = $query
$Searcher.Get()
}
if ($Error.Count -gt 0)
{
$RootCauseDetected = $true
$InformationCollected | add-member -membertype noteproperty -name "Cluster Node" -value $ComputerName
$InformationCollected | add-member -membertype noteproperty -name "WMI namespace" -value 'root\Microsoft\Windows\ClusterUpdate'
$InformationCollected | add-member -membertype noteproperty -name "WMI Class" -value 'MSFT_CAUNode'
$InformationCollected | add-member -membertype noteproperty -name "Error accessing Class" -value $Script:ErrorMessage
$InformationCollected | add-member -membertype noteproperty -name "Exception code" -value $Script:ErrorCode
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+CPouWGtLilfA
# nnLCONmz6uCGVOjFVZTqS9cY5RmcpKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFP4WgDEPcbiop4FMOA14jJm
# Oa+e4EYgd3bC7NtyS5jyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUfb2B3M6ayTC4FwCjVOeiAV5Symx5uZlrWjuraZY7jJpbrPkIDFSRiGO
# rlGkBy//V71xKdgkuJJSWhlsvSV6G0v/KGoLaSfLPZNCwX059AiICVCEV0GnGYkf
# p50zdLQlQF1Ip/gGwxJmk59H+e8xvL3KhmDCCfCccW9SwQ5UfcdNmP3ytC952rNM
# Qc4LmfDIiTLPzS6EoSlKWj3W8upnIquzjzyaNF/h2dLoqMjen+QTjNEYrUvrZOv0
# FchZMKN3vIg14aa3/XKT8YoLFEepr4v3zj6PuDyobTVVM6okIPvAG0wM8gtVHugX
# mgTU98+7V68D5bfeh9mNwrL1B2Qy2aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAlCjvdYghahAcoYuvvVe4hJoPbaS2XKQq/D+dk8WsBOgIGZxp1kNwj
# GBMyMDI0MTAyODExNDA0MC43MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDHtxO58ehri6G5lDzDowdfYxhpSOi/O/m7amXccc4HBjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAPMhc0ABoA1rRbkDKbEcPrVa/
# +oM/znyEElOFfbXEdX7GAKo4hp4STN+lXVBPph/2eH+QNwCcojrY0ek/umaV87IK
# j6CbzfmwLnKKhZQFPP8oV3MUYWL/0gtl0KWBQdEkIKtYL1dKPqugiBwCPMN2J6Vb
# RrTJPiqS69AOxyRPJBmnZQ3VJ8NG5PoaZeLiHVkIjNS1EBW5YlmTEmzZI8YfgAiE
# p+z5o40JsDSfcLLRkMwKQ0vkyu1z8GeLYlx77nvRF4AmF5HKlhEvWoCatjBZHhZR
# Y3uA9mqzg8S/IV5HEO0ggCtSlWCVW/h+uz3uI3Zfs6uEKSm/cP9Puu+cMS57Pdtg
# 7n8vninwJDEwqdiIz18cxIlsszlK2y/o7dWA2Kd8zpih8rLU48MaDJrNNHsFNKzx
# HSnSKT/w8AaL8EfBj4zoxmi9g4sKWfVPO9N6zvm2cYAdaVBw+JMUM/cFXuQjCYQ4
# qoo5dqFroTNxDQB8bPvT2qYNQnebVQdBObq9isIH8mX8c7+N/hqcZuiWJLlKNo+2
# HSsaWd23EjfF1BHa9eIHemj3N6ebcYArojxFY4/LtTunUTtg44sPrsHbBvVcAbjs
# ySk3WCjqFGQ604oXuS6mSf8yBjgSbB9A3mQQsAGZ8FDKElUXUN6mRudRmgeHRG4K
# VbwPiqpINDvxwNJ1DMo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4401.ps1
|
4401.ps1
|
function Add-ArgumentCompleter()
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string[]]$cmdlets,
[Parameter(Mandatory=$true)]
[string]$parameterName
)
try
{
if(Get-Command -Name Register-ArgumentCompleter -ErrorAction SilentlyContinue)
{
Register-ArgumentCompleter -CommandName $cmdlets -ParameterName $parameterName -ScriptBlock {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameter)
Get-PSRepository -Name "$wordTocomplete*"-ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Foreach-Object {
[System.Management.Automation.CompletionResult]::new($_.Name, $_.Name, 'ParameterValue', $_.Name)
}
}
}
}
catch
{
Write-Debug -Message "Error registering argument completer: $_"
}
}
|
combined_dataset/train/non-malicious/sample_4_79.ps1
|
sample_4_79.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datacatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll'
# Version number of this module.
ModuleVersion = '92.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datacatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatacatalogCatalogLock',
'Add-OCIDatacatalogCatalogPrivateEndpointLock',
'Add-OCIDatacatalogDataSelectorPatterns',
'Add-OCIDatacatalogMetastoreLock',
'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern',
'DisMount-OCIDatacatalogCatalogPrivateEndpoint',
'Export-OCIDatacatalogGlossary',
'Get-OCIDatacatalogAggregatedPhysicalEntitiesList',
'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList',
'Get-OCIDatacatalogAttributeTag',
'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog',
'Get-OCIDatacatalogCatalogPrivateEndpoint',
'Get-OCIDatacatalogCatalogPrivateEndpointsList',
'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection',
'Get-OCIDatacatalogConnectionsList',
'Get-OCIDatacatalogCustomPropertiesList',
'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset',
'Get-OCIDatacatalogDataAssetsList',
'Get-OCIDatacatalogDataAssetTag',
'Get-OCIDatacatalogDataAssetTagsList',
'Get-OCIDatacatalogDerivedLogicalEntitiesList',
'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity',
'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList',
'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList',
'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList',
'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary',
'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition',
'Get-OCIDatacatalogJobDefinitionsList',
'Get-OCIDatacatalogJobExecution',
'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog',
'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics',
'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList',
'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList',
'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList',
'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList',
'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList',
'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship',
'Get-OCIDatacatalogTermRelationshipsList',
'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType',
'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest',
'Get-OCIDatacatalogWorkRequestErrorsList',
'Get-OCIDatacatalogWorkRequestLogsList',
'Get-OCIDatacatalogWorkRequestsList',
'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset',
'Import-OCIDatacatalogGlossary', 'Import-OCIDatacatalogLineage',
'Invoke-OCIDatacatalogAssociateCustomProperty',
'Invoke-OCIDatacatalogAsynchronousExportDataAsset',
'Invoke-OCIDatacatalogAsynchronousExportGlossary',
'Invoke-OCIDatacatalogDisassociateCustomProperty',
'Invoke-OCIDatacatalogExpandTreeForGlossary',
'Invoke-OCIDatacatalogFetchEntityLineage',
'Invoke-OCIDatacatalogObjectStats',
'Invoke-OCIDatacatalogParseConnection',
'Invoke-OCIDatacatalogProcessRecommendation',
'Invoke-OCIDatacatalogRecommendations',
'Invoke-OCIDatacatalogSearchCriteria',
'Invoke-OCIDatacatalogSuggestMatches',
'Invoke-OCIDatacatalogSynchronousExportDataAsset',
'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers',
'Mount-OCIDatacatalogCatalogPrivateEndpoint',
'Move-OCIDatacatalogCatalogCompartment',
'Move-OCIDatacatalogCatalogPrivateEndpointCompartment',
'Move-OCIDatacatalogMetastoreCompartment',
'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag',
'New-OCIDatacatalogCatalog',
'New-OCIDatacatalogCatalogPrivateEndpoint',
'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty',
'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag',
'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag',
'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag',
'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob',
'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution',
'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace',
'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm',
'New-OCIDatacatalogTermRelationship',
'Remove-OCIDatacatalogAttribute',
'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog',
'Remove-OCIDatacatalogCatalogLock',
'Remove-OCIDatacatalogCatalogPrivateEndpoint',
'Remove-OCIDatacatalogCatalogPrivateEndpointLock',
'Remove-OCIDatacatalogConnection',
'Remove-OCIDatacatalogCustomProperty',
'Remove-OCIDatacatalogDataAsset',
'Remove-OCIDatacatalogDataAssetTag',
'Remove-OCIDatacatalogDataSelectorPatterns',
'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag',
'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag',
'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob',
'Remove-OCIDatacatalogJobDefinition',
'Remove-OCIDatacatalogMetastore',
'Remove-OCIDatacatalogMetastoreLock',
'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern',
'Remove-OCIDatacatalogTerm',
'Remove-OCIDatacatalogTermRelationship',
'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog',
'Update-OCIDatacatalogCatalogPrivateEndpoint',
'Update-OCIDatacatalogConnection',
'Update-OCIDatacatalogCustomProperty',
'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity',
'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary',
'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition',
'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace',
'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm',
'Update-OCIDatacatalogTermRelationship',
'Write-OCIDatacatalogCredentials'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/328.ps1
|
328.ps1
|
function ConvertFrom-PSFArray
{
[CmdletBinding()]
param (
[Parameter(Position = 0)]
[string]
$JoinBy = ', ',
[Parameter(Position = 1)]
[string[]]
$PropertyName = '*',
[Parameter(ValueFromPipeline = $true)]
$InputObject
)
process
{
$props = [ordered]@{ }
foreach ($property in $InputObject.PSObject.Properties)
{
if ($property.Value -isnot [System.Collections.ICollection])
{
$props[$property.Name] = $property.Value
continue
}
$found = $false
foreach ($name in $PropertyName)
{
if ($property.Name -like $name)
{
$found = $true
break
}
}
if (-not $found)
{
$props[$property.Name] = $property.Value
continue
}
$props[$property.Name] = $property.Value -join $JoinBy
}
[PSCustomObject]$props
}
}
|
combined_dataset/train/non-malicious/sample_31_96.ps1
|
sample_31_96.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Get ticket details for an Azure subscription.
Support ticket data is available for 18 months after ticket creation.
If a ticket was created more than 18 months ago, a request for data might cause an error.
If no parameters are specified, then this command will retrieve all tickets created in the last week by default.
.Description
Get ticket details for an Azure subscription.
Support ticket data is available for 18 months after ticket creation.
If a ticket was created more than 18 months ago, a request for data might cause an error.
If no parameters are specified, then this command will retrieve all tickets created in the last week by default.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportTicketDetails
.Link
https://learn.microsoft.com/powershell/module/az.support/get-azsupportticket
#>
function Get-AzSupportTicket {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportTicketDetails])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Alias('SupportTicketName')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')]
[System.String]
# Support ticket name.
${Name},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='List')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# Azure subscription Id.
${SubscriptionId},
[Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Models.ISupportIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(ParameterSetName='List')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Query')]
[System.String]
# The filter to apply on the operation.
# We support 'odata v4.0' filter semantics.
# [Learn more](https://docs.microsoft.com/odata/concepts/queryoptions-overview).
# _Status_, _ServiceId_, and _ProblemClassificationId_ filters can only be used with Equals ('eq') operator.
# For _CreatedDate_ filter, the supported operators are Greater Than ('gt') and Greater Than or Equals ('ge').
# When using both filters, combine them using the logical 'AND'.
${Filter},
[Parameter(ParameterSetName='List')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Query')]
[System.Int32]
# The number of values to return in the collection.
# Default is 25 and max is 100.
${Top},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Support.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
If($PSCmdlet.ParameterSetName -eq 'List' -and !$PSBoundParameters.ContainsKey('Top') -and !$PSBoundParameters.ContainsKey('Filter')){
$OneWeekAgo = (Get-Date).AddDays(-7).ToString("yyyy-MM-ddTHH:mm:ssZ")
$Filter = "CreatedDate ge $($OneWeekAgo)"
$PSBoundParameters.Add('Filter', $Filter)
}
Az.Support.internal\Get-AzSupportTicket @PSBoundParameters
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAhtxmyAxwYPY/G
# JF8j6FZeEnqI2AqJeDY1YRZfRYpvQqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICnB83T7gD+P0PxrsfsGp1hF
# WRHD3YC4OiRQg7vO5VkQMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAJUW9QDgiQ00+AeY2Khl54ojke/sPys5SvQwk7Jrj4J9yPg8Ex6N4fh1H
# a6sjEOSz3c6zB9LFKpzsKHTcwS4JPJq4+Kt274iPG/lvDt2L32FwWQXhi43Q0g3G
# SbgepQzKBRcaQjxDmajWNOFGv0NGdlVe8ENFaRLsZZzQGN83Jd1i4FB9IrEljqmX
# 156qjR/QQnloIO9aHmy++yxiFZyVU3P/s6xdcQNPpwu03I126FYeehSMFd/3SkKT
# LJnCtvVEH6XK8Lr9B9jJ6WrySwi1jmPdr9+KH6lIJji1CeXElIuFyS4YMIkyQc9v
# ZbqOkRL7gnm6rOek1MRhTduozo2Ec6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBuyc05O1PEQvOvacXbfufusIh0KQH6YgYqVf9YVveNjAIGZjOaa5w7
# GBMyMDI0MDUxNjA2NDIxMy43OThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy
# NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq
# AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p
# RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9
# fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc
# dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru
# var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb
# bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB
# 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB19PJvJoIewYrIgGv6zMLnja8nmwwuy9pRqAXcZ8qN
# /zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db
# cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk
# ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAfqfjxhHIC4Kjzy93jrCS
# OIzUPtrXOtMeMrJ8fir9wKsCGG/af+/D1E5lv/VY2uGQuIA45V8HCh7e+oB6mMOs
# YwDseYPUZ69JBFryrizE6VXWhxPW3im3WrMb7+ITZzgw/0BvGN+esyMTARVEO3St
# 6/ah7SbKVGM+w3xtV/fLF5KNfJ5NXuQU+o3qFbuOqs9IDq9AXKmj9TNPU52LIf8N
# UoyO8WC3YOrhj/IJ1KMJ0D1vcCrnwPr+zlogLtrbSldK3cQd1eZpbmMlPLxOHN6x
# AuPEfJOtsmZCAEETLYkVC+rZOAJLxGEZKw8h3gR5XisFTqrm8xU0vyVpoPTf78RD
# sHPPTSKdPoSQmnP8adN6rtX7Uj1137RhFggLqyK7xdil2KvfLKZVC8B/0SJEffoO
# NQxCPzfzzWgYIXydWCgKFT7/ymZekuAbUhgrAuH2RYspQQE3DbbxD4WkdHDpCBs7
# RO2JuuQE0cCggaRZR5+9HJCJ+Z5ZmKotIJTZ6wqdnB8K3unT+sIP7o8+aj0RdHti
# 6fqjN+BwqzFSlH81cTnBEjYN19LGBgy3n5dofzzS6ASy9tujtysN9rR9jnA78ybt
# 4dwlc480QojJNgECc+BWix08Yyv/8kp973l/+pfxyYpy+VFflhDnMGB4MaYR5v0F
# Nt2pWpybg/ki/vDcw1A4o+U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4475.ps1
|
4475.ps1
|
configuration PSRepository_RemoveRepositoryConfig
{
param
(
[Parameter()]
[System.String[]]
$NodeName = 'localhost',
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$RepositoryName
)
Import-DscResource -ModuleName 'PowerShellGet'
Node $nodeName
{
PSRepository 'AddRepository'
{
Ensure = 'Absent'
Name = $RepositoryName
}
}
}
|
combined_dataset/train/non-malicious/2550.ps1
|
2550.ps1
|
cls
function Backup-SMCReplication
{
param ([string ] $sqlServer
, [string] $outputDirectory
)
Import-Module Repl
[string] $path = "$outputDirectory\$((get-date).toString('yyyy-MMM-dd'))\"
if ( -not (test-path $path)) {
New-Item $path -ItemType Directory | Out-Null
}
foreach($publication in Get-ReplPublication $sqlServer)
{
[string] $fileName = "{0}{1}.sql" -f $path,$publication.DatabaseName.Replace(" ", "")
$fileName = "{0}Create_{1}_{2}.sql" -f $path,$publication.DatabaseName.Replace(" ", ""),$publication.Name.Replace(" ", "")
$publication.Script([Microsoft.SqlServer.Replication.scriptoptions]::Creation `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::EnableReplicationDB `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateLogreaderAgent `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateQueuereaderAgent `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublicationAccesses `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeCreateSnapshotAgent `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeArticles `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublisherSideSubscriptions `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeSubscriberSideSubscriptions
) | Out-File $fileName
}
}
function Delete-SMCReplication()
{
param ([string ] $sqlServer
, [string] $outputDirectory
)
Import-Module Repl
[string] $path = "$outputDirectory\$((get-date).toString('yyyy-MMM-dd'))\"
if ( -not (test-path $path)) {
New-Item $path -ItemType Directory | Out-Null
}
foreach($publication in Get-ReplPublication $sqlServer)
{
[string] $fileName = "{0}{1}.sql" -f $path,$publication.DatabaseName.Replace(" ", "")
$fileName = "{0}Delete_{1}_{2}.sql" -f $path,$publication.DatabaseName.Replace(" ", ""),$publication.Name.Replace(" ", "")
$publication.Script([Microsoft.SqlServer.Replication.scriptoptions]::Deletion `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeDisableReplicationDB `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludePublisherSideSubscriptions `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeSubscriberSideSubscriptions `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeArticles `
-bor [Microsoft.SqlServer.Replication.scriptoptions]::IncludeReplicationJobs
) | Out-File $fileName
}
}
Backup-SMCReplication -sqlServer PSQLDLS30 -outputDirectory e:\Dexma\logs
Delete-SMCReplication -sqlServer PSQLDLS30 -outputDirectory e:\Dexma\logs
|
combined_dataset/train/non-malicious/sample_55_44.ps1
|
sample_55_44.ps1
|
Get-Module | ForEach-Object { Remove-Module -Name $_.Name -Force }
$PSModuleAutoloadingPreference = 'none'
Import-Module Microsoft.PowerShell.Utility
#Enforcing default PSModulePath to avoid getting unexpected modules to run instead of built-in modules
$env:PSModulePath = "C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules"
$resultOutputDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult"
function CheckAuthenticodeSignature($pathToCheck) {
if (test-path $resultOutputDir -ErrorAction SilentlyContinue) {
$issuerInfo = "$resultOutputDir\issuerInfo.txt"
} else {
$issuerInfo = "$PSScriptRoot\issuerInfo.txt"
}
if ($pathToCheck) {
if (Test-Path -path $pathToCheck -ErrorAction SilentlyContinue) {
$AuthenticodeSig = (Get-AuthenticodeSignature -FilePath $pathToCheck)
$cert = $AuthenticodeSig.SignerCertificate
$FileInfo = (get-command $pathToCheck).FileVersionInfo
$issuer = $cert.Issuer
#OS is older than 2016 and some built-in processes will not be signed
if (($OSBuild -lt 14393) -and (!$AuthenticodeSig.SignerCertificate)) {
if (($FileInfo.CompanyName -eq "Microsoft Corporation")) {
return
}
else {
Write-Error "Script execution terminated because a process or script that does not have any signature was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
}
#check if valid
if ($AuthenticodeSig.Status -ne "Valid") {
Write-Error "Script execution terminated because a process or script that does not have a valid Signature was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
#check issuer
if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) {
Write-Error "Script execution terminated because a process or script that is not Microsoft signed was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
if ($AuthenticodeSig.IsOSBinary -ne "True") {
#If revocation is offline then test below will fail
if (!$LegacyOS) {
$IsOnline = (Get-NetConnectionProfile).IPv4Connectivity -like "*Internet*"
}
$EKUArray = @('1.3.6.1.5.5.7.3.3', '1.3.6.1.4.1.311.76.47.1')
if ($IsOnline) {
$IsWindowsSystemComponent = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.10.3.6" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable OsCertWarnVar -ErrorVariable OsCertErrVar)
$IsMicrosoftPublisher = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.76.8.1" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable MsPublisherWarnVar -ErrorVariable MsPublisherErrVar)
$TrustedEKU = (Test-Certificate -Cert $cert -EKU $EKUArray -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable EKUWarnVar -ErrorVariable EKUErrVar)
if (($IsWindowsSystemComponent -eq $False) -and ($IsMicrosoftPublisher -eq $False) -and ($TrustedEKU -eq $False)) {
#Defender AV and some OS processes will have an old signature if older version is installed
#Ignore if cert is OK and only signature is old
if (($OsCertWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($MsPublisherWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($OsCertWarnVar -like "*CERT_TRUST_IS_OFFLINE_REVOCATION*") -or ($MsPublisherWarnVar -like "CERT_TRUST_IS_OFFLINE_REVOCATION")) {
return
}
Write-Error "Script execution terminated because the process or script certificate failed trust check" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
}
}
}
else {
Write-Error ("Path " + $pathToCheck + " was not found") | Out-File $issuerInfo -append
}
}
}
function Download-WebFile($ClientAnalyzer) {
Write-host -ForegroundColor Green "Downloading MDEClientAnalyzer from: " $ClientAnalyzer
Import-Module BitsTransfer
$BitsJob = Start-BitsTransfer -source $ClientAnalyzer -Destination "$DlZipFile" -Description "Downloading additional files" -RetryTimeout 60 -RetryInterval 60 -ErrorAction SilentlyContinue
}
[int]$OSBuild = [system.environment]::OSVersion.Version.Build
if ($OSBuild -le "7601") {
$LegacyOS = "True"
}
$DownloadDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads"
$DlZipFile = Join-Path $DownloadDir "MDEClientAnalyzerPreview.zip"
$MDECADir = Join-Path $DownloadDir "MDECA"
CheckAuthenticodeSignature $MyInvocation.MyCommand.Path
if (!(test-path -path "$DlZipFile")) {
Download-WebFile "https://aka.ms/betamdeanalyzer"
}
if (test-path -path "$DlZipFile") {
if (Test-Path -LiteralPath $MDECADir -PathType Container) {
Remove-Item -LiteralPath $MDECADir -Recurse -Force -ErrorAction SilentlyContinue
}
[System.Reflection.Assembly]::LoadWithPartialName("system.IO.Compression.FileSystem") | Out-Null
[System.IO.Compression.ZipFile]::ExtractToDirectory($DlZipFile, $MDECADir) | Out-Null
CheckAuthenticodeSignature "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1"
&powershell -ExecutionPolicy Bypass "& 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1' -outputDir 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA' -r -l -e -v -m 60"
}
# SIG # Begin signature block
# MIIn4AYJKoZIhvcNAQcCoIIn0TCCJ80CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBh6K+9LnSOaSFb
# DqH52sNLOvS/D+YWN4eCYZVvPmT8hKCCDZcwggYVMIID/aADAgECAhMzAAADz7d0
# vUQxddCTAAAAAAPPMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwMjIyMTkwNzUzWhcNMjUwMjE5MTkwNzUzWjCBlDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj
# cm9zb2Z0IFdpbmRvd3MgRGVmZW5kZXIgQWR2YW5jZWQgVGhyZWF0IFByb3RlY3Rp
# b24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwAPmxMmR9a92NX/Lv
# 2PmaySDZqZUANxu28n+GqAuhMRrC8/v5HrKeebKt+6wqnp28fO1jvJ5OlBIrirN7
# KUiSUH86mvByCFnIwIkKcusZbgEF+v15S0jRExa5C9lC+kDVYtlSCnPEdx/tkKLN
# QQMmSroC3baj7y0WIvBfZ1l4x2qyDhFC/5plmMfD8TSfl3sN4twBiXAcpJ/SES50
# QbLahl/MTsVA2UEo7ygPJIrmci8wvD0Kt1pfkwbB3eiK4Vatr0VoJujRucjGT322
# m/9vH6p4Y5suUJMo9196/ze8hA8bqH+5NdU+DeRLrV/UzVat1Xs/Wm6kPK8GgTPL
# H+M9AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBggrBgEFBQcDAwYKKwYBBAGCN0wv
# ATAdBgNVHQ4EFgQU10vjUl0bvgJvpCFtGT8ECb23+CAwRQYDVR0RBD4wPKQ6MDgx
# HjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNNDUxODk0
# KzUwMjA2OTAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8E
# TTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9N
# aWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBR
# BggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAw
# DQYJKoZIhvcNAQELBQADggIBAHcmfqgz/boPmZhEOAtYI5wj3mRicbSQwDQcGZfK
# 8I1WdILE80dhNGqgtVvxO5v5/PyjBJY5HV9HxxCzdVVj60PYAwzoyfTIZF+0hPrh
# l6JkjfckCiy9qsONVkL6SDJH6a+Xf4penA2ge9WM3XLR5BUQH538wx4w+VswV1QX
# hKsAMGAvxBG8EzIFTMRXMoKy/RYZ1FSig96mdJRb9Zh4o37XcyAgSxlbiv50vu3X
# MGNXRZJY0/PdB6Du55mI0WfJDaKBJuDShBMLOjDRX8UEWjy3rqGTjVVLYhK4mWq6
# I/1bIZlgkKBFnUMFbVvtSWDP13FgyGIVDk5YB5s2XmSC6hTfXAHakSpLfFeZ1VK5
# /pRMdhxEenleDdsgksd9idt+U7YxgjZ6gfdGuWgj9ZNi8Ef4ILoA5fkUGIIP14a7
# j2SUsaYvJKw/5aiVHRza+Q9gbDpNcsR5WbhhcSAnkFmi7ZkmJKHVlkUqAUDbP8WB
# yz/bq6m/HCHELfFfsG4HMvOfLSTVhKfXPptRzN4N5m2AZX423KM2zhqzPjCWNWce
# /jqhUKtbyMuPPqqo+eaoYi+ZzaEqirxAmPF6Nz3VIncZppzm451L2Uu05NwN1T5m
# ZbiGW2WW1Iz50ofUKACCqThHMtSh4fOdq0OiKaqQz3S5BGdoXdPPOKgXxOtfaMpr
# C3SrMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
# cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4
# MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBD
# QSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3Y
# bqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUB
# FDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnbo
# MlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT
# +OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuy
# e4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEh
# NSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2
# z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3
# s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78Ic
# V9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E
# 11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5P
# M4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcV
# AQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBL
# hklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggr
# BgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsG
# AQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwA
# ZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0G
# CSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDB
# ZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc
# 8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYq
# wooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu
# 5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWI
# UUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXh
# j38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yH
# PgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtI
# EJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4Guzq
# N5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgR
# MiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQ
# zTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEC
# EzMAAAPPt3S9RDF10JMAAAAAA88wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcN
# AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw
# LwYJKoZIhvcNAQkEMSIEINPVW4eNb62pVHPCHLNw2kRazX2OxQPyNu7pgho0kzJP
# MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAHGP3LVQJDodF
# 7VxQIm7lTL30lgkgHiMv1z0WiSr6uKpcV3Gou9cpChPKESnMUi88SiHLOE14W9A6
# vYJEdLhh94sSde4ttvGT/PTuVttVJoMw76Q33HYEktDc48YW7Pa5IiLo6iZjpYYB
# V/X+4aR6cZCgbdZoSLXk5WIbZQOvruUaM8G/5zPSDITSjez7+GNubQ33UGkA9UwY
# J4c9FJ6wvUncAM9L0DIsqSeZP9jt0m2OLU3IHeGAJPcktQDMcg5AR7MfE69xDayH
# JDUXRLJ+grqIzzb25tyAYXXwUeA52OdiJmr3AkfSKa7G2zjjI/q0GLXfF3QrwpZt
# MbmN9HcXGaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCC
# FwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgE
# ggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBeD/nfKw0o
# Z2OVrXWt4R/2fih9AoPS3uJlz7Rt/5elFAIGZk4IIh6dGBMyMDI0MDUyOTE0MzYz
# NS44MDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z
# IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJB
# MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycw
# ggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUw
# MTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk
# MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVP
# UC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB
# 2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUs
# JXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zo
# P/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo
# 0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEU
# nfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo
# 83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2f
# iN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xr
# vWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrr
# nZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo
# +kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7y
# ISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24b
# bqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5U
# MnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYD
# ZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76
# YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjM
# bL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9
# NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLb
# RomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHky
# sribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1o
# bDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQw
# ggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM
# aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTEl
# MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO
# AwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOoBF9gwIhgPMjAyNDA1
# MjkxMDU2MjRaGA8yMDI0MDUzMDEwNTYyNFowdDA6BgorBgEEAYRZCgQBMSwwKjAK
# AgUA6gEX2AIBADAHAgEAAgIRcDAHAgEAAgIhazAKAgUA6gJpWAIBADA2BgorBgEE
# AYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYag
# MA0GCSqGSIb3DQEBBQUAA4GBAJsO3dDsgUvjGEEaSuQUhPtT9xBjIKs/ifz5R1OF
# yfiv35tjABMoWRo6JdqUy403V7EP+t5GXW4UdjaUOFE1lqfyH8DKFja2/N6DzeDU
# NdojR8HDgEu9Ce1ThrHKZ7SUJmcfc1S+b8BfTGgYIkW1NPsPw7oZoD3c+o+gBX4y
# iRwjMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQghECzG0kkr4lAZvSP
# RZUu2W8+ZSjxUCPgITiB50vn9oMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9
# BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIE
# IN4KjELBbS4DF0pIdilyyYClewKopigXjvX6nXMPfKJSMA0GCSqGSIb3DQEBCwUA
# BIICACDzBguIsJLR4mtjI5fnSrvSVdo95ls9AQZ9q54aWqeq5GTvlbb2bhqwN2U3
# npAKa4fxRNGnMI2hsXtt1rayu6OS261rdFG4FDe6JBn13VT+Y81QM3zJ6pLVtJ4G
# qXpKAjxp1V+MWnwWeRKL+Zrv3Gb62AeE8beyUYxedMIfqFLaX4EPlkjvDIGz1xrV
# VcyFUbH45DzLzmcMZQQYiJF1m5hxXeN3FXtjuXZttX7gNJwIU7/iJRcE+JWtYbuh
# BS+WivZHuIP1dKIO+sCdcuCO+zVEagsRwEOmwgt8VtW2b2yzn04URz3Km2EKssy8
# 7LJobpXd8FkPza7Bjq0+6zJ0fvuDH7PS83BV1GKpomAaadFv9ch0C74OUkVogtC4
# EvW/fpq37+ndkfQeKRFZiOEYnhGM8VHsnHnt4MfcGZhVDDmTSFyCTQrQdoWU9e04
# Bajdmkc0Vknh1dHqG3DqSk34ZNgWLgSohy93S+jUNcxwKL6pqF2BD6LM7uJ2k55R
# d5E7kel5YZyoNMjQZmHCANwx7HaA1pg9C1CHurYBl4sfmqs9qklkrwtE9ZmBSvbB
# xGbK8TUwBGlVIX16xjQtVJV7JXYrk+P0S6G4BZUg9J1qrqIlPsH+4rLl6JVxwYyy
# n8vx/QePbMceu4/qmm1ELr1Y6oLGTLxtcm00Y7dtnQ09inXq
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_21_92.ps1
|
sample_21_92.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dashboardservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dashboardservice.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'cd6937ca-f4c2-4263-82d8-c6bec6fbadc4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dashboardservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dashboardservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDashboardserviceDashboard',
'Get-OCIDashboardserviceDashboardGroup',
'Get-OCIDashboardserviceDashboardGroupsList',
'Get-OCIDashboardserviceDashboardsList',
'Move-OCIDashboardserviceDashboardGroup',
'Move-OCIDashboardserviceDashboardGroupCompartment',
'New-OCIDashboardserviceDashboard',
'New-OCIDashboardserviceDashboardGroup',
'Remove-OCIDashboardserviceDashboard',
'Remove-OCIDashboardserviceDashboardGroup',
'Update-OCIDashboardserviceDashboard',
'Update-OCIDashboardserviceDashboardGroup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dashboardservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_67_60.ps1
|
sample_67_60.ps1
|
#
# Module manifest for module 'OCI.PSModules.Osmanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osmanagement.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '08aa2c02-1476-4491-ace6-a15dc5ef7b7f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osmanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIOsmanagementPackagesToSoftwareSource',
'Disable-OCIOsmanagementModuleStreamOnManagedInstance',
'DisMount-OCIOsmanagementChildSoftwareSourceFromManagedInstance',
'DisMount-OCIOsmanagementManagedInstanceFromManagedInstanceGroup',
'DisMount-OCIOsmanagementParentSoftwareSourceFromManagedInstance',
'Enable-OCIOsmanagementModuleStreamOnManagedInstance',
'Get-OCIOsmanagementAvailablePackagesForManagedInstanceList',
'Get-OCIOsmanagementAvailableSoftwareSourcesForManagedInstanceList',
'Get-OCIOsmanagementAvailableUpdatesForManagedInstanceList',
'Get-OCIOsmanagementAvailableWindowsUpdatesForManagedInstanceList',
'Get-OCIOsmanagementErrataList', 'Get-OCIOsmanagementErratum',
'Get-OCIOsmanagementEvent', 'Get-OCIOsmanagementEventContent',
'Get-OCIOsmanagementEventReport', 'Get-OCIOsmanagementEventsList',
'Get-OCIOsmanagementManagedInstance',
'Get-OCIOsmanagementManagedInstanceErrataList',
'Get-OCIOsmanagementManagedInstanceGroup',
'Get-OCIOsmanagementManagedInstanceGroupsList',
'Get-OCIOsmanagementManagedInstancesList',
'Get-OCIOsmanagementModuleStream',
'Get-OCIOsmanagementModuleStreamProfile',
'Get-OCIOsmanagementModuleStreamProfilesList',
'Get-OCIOsmanagementModuleStreamProfilesOnManagedInstanceList',
'Get-OCIOsmanagementModuleStreamsList',
'Get-OCIOsmanagementModuleStreamsOnManagedInstanceList',
'Get-OCIOsmanagementPackagesInstalledOnManagedInstanceList',
'Get-OCIOsmanagementRelatedEventsList',
'Get-OCIOsmanagementScheduledJob',
'Get-OCIOsmanagementScheduledJobsList',
'Get-OCIOsmanagementSoftwarePackage',
'Get-OCIOsmanagementSoftwareSource',
'Get-OCIOsmanagementSoftwareSourcePackagesList',
'Get-OCIOsmanagementSoftwareSourcesList',
'Get-OCIOsmanagementUpcomingScheduledJobsList',
'Get-OCIOsmanagementWindowsUpdate',
'Get-OCIOsmanagementWindowsUpdatesInstalledOnManagedInstanceList',
'Get-OCIOsmanagementWindowsUpdatesList',
'Get-OCIOsmanagementWorkRequest',
'Get-OCIOsmanagementWorkRequestErrorsList',
'Get-OCIOsmanagementWorkRequestLogsList',
'Get-OCIOsmanagementWorkRequestsList',
'Invoke-OCIOsmanagementInstallAllPackageUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementInstallAllUpdatesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementInstallAllWindowsUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementInstallModuleStreamProfileOnManagedInstance',
'Invoke-OCIOsmanagementInstallPackageOnManagedInstance',
'Invoke-OCIOsmanagementInstallPackageUpdateOnManagedInstance',
'Invoke-OCIOsmanagementInstallWindowsUpdateOnManagedInstance',
'Invoke-OCIOsmanagementManageModuleStreamsOnManagedInstance',
'Invoke-OCIOsmanagementRunScheduledJobNow',
'Invoke-OCIOsmanagementSearchSoftwarePackages',
'Invoke-OCIOsmanagementSkipNextScheduledJobExecution',
'Invoke-OCIOsmanagementSwitchModuleStreamOnManagedInstance',
'Mount-OCIOsmanagementChildSoftwareSourceToManagedInstance',
'Mount-OCIOsmanagementManagedInstanceToManagedInstanceGroup',
'Mount-OCIOsmanagementParentSoftwareSourceToManagedInstance',
'Move-OCIOsmanagementManagedInstanceGroupCompartment',
'Move-OCIOsmanagementScheduledJobCompartment',
'Move-OCIOsmanagementSoftwareSourceCompartment',
'New-OCIOsmanagementManagedInstanceGroup',
'New-OCIOsmanagementScheduledJob',
'New-OCIOsmanagementSoftwareSource',
'Remove-OCIOsmanagementEventContent',
'Remove-OCIOsmanagementManagedInstanceGroup',
'Remove-OCIOsmanagementModuleStreamProfileFromManagedInstance',
'Remove-OCIOsmanagementPackageFromManagedInstance',
'Remove-OCIOsmanagementPackagesFromSoftwareSource',
'Remove-OCIOsmanagementScheduledJob',
'Remove-OCIOsmanagementSoftwareSource',
'Update-OCIOsmanagementEvent',
'Update-OCIOsmanagementManagedInstance',
'Update-OCIOsmanagementManagedInstanceGroup',
'Update-OCIOsmanagementScheduledJob',
'Update-OCIOsmanagementSoftwareSource',
'Write-OCIOsmanagementEventContent'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_32_60.ps1
|
sample_32_60.ps1
|
# virtualenv activation module
# Activate with `overlay use activate.nu`
# Deactivate with `deactivate`, as usual
#
# To customize the overlay name, you can call `overlay use activate.nu as foo`,
# but then simply `deactivate` won't work because it is just an alias to hide
# the "activate" overlay. You'd need to call `overlay hide foo` manually.
export-env {
def is-string [x] {
($x | describe) == 'string'
}
def has-env [...names] {
$names | each {|n|
$n in $env
} | all {|i| $i == true}
}
# Emulates a `test -z`, but btter as it handles e.g 'false'
def is-env-true [name: string] {
if (has-env $name) {
# Try to parse 'true', '0', '1', and fail if not convertible
let parsed = (do -i { $env | get $name | into bool })
if ($parsed | describe) == 'bool' {
$parsed
} else {
not ($env | get -i $name | is-empty)
}
} else {
false
}
}
let virtual_env = 'C:\Users\caleb\coding\projects\work\policy_engine_extension\.nox\setup'
let bin = 'Scripts'
let is_windows = ($nu.os-info.family) == 'windows'
let path_name = (if (has-env 'Path') {
'Path'
} else {
'PATH'
}
)
let venv_path = ([$virtual_env $bin] | path join)
let new_path = ($env | get $path_name | prepend $venv_path)
# If there is no default prompt, then use the env name instead
let virtual_env_prompt = (if ('' | is-empty) {
($virtual_env | path basename)
} else {
''
})
let new_env = {
$path_name : $new_path
VIRTUAL_ENV : $virtual_env
VIRTUAL_ENV_PROMPT : $virtual_env_prompt
}
let new_env = (if (is-env-true 'VIRTUAL_ENV_DISABLE_PROMPT') {
$new_env
} else {
# Creating the new prompt for the session
let virtual_prefix = $'(char lparen)($virtual_env_prompt)(char rparen) '
# Back up the old prompt builder
let old_prompt_command = (if (has-env 'PROMPT_COMMAND') {
$env.PROMPT_COMMAND
} else {
''
})
let new_prompt = (if (has-env 'PROMPT_COMMAND') {
if 'closure' in ($old_prompt_command | describe) {
{|| $'($virtual_prefix)(do $old_prompt_command)' }
} else {
{|| $'($virtual_prefix)($old_prompt_command)' }
}
} else {
{|| $'($virtual_prefix)' }
})
$new_env | merge {
PROMPT_COMMAND : $new_prompt
VIRTUAL_PREFIX : $virtual_prefix
}
})
# Environment variables that will be loaded as the virtual env
load-env $new_env
}
export alias pydoc = python -m pydoc
export alias deactivate = overlay hide activate
|
combined_dataset/train/non-malicious/sample_16_37.ps1
|
sample_16_37.ps1
|
#
# Module manifest for module 'OCI.PSModules.Budget'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Budget.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f606310f-04b6-4c8e-bdd7-235e79ecc908'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Budget Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Budget.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIBudget', 'Get-OCIBudgetAlertRule',
'Get-OCIBudgetAlertRulesList', 'Get-OCIBudgetsList', 'New-OCIBudget',
'New-OCIBudgetAlertRule', 'Remove-OCIBudget',
'Remove-OCIBudgetAlertRule', 'Update-OCIBudget',
'Update-OCIBudgetAlertRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Budget'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_50_14.ps1
|
sample_50_14.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dts'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dts.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dts Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage',
'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList',
'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance',
'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate',
'Get-OCIDtsTransferApplianceEncryptionPassphrase',
'Get-OCIDtsTransferApplianceEntitlement',
'Get-OCIDtsTransferApplianceEntitlementList',
'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice',
'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob',
'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage',
'Get-OCIDtsTransferPackagesList',
'Mount-OCIDtsDevicesToTransferPackage',
'Move-OCIDtsApplianceExportJobCompartment',
'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob',
'New-OCIDtsTransferAppliance',
'New-OCIDtsTransferApplianceAdminCredentials',
'New-OCIDtsTransferApplianceEntitlement',
'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob',
'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob',
'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice',
'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage',
'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance',
'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob',
'Update-OCIDtsTransferPackage'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_14_14.ps1
|
sample_14_14.ps1
|
/* eslint-disable no-undef */
var plugin = require("plugin-vs-v2");
if (typeof plugin != "undefined") {
plugin.Messaging.addEventListener("pluginready", function () {
setHtmlText();
});
}
function setHtmlText() {
// resource strings used by docker.web.default.html
setTextContent("#dockerWebCoreOverviewHeader", "DockerWebCoreOverviewHeader");
setTextContent("#dockerWebCoreSubTitle", "DockerWebCoreSubTitle");
setTextContent("#containersHeader", "ContainersHeader");
setTextContent("#containerToolsOverview", "ContainerToolsOverview");
setTextContent("#browseDocsText", "BrowseDocsText");
setTextContent("#publishToAppServicesText", "PublishToAppServicesText");
setAltText("#containersAltText", "ContainersHeader");
}
// SIG // Begin signature block
// SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // GAQuvgtekkZEIZtqYXCbSXOEVvMNrmRZYGfFdJLjfMeg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDC6BSCCobI6RTo
// SIG // TIpZcyrnQyg6Uk/RoaZIJZZyg5KuUzBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBADQsj8KVLEh7cAA4CPiDuHgReAa4ZdMU
// SIG // 580nMCyq6zjDNTYbPGPU+DfGDJIGsKpQHIzq0SPBE7Li
// SIG // hqsAuYUWtjHMaUiOmi9HSWl9k2xojKT3xkvEu5oMhZhv
// SIG // qbrqEio8OYKy8PL5NnEo41tkTmgWCM5Spmg4FeEg552l
// SIG // BoLqt8C6ULXtlP7smZvr0sxzPHQbRNh5Q2mVSSHnfRWq
// SIG // +pJhTAdsKc0pjN4hScU4kfRjQJGmJ5tcNhD4pAAY/jFo
// SIG // LVWA+m87SfFqiKy/JBQIo4g2WnetOoTonuQ6u9xzpzp5
// SIG // kW5LBIpv+9fNpqiCXcbAMZcjkFdDYMV72dTniGsUf+Gm
// SIG // ZCKhghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq
// SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // yO7S9XjO3XTw3x3L3mEcHY+7GkGyc++59JlNvv9Se/sC
// SIG // BmYgLEuaPBgTMjAyNDA0MTcyMTI2NTUuNzU0WjAEgAIB
// SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG
// SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u
// SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
// SIG // TjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9z
// SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXcwggcnMIIF
// SIG // D6ADAgECAhMzAAAB3MHgjMJfWF6OAAEAAAHcMA0GCSqG
// SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
// SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
// SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk
// SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
// SIG // MDEwMB4XDTIzMTAxMjE5MDcwNloXDTI1MDExMDE5MDcw
// SIG // NlowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
// SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
// SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4
// SIG // Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBU
// SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
// SIG // AQUAA4ICDwAwggIKAoICAQCLyLMgNbI4PZEiic3pa1Fh
// SIG // eUoamFi/N2pp90hOSciFT1Auxeqk3C6YYR2fYnX9tX9E
// SIG // Whq1PBB8nRfDcTzEdilTYgLQhjyWvJFdQhr5923hgdpt
// SIG // pbZqiWpxu9ZgMsK5CgE2J4sCiz0CydNBJF8OU0sH5iV2
// SIG // 3YECxZR8nwOSoPqVLCV86rppCLxK9A1z76bQBqpHRSys
// SIG // KOAU5RIJ783k317pM1/L0LUwC31Sbk1IEVO86D/0RVrd
// SIG // 1moGoWelJaCNBQvF5QUA1Q1+SXjBLMe44CQ3RJyuOGPI
// SIG // B7hFkQ6vkhvV6NBiDo4rk1g+br975RJiAMkf+60hb3C5
// SIG // 8AKjHanMv4qkDzJQznHdAG54j/ImtQUBFJ32U91Mciva
// SIG // ywf0kYij8hw5YPKFsF8or9/mxgenZnTOtbq+p1LXw3+d
// SIG // ZT3CoSuFaPN6ThNf54lpVZxB0FfTSefw21Eqltkak1Gt
// SIG // jtirr7MkRjBIIxiQNdv0qq0apbxNn4jeWZmVbakj1miG
// SIG // rMe2tBgfn3U8PoHkZ+jKNkuvv22RMEv9CCeYHChopzW3
// SIG // 8kNca71lz7V8yjn45Ie+Ykbl6LqxlT0apJs+VGM/kecm
// SIG // zCVo/pn3Bqs9oV1fImZwmQwa652Yr5xKwjIeRZX4POPe
// SIG // qU9KYY1Ex9hgoRyLxOEg0pNocFj/7hwfYBLPKf/T3v5r
// SIG // fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOhz0gXdDnxF
// SIG // 97jVrHZEq2lBnt3bMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
// SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js
// SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
// SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
// SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt
// SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC
// SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P
// SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDZ62/B
// SIG // MK/Hl/x9bCrd658Ew8eAKoB25DDUKPpFBsAiDV0t8tRl
// SIG // HHarCv0dYOk3+7TcdatDaSpNSU7qVCXx3RMSrZLoRwPv
// SIG // NpU+8iEqf2O+HaidN0Qk+EPvKKEF0zM8YnsHxK1S7fFn
// SIG // n3m53Ek9IusqSr/O6QmJMTNuG26mzP1fjOVQaaQlLO0f
// SIG // nBE4s/8xANQG2S/74l7R5q8gNAhnfj7fXPmnbGH5u6nu
// SIG // VDJ0tH/2CZhBDJBKhlws8iyvnYflLBYtHeJZHXBPmauS
// SIG // TYyB3rF9cM7RlQLb19A2A2XTdlmdZJPoTjG5VFfy/J9W
// SIG // Fs4T/+V0J2JdNwH1xK5/tRGrcpYn83dwoSdcbhhu+mG1
// SIG // oIkV5w7wosA6r1CXr1UWNasuMuL5VSmkobW3X4D8hnni
// SIG // f2HEgTjTnNAzU1m4zGy+dKniBAtJR0qS9q0WDVbt4bB8
// SIG // xvJ+buQkGoz8MfT86bGSHhUzR8lRepLoyOFaPTbzv8xf
// SIG // DreOCDI+DO1F/WWuEMBn+Qe9ceezo2l+d4MU+L86B7xA
// SIG // Vxfagph0YFwS20aJiXw5+tGpc7+3aQlUCLkNOtp8iGSp
// SIG // 7F8c7ihW9E411sOjhaRtW7I16TqOQzB5MrK4m8R6K+GM
// SIG // +XWY1chwDciqNG0qwJVXooXGhuRe+EmU/BbchwFuiIC3
// SIG // OcP9w/kdaGw4SmdtVjCCB3EwggVZoAMCAQICEzMAAAAV
// SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx
// SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
// SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv
// SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
// SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
// SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
// SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
// SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/
// SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1
// SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx
// SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41
// SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP
// SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j
// SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF
// SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg
// SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F
// SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
// SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
// SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
// SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ
// SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF
// SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
// SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
// SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS
// SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A
// SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB
// SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv
// SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ
// SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
// SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW
// SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
// SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
// SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
// SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
// SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
// SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz
// SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
// SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
// SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6
// SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I
// SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq
// SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew
// SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7
// SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa
// SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH
// SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ
// SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR
// SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
// SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
// SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
// SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/
// SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd
// SIG // VTNYs6FwZvKhggLTMIICPAIBATCCAQChgdikgdUwgdIx
// SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
// SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
// SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm
// SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZE
// SIG // LUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABw5/3M/
// SIG // t8kZCFAiX0my93Y50BKmoIGDMIGApH4wfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC
// SIG // BQDpyqrKMCIYDzIwMjQwNDE4MDQwODQyWhgPMjAyNDA0
// SIG // MTkwNDA4NDJaMHMwOQYKKwYBBAGEWQoEATErMCkwCgIF
// SIG // AOnKqsoCAQAwBgIBAAIBBjAHAgEAAgIRNTAKAgUA6cv8
// SIG // SgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBBQUAA4GBADvB/kvKuu5jQuuCElGcGOKzKibd
// SIG // yApYjGGsK6Ip6g7AC2ocajfMRc42ddqTM/kdCe77GLUb
// SIG // IQx3MFSqTjyzkcdwvnyoCiCgo9RQkVIBhvG8S8dj6YJF
// SIG // ECbKIQ5QwkqJ8qLrSJr6aUnjt/hJCw/Vy/VnHo5CP3le
// SIG // Mcb39Y/07JZNMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4A
// SIG // AQAAAdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3
// SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
// SIG // IgQgnwTTuhWwPS1+RxQO6QgtQqaQRKfsKtm9xjUStKs8
// SIG // PIIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBT
// SIG // pxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIINNzCB
// SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // AhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIK7Knhy+5Jk1
// SIG // e+2mA/Vx/77ILaIcPA78iOcmmf1Q2FZuMA0GCSqGSIb3
// SIG // DQEBCwUABIICADY1QQ9Tu4BQfc+n4VID3+ywsCaX8/ol
// SIG // C9QpWQKjtUSIEssmgCWiL+C81IXmUIxgUjSMQ0wpjmXr
// SIG // dCIIHywLzRzOOY4NRGVEzu07suhknvY/lJrF7XOABYjh
// SIG // wNizD1YIgkNpH7vbFz6ND+4I/dTctNkhRqnhn+6JakoQ
// SIG // j3J9lbbnQAiTsrEDROjWP/IL9sUtmGJZ3UfTLdyc33DN
// SIG // UIAwu1Phg2luyYHmukj8LNKR7jWqUSJHHHYtKdoX68EF
// SIG // yRLr7MJP8ab2tbnHdyg451ViatVKJmlIuhfYBRJRSYOm
// SIG // XC/0ql+OJqdJXlHAZCEk++OtO3p6dY9la5bsYLUhAQ3c
// SIG // KN6Um6qu+eLdfusmlQVppVpSSNGjJFI0CjRLgVMtCu2J
// SIG // UBIy5maxqZAHk/yPpyjVuzCRxvwgyikF/PWvCdlL/sF0
// SIG // N/ADTMrEePelGGSsWvoDJIaiXP0te13nevqN+Z4Va7Bl
// SIG // q3r89kXpxGI/El4kQ9JKWoXdN/ybbYngXLMu2+qhO9hV
// SIG // d27WMOfJvpRr2AKqtHIkXOes8D+yfK2jceqb4Wu/aaBq
// SIG // SF7Y4eNRz169fvNTohAAgUm+l+Uwb7zewwX+G2A1+XfV
// SIG // eVHNegBRrluuMf3UmJZtAqnWUJWM9hgrpZAHgZnzY8iO
// SIG // xKw8i6oXexLlzjDSadR7O45eyT1t/qc0mxg3
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_18_18.ps1
|
sample_18_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmtraces'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmtraces.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b8a6f9e5-94d6-4c39-9ded-9767df367b9b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmtraces Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmtraces.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmtracesAggregatedSnapshot',
'Get-OCIApmtracesQuickPicksList', 'Get-OCIApmtracesSpan',
'Get-OCIApmtracesStatusAutoActivate', 'Get-OCIApmtracesTrace',
'Get-OCIApmtracesTraceSnapshot',
'Invoke-OCIApmtracesBulkActivateAttribute',
'Invoke-OCIApmtracesBulkDeActivateAttribute',
'Invoke-OCIApmtracesBulkPinAttribute',
'Invoke-OCIApmtracesBulkUnpinAttribute',
'Invoke-OCIApmtracesBulkUpdateAttribute',
'Invoke-OCIApmtracesBulkUpdateAttributeNotes',
'Invoke-OCIApmtracesQuery', 'Write-OCIApmtracesToggleAutoActivate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmtraces'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_44_89.ps1
|
sample_44_89.ps1
|
///////////////////////////////////////////////////////////////////////////////
// Helper to set a designer prop
///////////////////////////////////////////////////////////////////////////////
function setDesignerProp(tname, ttype, tvalue) {
var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0);
trait.value = tvalue;
}
///////////////////////////////////////////////////////////////////////////////
// Toggle button and gobal state
///////////////////////////////////////////////////////////////////////////////
var ct = command.getTrait("state");
if (ct.value == 0) {
ct.value = 2;
setDesignerProp("usePivot", "bool", true);
}
else {
ct.value = 0;
setDesignerProp("usePivot", "bool", false);
}
// SIG // Begin signature block
// SIG // MIInwAYJKoZIhvcNAQcCoIInsTCCJ60CAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // PDMvLmanc11riSBVp0P+WoGIAYCKjTZlRpjiyHdgRrmg
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghmiMIIZngIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCB213bC9hhAMPnnw4uG/KdH8f2tkQYcBffM
// SIG // djP98n/UGDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAB8fp/9r
// SIG // 6nUGxntJnR8iTgr5ROwvmv3aAMTzwNOWTBEIcWcx/8Yd
// SIG // 5qibqp2IPkUhBOvxSK1w5IkxlFxp9q5Q0n4/pniaW3q9
// SIG // EiEuT4xPbjQa6E699lgsVl7F/Mb1Riu9+P2HuSugpnFg
// SIG // y7nvHqJynZRT7Ol7WJBXb0ZT3QhI29oNuUHRBWSSwLBV
// SIG // SpqkdVQQ6mk381+JVfuVQzZlvdEWAfCjQi99bnsgeHLL
// SIG // r3Qml6ZDtOyIlcMSu7YL6KDW2Ai30yNWU/QqFgqNHxhn
// SIG // XoXCfU8aJ6m1Iu1o9JRXAouPj7Q256huKPvCyEJGtiLF
// SIG // OwNXbhgcd1Ct/4rGymrUNWjmHcChghcsMIIXKAYKKwYB
// SIG // BAGCNwMDATGCFxgwghcUBgkqhkiG9w0BBwKgghcFMIIX
// SIG // AQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN
// SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgMsFj2LFjbuSOne2WFVWG
// SIG // j9aW3F1YXyggYMlNXHJmnl8CBmXV/QtzJBgTMjAyNDAz
// SIG // MDEwMDM1NDAuODY0WjAEgAIB9KCB2KSB1TCB0jELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0
// SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD
// SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD
// SIG // MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaCCEXswggcnMIIFD6ADAgECAhMzAAAB5Y9q
// SIG // wPM9tAujAAEAAAHlMA0GCSqGSIb3DQEBCwUAMHwxCzAJ
// SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
// SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
// SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
// SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5
// SIG // MDczNVoXDTI1MDExMDE5MDczNVowgdIxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
// SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
// SIG // VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAj
// SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp
// SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
// SIG // AQCpe+A62rtjuiy6yTtx8k7zvWl2ov/3jcj+TC1ma5lB
// SIG // jTiTD8DCNPFfcwX0TzXLnK3iGEsiR45DCFBprodKz1ef
// SIG // 9vlAixqzdT++5/X6v5nc1zDdRc6mjx3ShJSp3iUPEenD
// SIG // +Ha7thspprda6xnDXvNNAnA+nfzXaKJppHdfelajrY2R
// SIG // QNV1rvhrBQXlh4ns/z5ZanDP3lp7ZEDLNJStM5gnx/gb
// SIG // u4tYfhQ0UfBe1s1K/+zN44VXT6QH6ts2AgPGVSzYBIs2
// SIG // PrxZoMfsw7rlPxgoQyu5JQ3AsPv4FaBLkjpeXJULMnVk
// SIG // IySV+2dslftSguhtSVaqT93aSjwD/+LnTaqUeRyHm/E2
// SIG // tSX40VM0r96ko3ucvUWE/wI1jWEO4LHs7g1jP/HGddZH
// SIG // KNSb1MjkPMfyQ5DBakkcI9b/pnOiyipY//3Vghvx8Paa
// SIG // XZViV+qbA3rELkEexVe3gqlf5X2o6C6Tzcf/cxdXb/Ml
// SIG // wXc5liT3gontl2kJ6wCg6pRt817sfbTUJs9i/ek3cZyD
// SIG // tjhpmMQQAGQFqCm5rWCPgos+AmMjtBZuWd0+NGuXeyib
// SIG // n7Regk6HHHP1Kf46RX0IrS343e9XEvnCwnqEPqtJ9CAC
// SIG // 71fmnGxDaLkjq47/0LWOBSIx5SOc3ScyZxrJFSeaM4Y4
// SIG // tGEbHL9VsCRQLssgjELy3Zj3XQIDAQABo4IBSTCCAUUw
// SIG // HQYDVR0OBBYEFN//n4e7TXMxInxF5QkIBTl4DIeqMB8G
// SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
// SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp
// SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr
// SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo
// SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww
// SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
// SIG // SIb3DQEBCwUAA4ICAQAz+sIThYw9WnfBpBCfaCwbr345
// SIG // 3TMhkPUeB4ASkpT7d6WtF1S3IpqyZQ5yhoBQYlsCOlzo
// SIG // MPNoXaJQ4jAwSy1kTEyR1lXlGNYFOFwfDjiMQXPf0PN8
// SIG // 29XNEVhLqYAuPCPm/tsdlTYBiVLECMj0dj4l0IU+T8nq
// SIG // zIGoPTkqHUIxcKTXRoq52tq6VdtxFMBXjuft6El+CXgj
// SIG // Wb4MlDsyqcjL6lWrm6PhpX/6bH1ubSHDI2VbdHpbMH6t
// SIG // KiTUIKGIqW2k77+8ZosVCRk24sWIn08AIrz3CjXXorGZ
// SIG // rbbOzh2wDO/eWbyi0hKl4kVIw2Gcnh8gMrDBAC2yIXV4
// SIG // BxIetCqGcs5QV891cRIqxO54bnDcDNrVYjpcCOxJHlOY
// SIG // bnXLZ1whueSbjMP8G+3O9USopmQPyl5VqZgb5CZAdAWR
// SIG // EvDghg3fs2P0/QZ06fLIt+k6pfOFX6WHvYh5suz6qsaj
// SIG // Bdgp+KtmtJhDJ6Qa7gxhP4EfXPElSdp7ZAEcuUn5brif
// SIG // zAetckb09ZlMd5cqaTttnj4wY58KBL1cWw409Y4XTDXX
// SIG // rzrg3iRs0SyvRzZkwwvk3WUJY/lTICJvGXhCETRdKGr4
// SIG // hfkGXFGS1s1m2Kusg6JPBGShYkUeaLQaBi72mBacQWVB
// SIG // PJpyyrg5WKG468Ye5Z8K8Vf3zMtBfX0qNicRZrS4LTCC
// SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw
// SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp
// SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4
// SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA
// SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
// SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
// SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE
// SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT
// SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
// SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5
// SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV
// SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy
// SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG
// SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2
// SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ
// SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
// SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
// SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
// SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb
// SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID
// SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
// SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
// SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely
// SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV
// SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K
// SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/
// SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
// SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
// SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
// SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
// SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
// SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B
// SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU
// SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
// SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
// SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT
// SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS
// SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
// SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0
// SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy
// SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx
// SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k
// SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2
// SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4
// SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
// SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
// SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
// SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLXMIIC
// SIG // QAIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
// SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz
// SIG // IFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMT
// SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
// SIG // ATAHBgUrDgMCGgMVAPeNohrmBa7BOMM1g3fORKTOkYsK
// SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpiwX+MCIYDzIwMjQw
// SIG // MjI5MjEzMjQ2WhgPMjAyNDAzMDEyMTMyNDZaMHcwPQYK
// SIG // KwYBBAGEWQoEATEvMC0wCgIFAOmLBf4CAQAwCgIBAAIC
// SIG // BsQCAf8wBwIBAAICEVkwCgIFAOmMV34CAQAwNgYKKwYB
// SIG // BAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC
// SIG // AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOB
// SIG // gQAZVQHxg/uoo2KNV18cEUkgFMJjaGwt+yaH9pj5rhOZ
// SIG // oE1/Vz7cciJoC3DNBniilo5vDfAr5Oju8NN+kzPH2oRZ
// SIG // dZSBkxtMMwDmsLJAfxNvSLj7pzimGs2gDKPXWFej5iw6
// SIG // 72btFp+PbwAE43eMlYvWcFPiNJlUD54RYXmN2QeMiTGC
// SIG // BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYD
// SIG // VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
// SIG // MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
// SIG // JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
// SIG // QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMA0GCWCG
// SIG // SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZI
// SIG // hvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIBvPCPvz+8ev
// SIG // TpZNeyWwgZcIv1q7XGoPNRyrR4rjdjlNMIH6BgsqhkiG
// SIG // 9w0BCRACLzGB6jCB5zCB5DCBvQQgFanT//6o8RhYXtmG
// SIG // 6BF3m/CP6QKH9NQsIW8VB/VOve0wgZgwgYCkfjB8MQsw
// SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
// SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
// SIG // b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDz
// SIG // PbQLowABAAAB5TAiBCAuRswFvFekiXsari1IVoGwc47g
// SIG // Gy4afDN8N5NXBd97gjANBgkqhkiG9w0BAQsFAASCAgB/
// SIG // P1j+y7muH3Xz3jedSK5nR2kHkcEuCAsGWHB+/AZikbUT
// SIG // N1eWT2yzMlBYm0855xpFzmHAQHRSPvbwIMY8ufNRrQTW
// SIG // J84h6VpoG+AjDywy8O1SIO0bGNgm+B7GP62d1IJJdBQD
// SIG // yzY9jcMT5eMOpecYg6iWnPVWgdG/ZXJWOEjX5pPPNNf5
// SIG // Bh5tnhO3cle14DxnzSW/ATBxxmWste0XFzsLawT9r4bH
// SIG // D469MjFAUL2RpbSygB7uHzf3KbkGKMdq9ZIw0NVlOtyl
// SIG // zLPkXpa7llRN1T6dSSKGoG3wJ+lTTFKJEbFPz7tn5Uq8
// SIG // nGhLfUMRSBt/RDWgmw4/mWi7EOPfFZZVAGprFaM0k/aG
// SIG // osviyHFfQ6ojchoU+jx4HjI8O2i15e2TlyzaAqLc2J2S
// SIG // /3daKxyVao0a55rD8DEmtUK3PrNu/M3ITwKbbyAPq0Mg
// SIG // aLu/Gk/ghOIEHeMVx4apxTE0l4z+Ql09Y92Au7WGvvOL
// SIG // bquhfe06/OmdXoHgPJLFqKnRVb5zWRCQOvZU7/GcFVll
// SIG // LMJD9C/J5Wzfh99rMi9lgyezelUpbArIx+RFncKwPi4O
// SIG // Hj6mN0vmTErUZSpIp2lr8DJC4s69Dbm6xHn6e113qS5k
// SIG // RUtBhaE5JRywEnM3YeN2Ws2KqJnsQAPJl3U0tqxtuOSF
// SIG // jfLQTKgNULMXvciRioMDZw==
// SIG // End signature block
|
combined_dataset/train/non-malicious/2150.ps1
|
2150.ps1
|
$powershellexe = (get-process -id $PID).mainmodule.filename
Describe "Clone array" -Tags "CI" {
It "Cast in target expr" {
(([int[]](42)).clone()) | Should -Be 42
(([int[]](1..5)).clone()).Length | Should -Be 5
(([int[]](1..5)).clone()).GetType() | Should -Be ([int[]])
}
It "Cast not in target expr" {
$e = [int[]](42)
$e.Clone() | Should -Be 42
$e = [int[]](1..5)
$e.Clone().Length | Should -Be 5
$e.Clone().GetType() | Should -Be ([int[]])
}
}
Describe "Set fields through PSMemberInfo" -Tags "CI" {
Add-Type @"
public struct AStruct { public string s; }
"@
It "via cast" {
([AStruct]@{s = "abc" }).s | Should -BeExactly "abc"
}
It "via new-object" {
(new-object AStruct -prop @{s="abc"}).s | Should -BeExactly "abc"
}
It "via PSObject" {
$x = [AStruct]::new()
$x.psobject.properties['s'].Value = 'abc'
$x.s | Should -Be "abc"
}
}
Describe "MSFT:3309783" -Tags "CI" {
It "Run in another process" {
& $powershellexe -noprofile -command "[psobject] | ForEach-Object FullName" | Should -Be System.Management.Automation.PSObject
}
It "Run in current process" {
[psobject] | ForEach-Object FullName | Should -Be System.Management.Automation.PSObject
}
It "Pipe objects derived from PSObject" {
class MyPsObj : PSObject
{
MyPsObj($obj) : base($obj) { }
[string] ToString() {
return "MyObj: " + $this.psobject.BaseObject
}
}
[MyPsObj]::new("abc").psobject.ToString() | Should -Be "MyObj: abc"
[MyPsObj]::new("def") | Out-String | ForEach-Object Trim | Should -Be "MyObj: def"
}
}
Describe "ScriptBlockAst.GetScriptBlock throws on error" -Tags "CI" {
$e = $null
It "with parse error" {
$ast = [System.Management.Automation.Language.Parser]::ParseInput('function ', [ref]$null, [ref]$e)
{ $ast.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException"
}
It "with semantic errors" {
$ast = [System.Management.Automation.Language.Parser]::ParseInput('function foo{param()begin{}end{[ref][ref]1}dynamicparam{}}', [ref]$null, [ref]$e)
{ $ast.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException"
{ $ast.EndBlock.Statements[0].Body.GetScriptBlock() } | Should -Throw -ErrorId "PSInvalidOperationException"
}
}
Describe "Hashtable key property syntax" -Tags "CI" {
$script = @'
$hash = New-Object hashtable
$key = [ConsoleColor]::Red
$null = $hash.$key
$hash = @{}
$hash.$key = 'Hello'
$hash.$key
'@
It "In current process" {
Invoke-Expression $script | Should -BeExactly 'Hello'
}
It "In different process" {
$bytes = [System.Text.Encoding]::Unicode.GetBytes($script)
& $powershellexe -noprofile -encodedCommand ([Convert]::ToBase64String($bytes)) | Should -BeExactly 'Hello'
}
}
Describe "Assign automatic variables" -Tags "CI" {
$autos = '_', 'args', 'this', 'input', 'pscmdlet', 'psboundparameters', 'myinvocation', 'psscriptroot', 'pscommandpath'
foreach ($auto in $autos)
{
It "Assign auto w/ invalid type constraint - $auto" {
{ & ([ScriptBlock]::Create("[datetime]`$$auto = 1")) } | Should -Throw $auto
{ . ([ScriptBlock]::Create("[datetime]`$$auto = 1")) } | Should -Throw $auto
{ & ([ScriptBlock]::Create("[runspace]`$$auto = 1")) } | Should -Throw $auto
{ . ([ScriptBlock]::Create("[runspace]`$$auto = 1")) } | Should -Throw $auto
{ & ([ScriptBlock]::Create("[notexist]`$$auto = 1")) } | Should -Throw $auto
{ . ([ScriptBlock]::Create("[notexist]`$$auto = 1")) } | Should -Throw $auto
}
}
foreach ($auto in $autos)
{
It "Assign auto w/o type constraint - $auto" {
& ([ScriptBlock]::Create("`$$auto = 1; `$$auto")) | Should -Be 1
. ([ScriptBlock]::Create("`$$auto = 1; `$$auto")) | Should -Be 1
}
}
It "Assign auto w/ correct type constraint" {
& { [object]$_ = 1; $_ } | Should -Be 1
& { [object[]]$args = 1; $args } | Should -Be 1
& { [object]$this = 1; $this } | Should -Be 1
& { [object]$input = 1; $input } | Should -Be 1
& { [System.Management.Automation.InvocationInfo]$myInvocation = $myInvocation; $myInvocation.Line } | Should -Match Automation.InvocationInfo
& { [string]$PSScriptRoot = 'abc'; $PSScriptRoot } | Should -BeExactly 'abc'
& { [string]$PSCommandPath = 'abc'; $PSCommandPath } | Should -BeExactly 'abc'
}
}
Describe "Assign readonly/constant variables" -Tags "CI" {
$testCase = @(
@{ sb_wo_conversion = { $? = 1 }; name = '$? = 1' }
@{ sb_wo_conversion = { $HOME = 1 }; name = '$HOME = 1' }
@{ sb_wo_conversion = { $PID = 1 }; name = '$PID = 1' }
)
It "Assign readonly/constant variables w/o type constraint - '<name>'" -TestCases $testCase {
param($sb_wo_conversion)
{ & $sb_wo_conversion } | Should -Throw -ErrorId "VariableNotWritable"
{ . $sb_wo_conversion } | Should -Throw -ErrorId "VariableNotWritable"
}
$testCase = @(
@{ sb_w_conversion = { [datetime]$? = 1 }; name = '[datetime]$? = 1' }
@{ sb_w_conversion = { [datetime]$HOME = 1 }; name = '[datetime]$HOME = 1' }
@{ sb_w_conversion = { [datetime]$PID = 1 }; name = '[datetime]$PID = 1' }
)
It "Assign readonly/constant variables w/ type constraint - '<name>'" -TestCases $testCase {
param($sb_w_conversion)
{ & $sb_w_conversion } | Should -Throw -ErrorId "VariableNotWritable"
{ . $sb_w_conversion } | Should -Throw -ErrorId "VariableNotWritable"
}
}
Describe "Attribute error position" -Tags "CI" {
It "Ambiguous overloads" {
$e = {
& {
param(
[ValidateNotNull(1,2,3,4)]
$param
)
}
} | Should -Throw -PassThru -ErrorId 'MethodCountCouldNotFindBest'
$e.InvocationInfo.Line | Should -Match ValidateNotNull
}
}
Describe "Multiple alias attributes" -Tags "CI" {
It "basic test" {
function foo {
param(
[alias('aa')]
[alias('bb')]
$cc
)
$cc
}
foo -aa 1 | Should -Be 1
foo -bb 2 | Should -Be 2
foo -cc 3 | Should -Be 3
}
}
Describe "Members of System.Type" -Tags "CI" {
It "Members in public classes derived from System.Type should be found" {
class MyType : System.Collections.IEnumerable
{
[System.Collections.IEnumerator] GetEnumerator() { return $null }
}
[type] | Get-Member ImplementedInterfaces | Should -Be 'System.Collections.Generic.IEnumerable[type] ImplementedInterfaces {get;}'
[MyType].ImplementedInterfaces | Should -Be System.Collections.IEnumerable
}
}
Describe "Hash expression with if statement as value" -Tags "CI" {
BeforeAll {
$hash1 = @{
a = if (1) {'a'}
b = 'b'
c = if (0) {2} elseif (1) {'c'}
d = 'd'
e = if (0) {2} elseif (0) {2} else {'e'}
f = 'f'
g = if (0) {2} else {'g'}
h = 'h'
}
$hash2 = @{
a = if (1) {'a'}
b = 'b'
c = if (0) {2} elseif (1) {'c'}
d = 'd'
e = if (0) {2} elseif (0) {2} else {'e'}
f = 'f'
g = if (0) {2} else {'g'}
h = 'h'
}
$hash3 = @{
a = if (1)
{
'a'
}
b = 'b'
c = if (0)
{
2
}
elseif (1)
{
'c'
}
d = 'd'
e = if (0)
{
2
}
elseif (0)
{
2
}
else
{
'e'
}
f = 'f'
g = if (0)
{
2
}
else
{
'g'
}
h = 'h'
}
$testCases = @(
@{ name = "No extra new lines"; hash = $hash1 }
@{ name = "With extra new lines"; hash = $hash2 }
@{ name = "With expanded if-statement"; hash = $hash3 }
)
}
It "Key-value pairs after an if-statement-value in a HashExpression should continue to be parsed - <name>" -TestCases $testCases {
param($hash)
$hash['a'] | Should -BeExactly 'a'
$hash['b'] | Should -BeExactly 'b'
$hash['c'] | Should -BeExactly 'c'
$hash['d'] | Should -BeExactly 'd'
$hash['e'] | Should -BeExactly 'e'
$hash['f'] | Should -BeExactly 'f'
$hash['g'] | Should -BeExactly 'g'
$hash['h'] | Should -BeExactly 'h'
}
}
Describe "Support case-insensitive comparison in Posix locale" -Tag CI {
It "Hashtable is case insensitive" -Skip:($IsWindows) {
try {
$oldCulture = [System.Globalization.CultureInfo]::CurrentCulture
[System.Globalization.CultureInfo]::CurrentCulture = [System.Globalization.CultureInfo]::new('en-US-POSIX')
@{h=1}.H | Should -Be 1 -Because 'hashtables should be case insensitive in en-US-POSIX culture'
}
finally {
[System.Globalization.CultureInfo]::CurrentCulture = $oldCulture
}
}
It "Wildcard support case-insensitive matching" -Skip:($IsWindows) {
try {
$oldCulture = [System.Globalization.CultureInfo]::CurrentCulture
[System.Globalization.CultureInfo]::CurrentCulture = [System.Globalization.CultureInfo]::new('en-US-POSIX')
$wildcard1 = [WildcardPattern]::new("AbC*", [System.Management.Automation.WildcardOptions]::IgnoreCase)
$wildcard1.IsMatch("abcd") | Should -BeTrue
$wildcard2 = [WildcardPattern]::new("DeF", [System.Management.Automation.WildcardOptions]::IgnoreCase);
$wildcard2.IsMatch("def") | Should -BeTrue
}
finally {
[System.Globalization.CultureInfo]::CurrentCulture = $oldCulture
}
}
}
|
combined_dataset/train/non-malicious/Get-FSMORoleOwner_2.ps1
|
Get-FSMORoleOwner_2.ps1
|
Function Get-FSMORoleOwner {
<#
.SYNOPSIS
Retrieves the list of FSMO role owners of a forest and domain
.DESCRIPTION
Retrieves the list of FSMO role owners of a forest and domain
.NOTES
Name: Get-FSMORoleOwner
Author: Boe Prox
DateCreated: 06/9/2011
.EXAMPLE
Get-FSMORoleOwner
DomainNamingMaster : dc1.rivendell.com
Domain : rivendell.com
RIDOwner : dc1.rivendell.com
Forest : rivendell.com
InfrastructureOwner : dc1.rivendell.com
SchemaMaster : dc1.rivendell.com
PDCOwner : dc1.rivendell.com
Description
-----------
Retrieves the FSMO role owners each domain in a forest. Also lists the domain and forest.
#>
[cmdletbinding()]
Param ()
Try {
$forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest()
ForEach ($domain in $forest.domains) {
$forestproperties = @{
Forest = $Forest.name
Domain = $domain.name
SchemaMaster = $forest.SchemaRoleOwner
DomainNamingMaster = $forest.NamingRoleOwner
RIDOwner = $Domain.RidRoleOwner
PDCOwner = $Domain.PdcRoleOwner
InfrastructureOwner = $Domain.InfrastructureRoleOwner
}
$newobject = New-Object PSObject -Property $forestproperties
$newobject.PSTypeNames.Insert(0,"ForestRoles")
$newobject
}
}
Catch {
Write-Warning "$($Error)"
}
}
|
combined_dataset/train/non-malicious/2389.ps1
|
2389.ps1
|
param($scan_results_file)
$download_path = 'C:\Documents and Settings\abertram\Desktop\CONFIGMANAGER Vulnerabilities'
$mht_contents = gc $scan_results_file
$ie = New-Object -ComObject 'InternetExplorer.Application'
$webclient = New-Object System.Net.WebClient
$ie.Navigate2('file:///C:\Documents and Settings\abertram\Desktop\CONFIGMANAGER Vulnerabilities\Scan_Results_unnhs_tw1_20131121_scan_1385046170_57428.mht')
$links = $ie.Document.getElementsByTagName('a') | ? {($_.innertext -like '*Windows Server 2012*') -and ($_.innertext -notlike '*Core*') -and ($_.href -like 'http://*')} | select -ExpandProperty href
foreach ($link in $links) {
$r = Invoke-WebRequest -Uri $link -UseBasicParsing
$r.Links | ? {$_.outerhtml -like '*<span>Download</span>*'} | % {
$_.href
$y = Invoke-WebRequest "http://www.microsoft.com$($_.href)" -UseBasicParsing
}
$y.Links | ? {$_.outerhtml -like '*Click Here*'} | select -first 1 | % {$webclient.DownloadFile($_.href,"$download_path\$(split-path $_.href -Leaf)")}
}
|
combined_dataset/train/non-malicious/sample_15_70.ps1
|
sample_15_70.ps1
|
#
# Module manifest for module 'OCI.PSModules.Visualbuilder'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Visualbuilder.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '30071ced-fbc1-4b5d-9ea5-b0fb2ecea5bc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Visualbuilder Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Visualbuilder.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVisualbuilderVbInstance',
'Get-OCIVisualbuilderVbInstancesList',
'Get-OCIVisualbuilderWorkRequest',
'Get-OCIVisualbuilderWorkRequestErrorsList',
'Get-OCIVisualbuilderWorkRequestLogsList',
'Get-OCIVisualbuilderWorkRequestsList',
'Invoke-OCIVisualbuilderRequestSummarizedApplications',
'Move-OCIVisualbuilderVbInstanceCompartment',
'New-OCIVisualbuilderVbInstance',
'Remove-OCIVisualbuilderVbInstance',
'Start-OCIVisualbuilderVbInstance',
'Stop-OCIVisualbuilderVbInstance',
'Update-OCIVisualbuilderVbInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Visualbuilder'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2842.ps1
|
2842.ps1
|
function Test-ModuleVersion {
[CmdletBinding()]
param (
[string]$currentVersion,
[string]$minimumVersion,
[string]$maximumVersion,
[string]$lessThanVersion
)
begin {
}
process {
$result = $true
if("$minimumVersion$maximumVersion$lessthanVersion" -eq ''){
return $true
}
if(![string]::IsNullOrEmpty($currentVersion)) {
if($currentVersion.ToString().Length -eq 1) {
[version]$currentVersion = "$currentVersion.0"
} else {
[version]$currentVersion = $currentVersion
}
}
if(![string]::IsNullOrEmpty($minimumVersion)) {
if($minimumVersion.ToString().Length -eq 1){
[version]$minimumVersion = "$minimumVersion.0"
} else {
[version]$minimumVersion = $minimumVersion
}
if($currentVersion.CompareTo($minimumVersion) -lt 0){
$result = $false
}
}
if(![string]::IsNullOrEmpty($maximumVersion)) {
if($maximumVersion.ToString().Length -eq 1) {
[version]$maximumVersion = "$maximumVersion.0"
} else {
[version]$maximumVersion = $maximumVersion
}
if ($currentVersion.CompareTo($maximumVersion) -gt 0) {
$result = $false
}
}
if(![string]::IsNullOrEmpty($lessThanVersion)) {
if($lessThanVersion.ToString().Length -eq 1) {
[version]$lessThanVersion = "$lessThanVersion.0"
} else {
[version]$lessThanVersion = $lessThanVersion
}
if($currentVersion.CompareTo($lessThanVersion) -ge 0) {
$result = $false
}
}
Write-Output $result
}
end {
}
}
|
combined_dataset/train/non-malicious/sample_62_12.ps1
|
sample_62_12.ps1
|
Import-LocalizedData -BindingVariable VvsTxt -FileName AzStackHci.MOCStack.Strings.psd1
function Test-MOCStackVolume
{
<#
.SYNOPSIS
Verify if the available free space in the volume, meets the size threshold required by MOCStack during the deployment scenario.
.DESCRIPTION
Verify if the available free space in the volume meets the size threshold required by MOCStack during the deployment scenario.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
.PARAMETER PhysicalDriveLetter
Specify PhysicalDriveLetter used to validation MOCStack Volume. Default C drive is used as MOCStack volume.
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType,
[Parameter(Mandatory=$false, ParameterSetName="DefaultSet")]
[string] $PhysicalDriveLetter = "C"
)
try
{
$defalutHC4MOCStackVolumeSize = 50
$defalutVMMOCStackVolumeSize = 20
Log-Info -Message ($VvsTxt.MOCStackVolumeStartInfo) -Type Info
Log-Info -Message ($VvsTxt.MOCStackVolumeDriveInfo -f $PhysicalDriveLetter)
$lowDiskMsg = ($VvsTxt.LowDiskSpaceMsg -f $PhysicalDriveLetter)
# Scriptblock to test MOCStackVolumeSize on each server
$testVolumeSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedMOCStackVolumeSizeInGB = $args[0]
$freeSpaceInGB = 1
$resourceMsg = $null
try
{
# Check if env is Virtual
$hardwareType = (Get-WmiObject -Class Win32_ComputerSystem).Model
if ($hardwareType -eq "Virtual Machine")
{
$expectedMOCStackVolumeSizeInGB = $args[1]
}
# Check free space on physical volume
$totalFreeSpace = (Get-Volume -DriveLetter $args[2]).SizeRemaining
$freeSpaceInGB = [int]($totalFreeSpace / 1GB)
if ($freeSpaceInGB -lt $expectedMOCStackVolumeSizeInGB)
{
$resourceMsg = "MOCStack volume '$($args[2])' needs, $($expectedMOCStackVolumeSizeInGB) GB free space."
throw $args[3]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack Volume test."
$status = "FAILURE"
}
finally
{
$AdditionalData = @{
HardwareType = $hardwareType
ExpectedMOCStackVolumeSize = $expectedMOCStackVolumeSizeInGB
CurrentMOCStackVolumeSize = $freeSpaceInGB
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackVolumeSizeResult = Invoke-Command -Session $PsSession -ScriptBlock $testVolumeSb -ArgumentList $defalutHC4MOCStackVolumeSize, $defalutVMMOCStackVolumeSize, $PhysicalDriveLetter, $lowDiskMsg
# build result
foreach ($result in $MOCStackVolumeSizeResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_Volume'
Title = 'MOCStack Volume Requirement'
DisplayName = 'MOCStack Volume Requirement {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check MOCStack volume ({0}) size requirement ({1}) is met' -f $PhysicalDriveLetter, $MOCStackVolumeSizeResult.ExpectedMOCStackVolumeSize
Tags = @{
OperationType = $OperationType
}
Remediation = 'Free up disk space for MOCStack Volume'
TargetResourceID = "$($result.Source)/$PhysicalDriveLetter"
TargetResourceName = $PhysicalDriveLetter
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackCPUCore
{
<#
.SYNOPSIS
Verify if the host node meets the minimum CPU count requirement for MOCStack configuration
.DESCRIPTION
Verify if the host node meets the minimum CPU count requirement for MOCStack configuration
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
$defalutCPUCount = 4
Log-Info -Message ($VvsTxt.MOCStackCPUStartInfo) -Type Info
$lowCpuMsg = ($lvsTxt.LowCPuMsg)
# Scriptblock to test MOCStackCpu core on each server
$testCpuSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedMOCStackCpuCoreCount = $args[0]
$resourceMsg = $null
$cpuCount = 1
try
{
# Check CPU core count on each machince
$cpuCount = $((Get-CimInstance -ClassName Win32_Processor -Property NumberOfCores).NumberOfCores | Measure-Object -Sum).Sum
if ($cpuCount -lt $expectedMOCStackCpuCoreCount)
{
$resourceMsg = "MOCStack CPU validation expects at least the host to have $($expectedMOCStackCpuCoreCount) cores."
throw $args[1]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack Cpu test."
$status = "FAILURE"
}
finally
{
$AdditionalData = @{
HardwareType = $hardwareType
ExpectedMOCStackCPUCoreCount = $expectedMOCStackCpuCoreCount
CurrentMOCStackCPUCoreCount = $cpuCount
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackCPUResult = Invoke-Command -Session $PsSession -ScriptBlock $testCpuSb -ArgumentList $defalutCPUCount, $lowCpuMsg
# build result
foreach ($result in $MOCStackCPUResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_CpuCoreCount'
Title = 'MOCStack CPU Requirement'
DisplayName = 'MOCStack CPU Requirement {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check MOCStack CPU core count ({0}) requirement is met' -f $defalutCPUCount
Tags = @{
OperationType = $OperationType
}
Remediation = 'Upgrage the node CPU core configuration'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackMemory
{
<#
.SYNOPSIS
Verify physical memory ie RAM of the node satisfies the minimum requirements of MOCStack.
.DESCRIPTION
Verify physical memory ie RAM of the node satisfies the minimum requirements of MOCStack.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
$defalutRAMSizeInGB = 8
Log-Info -Message ($VvsTxt.MOCStackMemoryStartInfo) -Type Info
$lowMemoryMsg = ($VvsTxt.LowMemoryMsg)
# Scriptblock to test physical memory on each server
$testRAMSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedRAMSizeInGB = $args[0]
$freeSpaceInGB = 1
$resourceMsg = $null
try
{
# Check physical memory size
$totalRAM = (Get-CimInstance Win32_PhysicalMemory | Measure-Object -Property capacity -Sum).sum
$totalRAMInGB = [int]($totalRAM / 1GB)
if ($totalRAMInGB -lt $defalutRAMSize)
{
$resourceMsg = "MOCStack physical memory size validation expects at least the host to have $($expectedRAMSizeInGB) GB."
throw $args[1]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack physical memory size test."
$status = "FAILURE"
}
finally
{
$AdditionalData += @{
HardwareType = $hardwareType
ExpectedMOCStackRAM = $expectedRAMSizeInGB
CurrentMOCStackRAM = $totalRAMInGB
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackRAMSizeResult = Invoke-Command -Session $PsSession -ScriptBlock $testRAMSb -ArgumentList $defalutRAMSizeInGB, $lowMemoryMsg
# build result
foreach ($result in $MOCStackRAMSizeResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_RAM_Size'
Title = 'MOCStack RAM Requirement'
DisplayName = 'MOCStack RAM Requirement {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check MOCStack RAM ({0}) requirement is met' -f $defalutRAMSizeInGB
Tags = @{
OperationType = $OperationType
}
Remediation = 'Upgrage the node PhysicalMemory configuration'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackNetworkPort
{
<#
.SYNOPSIS
Verify that the required network ports for MOCStack are open.
.DESCRIPTION
Verify that the required network ports for MOCStack are open.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
# Don't do this test in a proxy environment
if (Get-IsProxyEnabled)
{
return
}
$portList = '443','80'
Log-Info -Message ($VvsTxt.MOCStackPortInfo) -Type Info
$disabledPortMsg = ($VvsTxt.DisablePortMsg)
# Scriptblock to test network port on each server
$testPortSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedPortList = $args[0]
$failedPort = $null
$resourceMsg = $null
try
{
# Check each network port is enabled on the node
foreach ($port in $expectedPortList)
{
# Added retry logic
$retryCount = 0
$tcpSucceeded = $false
while (!$tcpSucceeded -and $retryCount -lt 5)
{
$tcpSucceeded = Test-NetConnection -Port $port -InformationLevel Quiet
$retryCount ++
}
# Validate the TCP connection
if($tcpSucceeded -ne $true)
{
$failedPort += " $port,"
$status = "FAILURE"
}
}
# Check overall network port enable status
if ($status -eq 'FAILURE')
{
$resourceMsg = "The network port validation for MOCStack requires $($failedPort) to be enabled."
throw $args[1]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack network port test."
$status = "FAILURE"
}
finally
{
$AdditionalData += @{
HardwareType = $hardwareType
ExpectedEnablePort = $portList
DisablePort = $FailedPort
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackPortResult = Invoke-Command -Session $PsSession -ScriptBlock $testPortSb -ArgumentList $portList, $disabledPortMsg
# build result
foreach ($result in $MOCStackPortResult)
{
# build result
$params = @{
Name = 'AzStackHci_MOCStack_Network_Port'
Title = 'MOCStack Network Port Requirement'
DisplayName = 'MOCStack Network Port Requirement {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check MOCStack Network Port requirement is met'
Tags = @{
OperationType = $OperationType
}
Remediation = 'Enable the mandatory network port required for MOCStack'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackFirewallUrl
{
<#
.SYNOPSIS
Verify that the necessary URL for MOCStack is added to the allowlist in the firewall.
.DESCRIPTION
Verify that the necessary URL for MOCStack is added to the allowlist in the firewall.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
# This test has been converted to a service-defined target towards an external endpoint using connectivity validator
try
{
Log-Info -Message ($VvsTxt.MOCStackFirewallURLInfo) -Type Info
$MOCStackURLResult = Invoke-AzStackHciConnectivityValidation -Exclude (Get-AzStackHciConnectivityServiceName | ? {$_ -ne 'MOC Stack'}) -PassThru | Where-Object Name -like *MOCStack*
# build result
foreach ($result in $MOCStackURLResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_Firewall_URL'
Title = 'MOCStack Firewall URL allowed list Requirement'
DisplayName = 'MOCStack Firewall URL allowed list Requirement {0}' -f $result.AdditionalData.Source
Severity = 'WARNING'
Description = 'Test to check MOCStack Firewall URL allowed list requirement is met'
Tags = @{
OperationType = $OperationType
}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/azure-arc-vm-management-prerequisites#firewall-url-requirements'
TargetResourceID = $result.TargetResourceID
TargetResourceName = $result.TargetResourceName
TargetResourceType = $result.TargetResourceType
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result.AdditionalData
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackNodeAgents
{
<#
.SYNOPSIS
Verify MOC NodeAgent Service is up and running.
.DESCRIPTION
Verify MOC NodeAgent Service is up and running.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
Log-Info -Message ($VvsTxt.MOCStackNodeAgentInfo) -Type Info
$nodeAgentFailMsg = ($VvsTxt.NodeAgentFail)
# Scriptblock to check MOC Node agent service on each server
$testNodeAgentSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedAgentState = 'Running'
$currentAgentStatus = $null
$resourceMsg = $null
try
{
# Check Node agent service is in running state
$currentAgentStatus = $(Get-Service -Name 'wssdagent' | Select Status).Status
if($currentAgentStatus -ne $expectedAgentState)
{
$status = "FAILURE"
$resourceMsg = "On node $($ENV:COMPUTERNAME), MOC NodeAgent service is in $($currentAgentStatus) status"
throw $args[0]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack Node Agent test."
$status = "FAILURE"
}
finally
{
$AdditionalData += @{
HardwareType = $hardwareType
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackNodeAgentResult = Invoke-Command -Session $PsSession -ScriptBlock $testNodeAgentSb -ArgumentList $nodeAgentFailMsg
# build result
foreach ($result in $MOCStackNodeAgentResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_NodeAgent_Service'
Title = 'MOCStack Node agent Service State'
DisplayName = 'MOCStack Node agent Service State {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check if the MOCStack NodeAgent service is in the expected running state'
Tags = @{
OperationType = $OperationType
}
Remediation = 'Ensure the MOC NodeAgent service is in Online state'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackCloudAgent
{
<#
.SYNOPSIS
Verify MOC CloudAgent Service is in an online state.
.DESCRIPTION
Verify MOC CloudAgent Service is in an online state.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
Log-Info -Message ($VvsTxt.MOCStackCloudAgentInfo) -Type Info
$cloudAgentFailMsg = ($VvsTxt.CloudAgentFail)
# Scriptblock to check MOC cloud agent service state
$testCloudAgentSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedCloudAgentState = 'Online'
$currentCloudAgentStatus = $null
$resourceMsg = $null
try
{
# Check Cloud agent service is in Online state
$currentCloudAgentStatus = $(Get-ClusterResource -Name 'MOC Cloud Agent Service' | select State).State
if($currentCloudAgentStatus -ne $expectedCloudAgentState)
{
$status = "FAILURE"
$resourceMsg = "MOC CloudAgent service is in $($currentCloudAgentStatus) state"
throw $args[0]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack CloudAgent Agent test."
$status = "FAILURE"
}
finally
{
$AdditionalData += @{
HardwareType = $hardwareType
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackCloudAgentResult = Invoke-Command -Session $PsSession -ScriptBlock $testCloudAgentSb -ArgumentList $cloudAgentFailMsg
# build result
foreach ($result in $MOCStackCloudAgentResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_CloudAgent_Service'
Title = 'MOCStack CloudAgent Service State'
DisplayName = 'MOCStack CloudAgent Service State {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check if the MOCStack CloudAgent service is in the expected running state'
Tags = @{
OperationType = $OperationType
}
Remediation = 'Ensure the MOC CloudAgent service is in Online state'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
function Test-MOCStackClusterNode
{
<#
.SYNOPSIS
Verify cluster node is up and running.
.DESCRIPTION
Verify cluster node is up and running.
.PARAMETER PsSession
Specify the PsSession(s) used to validation from.
.PARAMETER OperationType
Specify the Operation Type to target for MOCStack validation. e.g. Deployment, Update, etc
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true)]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false)]
[string[]]
$OperationType
)
try
{
Log-Info -Message ($VvsTxt.ClusterNodeInfo) -Type Info
$clusterNodeFailMsg = ($VvsTxt.ClusterNodeFail)
# Scriptblock to check cluster node state
$testClusterNodeSb = {
$AdditionalData = @()
$status = "SUCCESS"
$errorMsg = $null
$hardwareType = $null
$expectedClusterNodeState = 'Up'
$offlineNode = $null
$resourceMsg = $null
try
{
# Check cluster node state is up and running
$offlineNode = $(Get-ClusterNode | Where State -ne $expectedClusterNodeState)
if($offlineNode -ne $null -and $offlineNode.count -gt 0)
{
$status = "FAILURE"
$resourceMsg = "Cluster node $($offlineNode.Name), in $($offlineNode.State) state"
throw $args[0]
}
}
catch
{
$errorMsg = $_.Exception.Message
$resourceMsg = "Error occurred in Environment Validator MOCStack Cluster Node test."
$status = "FAILURE"
}
finally
{
$AdditionalData += @{
HardwareType = $hardwareType
Status = $status
Source = $ENV:COMPUTERNAME
Resource = $resourceMsg
Detail = $errorMsg
}
}
return $AdditionalData
}
# Run scriptblock
$MOCStackClusterNodeResult = Invoke-Command -Session $PsSession -ScriptBlock $testClusterNodeSb -ArgumentList $cloudAgentFailMsg
# build result
foreach ($result in $MOCStackClusterNodeResult)
{
$params = @{
Name = 'AzStackHci_MOCStack_ClusterNode_State'
Title = 'MOCStack Cluster Node State'
DisplayName = 'MOCStack Cluster Node State {0}' -f $result.Source
Severity = 'CRITICAL'
Description = 'Test to check if the cluster node is in the expected up state'
Tags = @{
OperationType = $OperationType
}
Remediation = 'Ensure the MOC CloudAgent service is in Online state'
TargetResourceID = $result.Source
TargetResourceName = $result.Source
TargetResourceType = 'Computer'
Timestamp = [datetime]::UtcNow
Status = $result.Status
AdditionalData = $result
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
catch
{
throw $_
}
}
Export-ModuleMember -Function Test-MOCStackCPUCore
Export-ModuleMember -Function Test-MOCStackMemory
Export-ModuleMember -Function Test-MOCStackNetworkPort
Export-ModuleMember -Function Test-MOCStackFirewallUrl
Export-ModuleMember -Function Test-MOCStackClusterNode
Export-ModuleMember -Function Test-MOCStackCloudAgent
Export-ModuleMember -Function Test-MOCStackNodeAgents
# Excluding Volume check function
#Export-ModuleMember -Function Test-MOCStackVolume
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDqB6i/7brzZldn
# 0CQ+AHn2fVgShjCYslub1iE6zGmtLaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIECugvZEj3HE0SOnWJJoCXje
# oGVu2GwKqIWl/8e1X0xqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAXr8hShm58+u6r+rHThXFZLU+p6oT/21KH6/4OKhq7Q8HsqiVQ3IsW9cK
# BkdBmK3bAfX/DZ3zYjSmz5UKlzRNZ4BiKOcPEwXvNqsvQ6Y0t4KbKewM1PUw3nBA
# ow5FBiZQ4Gmj6pvPVwi0fYAXF4sEbuD/Ng4uOzNCSBTeiwfK1uNnygvvKXHvKjEp
# QhEt1iSG1Wi1/PhH1pji3UN23oRftqwQvowu4v2l1lCtavTaJK0dvNBEpgD5OxjT
# /IZN5kx2zb9FQfOGQW/bsybSAYimEaqtRCzeNyUqtn+VU+3jgXwek2JVL8jiL1WE
# MqF2CTnv2WsMxEAWQ5UIKeFe6tNt4KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA9IF8hhZE/HEUiZJDzh83+bJyLNyYrCq3XPKvrEdjMvwIGZkYiWzfe
# GBMyMDI0MDUxNjE4NDQzNi4wOTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHsMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP
# MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCg2TAiGA8yMDI0MDUxNjE1MTIy
# NVoYDzIwMjQwNTE3MTUxMjI1WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDp8KDZ
# AgEAMAkCAQACATcCAf8wBwIBAAICEuYwCgIFAOnx8lkCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAePV51DW0f865fIazZKp1tXZGs4fFq7oHQO66OZOUjZ+2
# o4/BNqFf6E8vU3FkWVyrZujrYsR6Hy7FS/4iyoAHmmvqRNgfvWpJnGxfXHozA3Sg
# H5zj6V6l/+QIwlW1uru2ZmIOpetcmudGdYVD1uur/PL0prDEqRPD8paKJCxKBgWA
# 5VSijQQNKQ1V7YCA4pTTKewv4hoLSAgqWO2vVqXlEZV71Yt9Lapg+fuCWNVc+ihM
# D5/6vKz7b6b5ir5QO42oTxaU9XUQeXIqzkQzFrIPrla2FAsMQlzfU9exa9cdsE+9
# BOnRQsaGENvNxI0xBqJ3WuyuXnXmQo0pBit52yZ7qzGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8Cp8HVk75h+tAAEAAAHw
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEID83q5+ycrjYhZRq7WF4sehDsi2UySIQ9L+Pkm6oqbRF
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgXAGao6Vy/eRTuYAHmxZHvhAU
# CJLqZv4IzpqycUBlS4swgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAiBCAKYc5/DT+Isk5fFZhPzToAI+1Z
# gbu5VQpXnTMQ+fUWyjANBgkqhkiG9w0BAQsFAASCAgA+C6+XsH4ziu74FGKq6Eh1
# pryIyq9qndei2uiWiv7V785bXr2odJsbv1CaNIQx8eF300xaDd25UmM5vow3TEAM
# VlwESBSzEATi0cHUJNTBd1oIScJOUgLdWeHKzp/maSy0M/KN+p8vDqkydGitAt0H
# 6IaAzzlHGg5EqB+pQ6aAwTdPwoG9APmhFtP9s0s/KwpoT69rKdWAWgRR0cCkLPQ8
# JfmneWUBbwxM7jSeD2Z+dC/cUNtfurxopgquXWQQHeTTpSwo0eBaAmDnjOuunr4+
# gvfCOsEMMpVSGb4T5Aky5ou8v1JOJSEEErq94A5dqDHsq5utvBRiKxWzgjfKhs2t
# RwPHCL0pqpEc7KVjPgyNvCs/FzrP0v1QcBahxOyyEJ3dm+mo7R6dS1vENormSDlF
# xaIQrOXJ0l6mKLpk/pSsn7UEHAl/ZJIxVoeGyLNL0EjhrbRl2fe87tzCKBjIqUBA
# y+0Iu1AUcVs7SqyATID/x6bQaZ3MRmlpc7CuvB+jyNPn0n/2YhFrxjItAovOWyy8
# XfIM9rNnDBJfUvaPE0APnKFoV4H9W2m1NSRjUlWr1yTGz3jQzn8/GHLRdqHhjkUm
# O/EzamK45zYqPbRFvAEihLcB64bG7JbLF5HDTuA+xKAoNXgSFS9bIgufd2z7JDW6
# 7+TT13FIFQXRwXZ3TKInpw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/2229.ps1
|
2229.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")]
[ValidateNotNullOrEmpty()]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer
)
Begin {
try {
Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug -Message "SiteCode: $($SiteCode)"
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch [System.Exception] {
Write-Warning -Message "Unable to determine SiteCode" ; break
}
}
Process {
Write-Verbose -Message "Querying for packages in a failed distribution state"
$DistributionFailures = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_PackageStatusDistPointsSummarizer -Filter "(State = '1') OR (State = '2') OR (State = '3') OR (State = '7') OR (State = '8')"
if ($DistributionFailures -ne $null) {
foreach ($ContentFailure in $DistributionFailures) {
Write-Verbose -Message "Found package '$($ContentFailure.PackageID)', will attempt to refresh"
$DistributionPoints = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_DistributionPoint -Filter "(SiteCode = '$($ContentFailure.SiteCode)') AND (PackageID = '$($ContentFailure.PackageID)')"
if ($DistributionPoints -ne $null) {
foreach ($DistributionPoint in $DistributionPoints) {
if ($DistributionPoint.ServerNALPath -eq $ContentFailure.ServerNALPath) {
$DistributionPoint.RefreshNow = $true
$DistributionPoint.Put() | Out-Null
Write-Verbose -Message "Successfully refreshed package '$($ContentFailure.PackageID)'"
}
}
}
else {
Write-Output -InputObject "No Distribution Points found for package '$($ContentFailure.PackageID)'"
}
}
}
else {
Write-Output -InputObject "There where no unsuccessful content distributions found"
}
}
|
combined_dataset/train/non-malicious/2100.ps1
|
2100.ps1
|
Describe "Error position Tests" -Tags "CI" {
BeforeAll {
$switch_condition_script = @'
$test = 1
switch ($null[0]) {
"a" {};
}
'@
$for_expression_initializer_script = @'
$test = 1
for ($null[0];
$test -gt 1;) { }
'@
$for_pipeline_initializer_script = @'
$test = 1
for (Test-Path $null -ErrorAction Stop;
$test -gt 1;) { }
'@
$for_expression_condition_script = @'
$test = 1
for (;$null[0];)
{ }
'@
$for_pipeline_condition_script = @'
$test = 1
for (;Test-Path $null -ErrorAction Stop;)
{ }
'@
$do_while_expression_condition_script = @'
$test = 1
do {}
while ($null[0])
'@
$do_while_pipeline_condition_script = @'
$test = 1
do {}
while (Test-Path $null -ErrorAction Stop)
'@
$do_until_expression_condition_script = @'
$test = 1
do {}
until ($null[0])
'@
$do_until_pipeline_condition_script = @'
$test = 1
do {}
until (Test-Path $null -ErrorAction Stop)
'@
$testCases = @(
@{ Name = "switch condition"; FileName = "SwitchError2.ps1"; Script = $switch_condition_script; MatchText = "SwitchError2.ps1: line 2" }
@{ Name = "for statement expression initializer"; FileName = "ForError1.ps1"; Script = $for_expression_initializer_script; MatchText = "ForError1.ps1: line 2" }
@{ Name = "for statement pipeline initializer"; FileName = "ForError2.ps1"; Script = $for_pipeline_initializer_script; MatchText = "ForError2.ps1: line 2" }
@{ Name = "for statement expression condition"; FileName = "ForError3.ps1"; Script = $for_expression_condition_script; MatchText = "ForError3.ps1: line 2" }
@{ Name = "for statement pipeline condition"; FileName = "ForError4.ps1"; Script = $for_pipeline_condition_script; MatchText = "ForError4.ps1: line 2" }
@{ Name = "do-while statement expression condition"; FileName = "DoWhileError1.ps1"; Script = $do_while_expression_condition_script; MatchText = "DoWhileError1.ps1: line 3" }
@{ Name = "do-while statement pipeline condition"; FileName = "DoWhileError2.ps1"; Script = $do_while_pipeline_condition_script; MatchText = "DoWhileError2.ps1: line 3" }
@{ Name = "do-until statement expression condition"; FileName = "DoUntilError1.ps1"; Script = $do_until_expression_condition_script; MatchText = "DoUntilError1.ps1: line 3" }
@{ Name = "do-until statement pipeline condition"; FileName = "DoUntilError2.ps1"; Script = $do_until_pipeline_condition_script; MatchText = "DoUntilError2.ps1: line 3" }
)
}
It "<Name> evaluation failure should report correct error position" -TestCases $testCases {
param($FileName, $Script, $MatchText)
$testFile = Join-Path $TestDrive $FileName
Set-Content -Path $testFile -Encoding Ascii -Value $Script
try { & $testFile } catch { $errorRecord = $_ }
$errorRecord | Should -Not -BeNullOrEmpty
$errorRecord.ScriptStackTrace | Should -Match $MatchText
}
It "switch condition MoveNext failure should report correct error position" {
$code = @'
using System;
using System.Collections.Generic;
namespace SwitchTest
{
public class Test
{
public static IEnumerable<string> GetName()
{
yield return "Hello world";
throw new ArgumentException();
}
}
}
'@
$testFile = Join-Path $TestDrive "SwitchError1.ps1"
Set-Content -Path $testFile -Encoding Ascii -Value @'
$test = 1
$enumerable = [SwitchTest.Test]::GetName()
switch ($enumerable) {
"hello world" { $test = 1; $_ }
"Yay" { $test = 2; $_ }
}
'@
if (-not ("SwitchTest.Test" -as [type])) {
Add-Type -TypeDefinition $code
}
try { & $testFile > $null } catch { $errorRecord = $_ }
$errorRecord | Should -Not -BeNullOrEmpty
$errorRecord.ScriptStackTrace | Should -Match "SwitchError1.ps1: line 3"
}
}
|
combined_dataset/train/non-malicious/1749.ps1
|
1749.ps1
|
Import-Module Docker
Pull-ContainerImage hello-world
Run-ContainerImage hello-world
cls
Get-Container | Where-Object State -eq "exited"
Get-Container | Where-Object State -eq "exited" | Remove-Container
Remove-ContainerImage hello-world
Get-ContainerImage
|
combined_dataset/train/non-malicious/sample_25_94.ps1
|
sample_25_94.ps1
|
$ErrorActionPreference = 'Stop'
<#
.Synopsis
Returns payload information from glcm. This info is required to send a heart beat request to AA
#>
function Get-HeartbeatInfo
{
[CmdletBinding()]
param()
$glcm = Get-DscLocalConfigurationManager
$configurationName = ""
$aaServerUrls = New-Object System.Collections.ArrayList
if($glcm.ReportManagers)
{
$serverUrl = $glcm.ReportManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ResourceModuleManagers)
{
$serverUrl = $glcm.ResourceModuleManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ConfigurationDownloadManagers)
{
$serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL
try
{
#get configuration name if available
if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)
{
$configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames']
if($configurationNamesExists)
{
$configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames)
}
}
}
catch
{
Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..."
}
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
$registrationMetaData = @{
NodeConfigurationName = $configurationName
ConfigurationMode = $glcm.ConfigurationMode
ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins
RefreshFrequencyMins = $glcm.RefreshFrequencyMins
RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded
ActionAfterReboot = $glcm.ActionAfterReboot
AllowModuleOverwrite = $glcm.AllowModuleOverWrite
}
return @{
ServerUrls = $aaServerUrls
RegistrationMetaData = $registrationMetaData
}
}
function Test-Command
{
param
(
[String] $Name
)
return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null))
}
function GetComputerInfoEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ComputerInfo)
{
$windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue
}
return $windowsEditionId
}
function GetEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ItemPropertyValue)
{
$windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId
}
elseif(Test-Command -Name Get-ItemProperty)
{
if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue)
{
$windowsEditionId = $editionId.EditionID
}
}
return $windowsEditionId
}
<#
.synopsis
Returns windows edition id
For e.g.
on Nano Server returns - ServerDatacenterNano
on Windows Client - Enterprise
#>
function Get-WindowsEdition
{
param()
$windowsEditionId = GetEditionId
if(!$windowsEditionId)
{
if($windowsEditionId = GetComputerInfoEditionId)
{
$windowsEditionId = $windowsEditionId.WindowsEditionId
}
}
return $windowsEditionId
}
<#
.Synopsis
Returns OS major minor version
#>
function GetOSVersion {
[CmdletBinding()]
param()
$majorVersion = ""
$minorVersion = ""
if(Test-Command -Name Get-CimInstance)
{
$os = Get-CimInstance Win32_OperatingSystem
}
else
{
$os = Get-WmiObject Win32_OperatingSystem
}
$version = $os.Version
if($version)
{
# On PS/.NET 2.0, [System.Version] doesn't have a Parse method
if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') {
$majorVersion = [int]::Parse($matches['major'])
$minorVersion = [int]::Parse($matches['minor'])
}
else
{
Write-Verbose "Invalid OS version: $version ..."
}
}
@{
Major = $majorVersion
Minor = $minorVersion
}
}
<#
.Synopsis
Returns VM UUID
#>
function Get-VMUUId
{
[CmdletBinding()]
param()
$vmuuid = ""
$status = "success"
try
{
if(Test-Command -Name Get-CimInstance)
{
$computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct
}
else
{
$computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct
}
if($computerSystemProduct)
{
$vmuuid = $computerSystemProduct.UUID
}
Write-Verbose "VMUUId is $vmuuid ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..."
$status = "error"
}
return @{
VMUUID = $vmuuid
Status = $status
}
}
<#
.Synopsis
Returns OS profile object
#>
function Get-OSProfile
{
[CmdletBinding()]
param()
$osName = Get-WindowsEdition
$osVersion = GetOSVersion
return @{
Name = $osName
Type = "Windows"
MajorVersion = $osVersion["Major"]
MinorVersion = $osVersion["Minor"]
VMUUID = (Get-VMUUId).VMUUID
}
}
function GetCimClass
{
[CmdletBinding()]
param(
[String] $ClassName,
[String] $Namespace
)
return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue)
}
<#
.Synopsis
Retrieves DSC agent id. Returns an empty string if agent id is not available
#>
function Get-DscAgentId
{
[CmdletBinding()]
param()
$agentID = ""
$status = "success"
#AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists
try
{
if($getlcm = GetCimClass)
{
if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId'])
{
$agentID = (Get-DscLocalConfigurationManager).AgentId
}
}
Write-Verbose "AgentID is $agentID ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..."
$status = "error"
}
return @{
AgentID = $agentID
Status = $status
}
}
<#
.Synopsis
Returns OAAS certificate from the local machine that is used to authenticate with AA pull server
#>
function Get-OAASCertificate
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$ServerUrl
)
$subject = 'CN=' + $ServerUrl
$certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1
if (!$certificate) {
throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..."
}
return $certificate
}
<#
.Synopsis
Returns OAAS endpoint
#>
function GetOAASEndpoint {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $AgentId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL
)
return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties")
}
function SendWebRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string] $Uri,
[Parameter(Mandatory=$true)]
[System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$jsonPayload = ConvertTo-Json $Payload -Depth 10
try
{
$response = Invoke-WebRequest `
-Uri ([Uri] $Uri) `
-ContentType 'application/json' `
-Method Post `
-Certificate $Certificate `
-Headers @{ "protocolversion" = "2.0" } `
-Body $jsonPayload `
-UseBasicParsing
return $response
}
finally
{
[System.Net.ServicePointManager]::CertificatePolicy = $null
}
}
<#
.Synopsis
Invokes AA server heartbeat endpoint to send the heartbeat request
#>
function Send-HeartbeatRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$agentId = (Get-DscAgentId)["AgentID"]
$accountId = Split-Path -Path $ServerURL -Leaf
$certificate = Get-OAASCertificate -ServerUrl $ServerURL
$endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL
try
{
$response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload
Write-Verbose "Heartbeat is sent successfully"
return
}
catch
{
#No retries when status code is 400,401,403,404
$message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd())
Write-Verbose $message
}
}
<#
.Synopsis
Send Guest config heartbeat
#>
function Send-Heartbeat {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateSet('GCAgentStart')]
[string]$Event
)
try
{
Write-Verbose "[INFO] Event $Event" -Verbose
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
else {
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if(-not $serverUrls.ToLower().Contains('agentservice')) {
Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
}
}
$extnInfo = @{
Name = "Microsoft.Powershell.DSC"
Version = "2.77.0.0"
}
# Get OS Profile
$osProfile = Get-OSProfile
# Get OMS cloud if
$omsCloudId = '7783-7084-3265-9085-8269-3286-77'
# Create request payload
$payload = @{
OMSCloudId = $omsCloudId
TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S')
VMResourceId = ""
ExtensionStatusEvent = $Event
ExtensionInformation = $extnInfo
OSProfile = $osProfile
LCMMetaData = $heartbeatInfo["RegistrationMetaData"]
}
# For each server that VM is registered to, send heartbeat request to AA
foreach($serverURL in $serverUrls)
{
Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload
}
}
catch
{
Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_"
}
}
<#
.Synopsis
Verify if DSC is enabled
#>
function Test-AutomationDscRegistration {
[CmdletBinding()]
param(
)
try
{
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..." -Verbose
exit 1
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
else {
$foundUrl = $false
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if($serverUrls.ToLower().Contains('agentsvc')) {
$foundUrl = $true
Write-Verbose "DSC is registered to pull server ..." -Verbose
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
function IsFileOlderThanOneHour {
[CmdletBinding()]
param(
[String] $Path
)
$lastWrite = (get-item $Path).LastWriteTime
$timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0
if (((Get-Date) - $lastWrite) -lt $timespan) {
return $false
}
return $true
}
<#
.Synopsis
Verify if ChangeTracking/Inventory is enabled
ChangeTracking solution saves the inventory and changetracking states under
'$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*'
locations. this functions checks when these state files are modified.
if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled.
#>
function Test-ChangeTrackingEnabled {
[CmdletBinding()]
param(
)
try
{
$mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State'
if(-not(Test-Path $mmaServiceStateFolder)) {
Write-Verbose "$mmaServiceStateFolder does not exist"
exit 1
}
$changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*"
if($changeTrackingFolder -ne $null) {
$chWorkFolder = "$changeTrackingFolder\work"
$serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json"
$serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json"
if(Test-Path $serviceInventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $serviceStateFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
$fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*"
if($fileCTFolder -ne $null) {
$fctWorkFolder = "$fileCTFolder\work"
$changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json"
$changeTrackingFile = "$fctWorkFolder\localhost.json"
$inventoryFile = "$fctWorkFolder\Inventory\localhost.json"
if(Test-Path $changedFilesFile) {
if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $changeTrackingFile) {
if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $inventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "ChangeTracking is not enabled ..." -Verbose
exit 1
}
Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled')
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+
# eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+
# n+JMdZ50mpD1HGFaizpLLsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAVtWuIrH3Uo3uiqZCVzU0HjwjrWQYHBKKC8U6
# YY7qvR7/4zll2Jz5PDyYXGyvyJspYAKui84cIXTowzPIft+KtidKuZBfdBdnU0vj
# WKPu2bpVlDwA4AKXfaAqI0cfk0+qT3T/4fIiadkOXCIxZxRAVNXZ5RIrs77sJ6U/
# /MDRPbaxB8P0F93ObaYXBAc451uVHVZos/UX9x6cT3z83FzVzt+9WDAwCzoj9AhN
# tq5tjYV0+Ctd4T87qU8HpwLqv9cEmsHtpq7S8ijDGYyMyFzWwSZFBONZSupi1Fgc
# OxOmc9ouG1mCtKjajMaA5syeX0iqyi0k/Bp3KyrUUTVcGYfTWqGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAj4A+fljOBK/mIX/N9vYRJ9jzy47NpOu1k
# RwTKMt0fcgIGZdZC0Z8eGBMyMDI0MDIyNjAzMDQwNS44OTlaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOmGBzEwIhgPMjAyNDAyMjYwMjM2MzNaGA8yMDI0MDIy
# NzAyMzYzM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6YYHMQIBADAHAgEAAgIG
# YjAHAgEAAgISXTAKAgUA6YdYsQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AFziVfKhzH8C5tk9Ngesn5o6OzOQc45fgVf1wxLfLUQTak7Hboqjtix92IfPgniu
# knFGxy2cXurrQ6FgAe+NyF3Z7i5Wqb3204BvryFcf8lVwiMibYu5nmoYFLwDlK85
# HcaYIECIFS+XEcUFpdFu1FT7oixQ8D5cw/C/JYJ20O31MYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgan4eRbiNbjRH7lVoSU2b7L1uEE0gFZV8q12kTzgZ
# 8uwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIO6pHfeF8DwlV54k8jT4OXrX
# hMgGWk9tjRDdjqTvbKO8MA0GCSqGSIb3DQEBCwUABIICADbS3823QH5wlnssMnic
# Ftp6FqA1DEi5/ck8sKZLN0msuQMT0qLJQuEdgBQa+H4E61W0yWEpQNq1xz9c4kDo
# qQZCtrf75EQeuvm1qHD8v+QZBZhGSjkLQKYVumr9EhJ8plpy+0hjaZb6IwUR5OeH
# yzLJJaTWVvOBpVyMJv+URHRGICgI5E7x1pFjrNbfowkC5QCqwYwMV7WVtyxlHHvv
# TFEaoKfrmxrBEq2YeZSPJy5vGQTjvJ4HHVqOM/Oq+Wso0c0t7fZwSBhcatzsLpRL
# iSZYcQOrhLjfudtzU5pA5UjqT5r2YWDsHd8V3c39dz01WYNtmqN+7NHphRnZy4aX
# JcxQvU8ptv3PRjJqIc3vu8d5fpHxzG/SvVyNddnMLaQ8C2kA11eZmVD2Py5lT08d
# nAeOHrZ+T7Bntajz37IahdEdWCjEXyklHzHJj+AZAQ08W9j84B8pZh7M1Gh/k1sr
# QC/YicraRUB7/57QFhN2rvxmTKAO8dq4yY/XvTq1TEgqRe+CCoKtV+J7POkQ8nwN
# Zl30bGrVNi975zpgE6xjppjq1EEzRdKYfcx2lkDvLdKo/LwxHRNlh4U3q9bv0zVw
# IWrh67mwQYdeGTAlQMny0tsZf2HUFijZZDCTPXitylebuuFqTAnyKnj1gIruWsrY
# GX5fLBTi9f7F9RFuOs8Bxoki
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_45_35.ps1
|
sample_45_35.ps1
|
/* SPDX-License-Identifier: GPL-2.0 */
/*
* Copyright (c) 2012-2014,2018,2020 The Linux Foundation. All rights reserved.
*/
#ifndef _DT_BINDINGS_QCOM_SPMI_VADC_H
#define _DT_BINDINGS_QCOM_SPMI_VADC_H
/* Voltage ADC channels */
#define VADC_USBIN 0x00
#define VADC_DCIN 0x01
#define VADC_VCHG_SNS 0x02
#define VADC_SPARE1_03 0x03
#define VADC_USB_ID_MV 0x04
#define VADC_VCOIN 0x05
#define VADC_VBAT_SNS 0x06
#define VADC_VSYS 0x07
#define VADC_DIE_TEMP 0x08
#define VADC_REF_625MV 0x09
#define VADC_REF_1250MV 0x0a
#define VADC_CHG_TEMP 0x0b
#define VADC_SPARE1 0x0c
#define VADC_SPARE2 0x0d
#define VADC_GND_REF 0x0e
#define VADC_VDD_VADC 0x0f
#define VADC_P_MUX1_1_1 0x10
#define VADC_P_MUX2_1_1 0x11
#define VADC_P_MUX3_1_1 0x12
#define VADC_P_MUX4_1_1 0x13
#define VADC_P_MUX5_1_1 0x14
#define VADC_P_MUX6_1_1 0x15
#define VADC_P_MUX7_1_1 0x16
#define VADC_P_MUX8_1_1 0x17
#define VADC_P_MUX9_1_1 0x18
#define VADC_P_MUX10_1_1 0x19
#define VADC_P_MUX11_1_1 0x1a
#define VADC_P_MUX12_1_1 0x1b
#define VADC_P_MUX13_1_1 0x1c
#define VADC_P_MUX14_1_1 0x1d
#define VADC_P_MUX15_1_1 0x1e
#define VADC_P_MUX16_1_1 0x1f
#define VADC_P_MUX1_1_3 0x20
#define VADC_P_MUX2_1_3 0x21
#define VADC_P_MUX3_1_3 0x22
#define VADC_P_MUX4_1_3 0x23
#define VADC_P_MUX5_1_3 0x24
#define VADC_P_MUX6_1_3 0x25
#define VADC_P_MUX7_1_3 0x26
#define VADC_P_MUX8_1_3 0x27
#define VADC_P_MUX9_1_3 0x28
#define VADC_P_MUX10_1_3 0x29
#define VADC_P_MUX11_1_3 0x2a
#define VADC_P_MUX12_1_3 0x2b
#define VADC_P_MUX13_1_3 0x2c
#define VADC_P_MUX14_1_3 0x2d
#define VADC_P_MUX15_1_3 0x2e
#define VADC_P_MUX16_1_3 0x2f
#define VADC_LR_MUX1_BAT_THERM 0x30
#define VADC_LR_MUX2_BAT_ID 0x31
#define VADC_LR_MUX3_XO_THERM 0x32
#define VADC_LR_MUX4_AMUX_THM1 0x33
#define VADC_LR_MUX5_AMUX_THM2 0x34
#define VADC_LR_MUX6_AMUX_THM3 0x35
#define VADC_LR_MUX7_HW_ID 0x36
#define VADC_LR_MUX8_AMUX_THM4 0x37
#define VADC_LR_MUX9_AMUX_THM5 0x38
#define VADC_LR_MUX10_USB_ID 0x39
#define VADC_AMUX_PU1 0x3a
#define VADC_AMUX_PU2 0x3b
#define VADC_LR_MUX3_BUF_XO_THERM 0x3c
#define VADC_LR_MUX1_PU1_BAT_THERM 0x70
#define VADC_LR_MUX2_PU1_BAT_ID 0x71
#define VADC_LR_MUX3_PU1_XO_THERM 0x72
#define VADC_LR_MUX4_PU1_AMUX_THM1 0x73
#define VADC_LR_MUX5_PU1_AMUX_THM2 0x74
#define VADC_LR_MUX6_PU1_AMUX_THM3 0x75
#define VADC_LR_MUX7_PU1_AMUX_HW_ID 0x76
#define VADC_LR_MUX8_PU1_AMUX_THM4 0x77
#define VADC_LR_MUX9_PU1_AMUX_THM5 0x78
#define VADC_LR_MUX10_PU1_AMUX_USB_ID 0x79
#define VADC_LR_MUX3_BUF_PU1_XO_THERM 0x7c
#define VADC_LR_MUX1_PU2_BAT_THERM 0xb0
#define VADC_LR_MUX2_PU2_BAT_ID 0xb1
#define VADC_LR_MUX3_PU2_XO_THERM 0xb2
#define VADC_LR_MUX4_PU2_AMUX_THM1 0xb3
#define VADC_LR_MUX5_PU2_AMUX_THM2 0xb4
#define VADC_LR_MUX6_PU2_AMUX_THM3 0xb5
#define VADC_LR_MUX7_PU2_AMUX_HW_ID 0xb6
#define VADC_LR_MUX8_PU2_AMUX_THM4 0xb7
#define VADC_LR_MUX9_PU2_AMUX_THM5 0xb8
#define VADC_LR_MUX10_PU2_AMUX_USB_ID 0xb9
#define VADC_LR_MUX3_BUF_PU2_XO_THERM 0xbc
#define VADC_LR_MUX1_PU1_PU2_BAT_THERM 0xf0
#define VADC_LR_MUX2_PU1_PU2_BAT_ID 0xf1
#define VADC_LR_MUX3_PU1_PU2_XO_THERM 0xf2
#define VADC_LR_MUX4_PU1_PU2_AMUX_THM1 0xf3
#define VADC_LR_MUX5_PU1_PU2_AMUX_THM2 0xf4
#define VADC_LR_MUX6_PU1_PU2_AMUX_THM3 0xf5
#define VADC_LR_MUX7_PU1_PU2_AMUX_HW_ID 0xf6
#define VADC_LR_MUX8_PU1_PU2_AMUX_THM4 0xf7
#define VADC_LR_MUX9_PU1_PU2_AMUX_THM5 0xf8
#define VADC_LR_MUX10_PU1_PU2_AMUX_USB_ID 0xf9
#define VADC_LR_MUX3_BUF_PU1_PU2_XO_THERM 0xfc
/* ADC channels for SPMI PMIC5 */
#define ADC5_REF_GND 0x00
#define ADC5_1P25VREF 0x01
#define ADC5_VREF_VADC 0x02
#define ADC5_VREF_VADC5_DIV_3 0x82
#define ADC5_VPH_PWR 0x83
#define ADC5_VBAT_SNS 0x84
#define ADC5_VCOIN 0x85
#define ADC5_DIE_TEMP 0x06
#define ADC5_USB_IN_I 0x07
#define ADC5_USB_IN_V_16 0x08
#define ADC5_CHG_TEMP 0x09
#define ADC5_BAT_THERM 0x0a
#define ADC5_BAT_ID 0x0b
#define ADC5_XO_THERM 0x0c
#define ADC5_AMUX_THM1 0x0d
#define ADC5_AMUX_THM2 0x0e
#define ADC5_AMUX_THM3 0x0f
#define ADC5_AMUX_THM4 0x10
#define ADC5_AMUX_THM5 0x11
#define ADC5_GPIO1 0x12
#define ADC5_GPIO2 0x13
#define ADC5_GPIO3 0x14
#define ADC5_GPIO4 0x15
#define ADC5_GPIO5 0x16
#define ADC5_GPIO6 0x17
#define ADC5_GPIO7 0x18
#define ADC5_SBUx 0x99
#define ADC5_MID_CHG_DIV6 0x1e
#define ADC5_OFF 0xff
/* 30k pull-up1 */
#define ADC5_BAT_THERM_30K_PU 0x2a
#define ADC5_BAT_ID_30K_PU 0x2b
#define ADC5_XO_THERM_30K_PU 0x2c
#define ADC5_AMUX_THM1_30K_PU 0x2d
#define ADC5_AMUX_THM2_30K_PU 0x2e
#define ADC5_AMUX_THM3_30K_PU 0x2f
#define ADC5_AMUX_THM4_30K_PU 0x30
#define ADC5_AMUX_THM5_30K_PU 0x31
#define ADC5_GPIO1_30K_PU 0x32
#define ADC5_GPIO2_30K_PU 0x33
#define ADC5_GPIO3_30K_PU 0x34
#define ADC5_GPIO4_30K_PU 0x35
#define ADC5_GPIO5_30K_PU 0x36
#define ADC5_GPIO6_30K_PU 0x37
#define ADC5_GPIO7_30K_PU 0x38
#define ADC5_SBUx_30K_PU 0x39
/* 100k pull-up2 */
#define ADC5_BAT_THERM_100K_PU 0x4a
#define ADC5_BAT_ID_100K_PU 0x4b
#define ADC5_XO_THERM_100K_PU 0x4c
#define ADC5_AMUX_THM1_100K_PU 0x4d
#define ADC5_AMUX_THM2_100K_PU 0x4e
#define ADC5_AMUX_THM3_100K_PU 0x4f
#define ADC5_AMUX_THM4_100K_PU 0x50
#define ADC5_AMUX_THM5_100K_PU 0x51
#define ADC5_GPIO1_100K_PU 0x52
#define ADC5_GPIO2_100K_PU 0x53
#define ADC5_GPIO3_100K_PU 0x54
#define ADC5_GPIO4_100K_PU 0x55
#define ADC5_GPIO5_100K_PU 0x56
#define ADC5_GPIO6_100K_PU 0x57
#define ADC5_GPIO7_100K_PU 0x58
#define ADC5_SBUx_100K_PU 0x59
/* 400k pull-up3 */
#define ADC5_BAT_THERM_400K_PU 0x6a
#define ADC5_BAT_ID_400K_PU 0x6b
#define ADC5_XO_THERM_400K_PU 0x6c
#define ADC5_AMUX_THM1_400K_PU 0x6d
#define ADC5_AMUX_THM2_400K_PU 0x6e
#define ADC5_AMUX_THM3_400K_PU 0x6f
#define ADC5_AMUX_THM4_400K_PU 0x70
#define ADC5_AMUX_THM5_400K_PU 0x71
#define ADC5_GPIO1_400K_PU 0x72
#define ADC5_GPIO2_400K_PU 0x73
#define ADC5_GPIO3_400K_PU 0x74
#define ADC5_GPIO4_400K_PU 0x75
#define ADC5_GPIO5_400K_PU 0x76
#define ADC5_GPIO6_400K_PU 0x77
#define ADC5_GPIO7_400K_PU 0x78
#define ADC5_SBUx_400K_PU 0x79
/* 1/3 Divider */
#define ADC5_GPIO1_DIV3 0x92
#define ADC5_GPIO2_DIV3 0x93
#define ADC5_GPIO3_DIV3 0x94
#define ADC5_GPIO4_DIV3 0x95
#define ADC5_GPIO5_DIV3 0x96
#define ADC5_GPIO6_DIV3 0x97
#define ADC5_GPIO7_DIV3 0x98
#define ADC5_SBUx_DIV3 0x99
/* Current and combined current/voltage channels */
#define ADC5_INT_EXT_ISENSE 0xa1
#define ADC5_PARALLEL_ISENSE 0xa5
#define ADC5_CUR_REPLICA_VDS 0xa7
#define ADC5_CUR_SENS_BATFET_VDS_OFFSET 0xa9
#define ADC5_CUR_SENS_REPLICA_VDS_OFFSET 0xab
#define ADC5_EXT_SENS_OFFSET 0xad
#define ADC5_INT_EXT_ISENSE_VBAT_VDATA 0xb0
#define ADC5_INT_EXT_ISENSE_VBAT_IDATA 0xb1
#define ADC5_EXT_ISENSE_VBAT_VDATA 0xb2
#define ADC5_EXT_ISENSE_VBAT_IDATA 0xb3
#define ADC5_PARALLEL_ISENSE_VBAT_VDATA 0xb4
#define ADC5_PARALLEL_ISENSE_VBAT_IDATA 0xb5
#define ADC5_MAX_CHANNEL 0xc0
/* ADC channels for ADC for PMIC7 */
#define ADC7_REF_GND 0x00
#define ADC7_1P25VREF 0x01
#define ADC7_VREF_VADC 0x02
#define ADC7_DIE_TEMP 0x03
#define ADC7_AMUX_THM1 0x04
#define ADC7_AMUX_THM2 0x05
#define ADC7_AMUX_THM3 0x06
#define ADC7_AMUX_THM4 0x07
#define ADC7_AMUX_THM5 0x08
#define ADC7_AMUX_THM6 0x09
#define ADC7_GPIO1 0x0a
#define ADC7_GPIO2 0x0b
#define ADC7_GPIO3 0x0c
#define ADC7_GPIO4 0x0d
#define ADC7_SMB_TEMP 0x06
#define ADC7_CHG_TEMP 0x10
#define ADC7_USB_IN_V_16 0x11
#define ADC7_VDC_16 0x12
#define ADC7_CC1_ID 0x13
#define ADC7_VREF_BAT_THERM 0x15
#define ADC7_IIN_FB 0x17
#define ADC7_ICHG_SMB 0x18
#define ADC7_IIN_SMB 0x19
/* 30k pull-up1 */
#define ADC7_AMUX_THM1_30K_PU 0x24
#define ADC7_AMUX_THM2_30K_PU 0x25
#define ADC7_AMUX_THM3_30K_PU 0x26
#define ADC7_AMUX_THM4_30K_PU 0x27
#define ADC7_AMUX_THM5_30K_PU 0x28
#define ADC7_AMUX_THM6_30K_PU 0x29
#define ADC7_GPIO1_30K_PU 0x2a
#define ADC7_GPIO2_30K_PU 0x2b
#define ADC7_GPIO3_30K_PU 0x2c
#define ADC7_GPIO4_30K_PU 0x2d
#define ADC7_CC1_ID_30K_PU 0x33
/* 100k pull-up2 */
#define ADC7_AMUX_THM1_100K_PU 0x44
#define ADC7_AMUX_THM2_100K_PU 0x45
#define ADC7_AMUX_THM3_100K_PU 0x46
#define ADC7_AMUX_THM4_100K_PU 0x47
#define ADC7_AMUX_THM5_100K_PU 0x48
#define ADC7_AMUX_THM6_100K_PU 0x49
#define ADC7_GPIO1_100K_PU 0x4a
#define ADC7_GPIO2_100K_PU 0x4b
#define ADC7_GPIO3_100K_PU 0x4c
#define ADC7_GPIO4_100K_PU 0x4d
#define ADC7_CC1_ID_100K_PU 0x53
/* 400k pull-up3 */
#define ADC7_AMUX_THM1_400K_PU 0x64
#define ADC7_AMUX_THM2_400K_PU 0x65
#define ADC7_AMUX_THM3_400K_PU 0x66
#define ADC7_AMUX_THM4_400K_PU 0x67
#define ADC7_AMUX_THM5_400K_PU 0x68
#define ADC7_AMUX_THM6_400K_PU 0x69
#define ADC7_GPIO1_400K_PU 0x6a
#define ADC7_GPIO2_400K_PU 0x6b
#define ADC7_GPIO3_400K_PU 0x6c
#define ADC7_GPIO4_400K_PU 0x6d
#define ADC7_CC1_ID_400K_PU 0x73
/* 1/3 Divider */
#define ADC7_GPIO1_DIV3 0x8a
#define ADC7_GPIO2_DIV3 0x8b
#define ADC7_GPIO3_DIV3 0x8c
#define ADC7_GPIO4_DIV3 0x8d
#define ADC7_VPH_PWR 0x8e
#define ADC7_VBAT_SNS 0x8f
#define ADC7_SBUx 0x94
#define ADC7_VBAT_2S_MID 0x96
#endif /* _DT_BINDINGS_QCOM_SPMI_VADC_H */
|
combined_dataset/train/non-malicious/sample_63_47.ps1
|
sample_63_47.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
function Remove-ServiceFabricApplicationType
{
<#
.SYNOPSIS
Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version.
.DESCRIPTION
Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version.
.NOTES
WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered.
.PARAMETER ApplicationTypeName
The name of the application type to remove.
.PARAMETER ApplicationTypeVersion
The version of the application type to remove.
.EXAMPLE
Remove-ApplicationType.ps1 -ApplicationTypeName 'MyApplicationType' -ApplicationTypeVersion '1.0.0.0'
#>
Param
(
[Parameter(Mandatory=$true)]
[String]
$ApplicationTypeName,
[Parameter(Mandatory=$true)]
[String]
$ApplicationTypeVersion
)
Write-Host "Removing application type..."
try
{
[void](Test-ServiceFabricClusterConnection)
}
catch
{
Write-Warning "Unable to Verify connection to Service Fabric cluster."
throw
}
$nodes = Get-ServiceFabricNode
foreach ($app in Get-ServiceFabricApplication)
{
if ($app.ApplicationTypeName -eq $ApplicationTypeName -and $app.ApplicationTypeVersion -eq $ApplicationTypeVersion)
{
try
{
$app | Remove-ServiceFabricApplication -Force
}
catch [System.TimeoutException]
{
# Catch operation timeout and continue with force remove replica.
}
foreach ($node in $nodes)
{
[void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $app.ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove)
}
}
}
$reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion }
if ($reg)
{
$reg | Unregister-ServiceFabricApplicationType -ApplicationTypeVersion $ApplicationTypeVersion -Force
}
Write-Host "Finished removing the application type"
}
# SIG # Begin signature block
# MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDzslfuKADb8KjT
# nAcLb76G3U3PWS65zaDijbWow04TEKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPMCYqkzFtPBEdDyJm1qDx6/
# ukQg7tah6lzToJW7YJeqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFNcDIGwYzpqOAl3Kobv/qPkvlM6mEAY4ijiylZ9H+1ETzKGaYS07ifj3
# tnJeUk1IfASwttw8c+vNSK07t5ukBynX4IifD/OeB7e3kg9fjreU7//+csZvzljI
# X3WEohlMpw/Itp74tUvVXIAsW+TX9YVtMoPGfJtdLzuVVFVAr4U+h7SJE+B9El/I
# s0X8Ifxyrr/oPK8oHIpxSOREtiKWMLd+dawAG/pA8buVr0lZZA9BeTtOaafHYqbz
# NkGBPTNwBaE0CiNjoIdWurW/o5eQ2cunTuDJ6qH9NnWrUACMqKNUsvKp8syUzl/u
# EDq4Tib8Bd3T1UMEnbOWk42b3icrUaGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC
# FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDGh9ixrxVVUBy6Rj9IbH4c1Zr0dZ4zafX9OCRJVODJiwIGZGzYjfnK
# GBMyMDIzMDUzMTIxMzUwOS4wOTZaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyMjY0LUUz
# M0UtNzgwQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EVQwggcMMIIE9KADAgECAhMzAAABwT6gg5zgCa/FAAEAAAHBMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDEy
# N1oXDTI0MDIwMjE5MDEyN1owgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjIyNjQtRTMzRS03ODBDMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5LHXMydw2hUC4pJU0I5uPJnMeRm8LKC4xaIDu3Fxx3Ip
# Z/We2qXLj4NOmow/WPFeY4vaT4/S4T9xoDsFGg5wEJM6OLZVfa7BUNu0tDt4rkl7
# QBYNHzz6pcr9bwaq2qm7x6P9yi5W0Y8sjoj+QTgtmmXoxCoNXhJ1oG6GbqADQXDZ
# kTcDjIAiteE6TxrhBpIb7e6upifTGZNfcChPfuzHq61FSIwJ0XCxcaR1BwAlSKhb
# /NUOuQGPr9Zzd6OnIcA+RctxwKgfOKB9aWEEHlt0jhKKgpEBvcJnMMP+WaTwmMho
# b1e+hoCEFx/nI0YHupi6082kFdNFraE72msOYQrwrUyWCeSmN202LZDpTzxZVty6
# QrBOk+f+BErsR+M5evkKuUTWVJHI3vtNgb6K5+gk6EuQw0ocsDdspiPp+qlxBaW5
# 0yUbr6wnfzYjJh7QkPcfBIZbJAhWQHaV0uS3T7OkObdCssCRMWH7VWUAeSbemuUq
# OXCR7rdpFTfY/SXKO9lCIQBAQSh+wzwh5Zv1b+jT2zWwVl82By3YHmST8b8CKnRX
# SCjLtgoyy7ERLwkbzPIkCfBXcyVneC1w2/wUnqPiAjK0wQfztfXFfoMQr8YUcLHn
# Atek8OVNPuRIV6bcERbF6rtFXmnjjD4ZwVxIZ/HM4cjeVGsEwkFA9XTzqX9W1P8C
# AwEAAaOCATYwggEyMB0GA1UdDgQWBBRfr2MJ6x7yE+gP5uX9xWGTwpRC+jAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC
# AQBfuiaBgsecHvM90RZiTDlfHblL09r9X+5q9ckuMR0Bs1Sr5B2MALhT5Y0R3ggL
# ufRX6RQQbSc7WxRXIMr5tFEgB5zy/7Yg81Cn2dhTf1GzjCb7/n3wtJSGtr2QwHsa
# 1ehYWdMfi+ETLoEX1G79VPFrs0t6Giwpr74tv+CLE3s6m10VOwe80wP4yuT3eiFf
# qRV8poUFSdL2wclgQKoSwbCpbJlNC/ESaDQbbQFli9uO5j2f/G7S4TMG/gyyxvMQ
# 5QJui9Fw2s7qklmozQoX2Ah4aKubKe9/VZveiETNYl1AZPj0kj1g51VNyWjvHw+H
# z1xZekWIpfMXQEi0wrGdWeiW4i8l92rY3ZbdHsErFYqzh6FRFOeXgazNsfkLmwy+
# TK17mA7CTEUzaAWMq5+f9K4Y/3mhB4r6UristkWpdkPWEo8b9tbkdKSY00E+FS5D
# UtjgAdCaRBNaBu8cFYCbErh9roWDxc+Isv8yMQAUDuEwXSy0ExnIAlcVIrhzL40O
# sG2ca5R5BgAevGP1Hj9ej4l/y+Sh0HVcN9N6LmPDmI/MaU2rEZ7Y+jRfCZ1d+l5D
# ESdLXIxDTysYXkT+3VM/1zh6y2s0Zsb/3vPaGnp2zejwf2YlGWl1XpChNZTelF5e
# OCCfSzUUn3qHe7IyyDKhahgbnKpmwcEkMVBs+RHbVkNWqDCCB3EwggVZoAMCAQIC
# EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
# b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX
# DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
# 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
# Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP
# 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P
# XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361
# VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB
# Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9
# X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e
# wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw
# wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr
# 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
# FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
# BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw
# PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j
# cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH
# hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF
# BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
# ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
# j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
# 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/
# GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D
# YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO
# xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO
# Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I
# 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0
# zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM
# mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT
# TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
# cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046MjI2NC1FMzNFLTc4MEMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAESKOtSK7RVVK+Si+aqFd0YSY+VPoIGD
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF
# BQACBQDoIeLMMCIYDzIwMjMwNTMxMjMxNDIwWhgPMjAyMzA2MDEyMzE0MjBaMHQw
# OgYKKwYBBAGEWQoEATEsMCowCgIFAOgh4swCAQAwBwIBAAICF5kwBwIBAAICEgMw
# CgIFAOgjNEwCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC
# AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAI073ht76u6uGg
# BObBcAoxrKpXb7tTugFx3/Z7+p13UcZqpIvPlf7d43ggVy57tCr5tubej8FzTeGN
# CU/jE/crjOPa3ii7kQQQdNKFIE8VSKbYtxYQbcL1GXu1m7KI7HTMi2ldziQGTPHT
# vDATpblx3NCwSps85Pt7neROMDZVVjGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
# aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABwT6gg5zgCa/FAAEAAAHBMA0GCWCGSAFl
# AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN
# AQkEMSIEIF+/cAkn9regwX8LdM2mR1+ARWxolPpwv9QGUz2AsqfyMIH6BgsqhkiG
# 9w0BCRACLzGB6jCB5zCB5DCBvQQgCrkg6tgYHeSgIsN3opR2z7EExWA0YkirkvVY
# STBgdtQwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AcE+oIOc4AmvxQABAAABwTAiBCD63vRfvzO9mZRBN93AhOi8UtC0RwZaMQTxosCv
# w4ZH2zANBgkqhkiG9w0BAQsFAASCAgA8kRDud+B2/a4giPQ4Ni5N0Zt6LBXBQ7hp
# WAEOvItEmMQ7bAqlvQqxt/fop+DGjzaTqEAiLjNYmj3GBJEmUzNa4VFDCQvyeo8C
# 5gzedp1ip3o/jIZtaEFs+OJk0IYGs59RGEXPH3SFFxGZnt5ipdl4MUUVj9hHfwWD
# B4DVxKzMq9sYuYJFG5CnBmKdP9IXTkCP1t89/ODyaNqNRfWBmzwqw/97nBB+neJW
# ZyqKeIRnMnm+iOcytfO/QC4e/0QgXvKv4h37oTijZrBEaf6yPHUdIy+68qNZR9PQ
# 8k43tYCr3cKzHi8FZFQgf/EIUitg60ptt37qfljURRC7W0rPL3OC0Vi5o88/uQlE
# v7RQ4pROScFQj9hKpJ6YpUrmcupWx0GUlQgSxjQDEXhezQewFAMxvQ3QVMMa2B/F
# CSo+XvaAM9cRFlvyWVkuxpc3Z3Kv84ygbVaV0LToG86adBZVuuDHV3g7qLxAeVZp
# GSsNJcWs+RYCouZkwjEWcv/+IRnm6l62fdycUm6XxQA4mh2q3LZ8L2mrmc0BJ9x6
# lKdkmXEuPKdtgAt58AEtNKcZyGeq0Il9IkAlkQr/RxHwjyxVHHfvua00mm7o207A
# wh5dKKmQjNvYfe+HiqK4xY7UuuJRzebStdgWP5ABFb01WgpageNjVfbHdgLcjmGZ
# KXmeLPeT+Q==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_48.ps1
|
sample_31_48.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ailanguage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ailanguage.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f9edfadc-7cd9-4f7a-8258-fc0671fb808f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ailanguage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ailanguage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAilanguageEndpoint', 'Get-OCIAilanguageEndpointsList',
'Get-OCIAilanguageEvaluationResultsList', 'Get-OCIAilanguageJob',
'Get-OCIAilanguageJobsList', 'Get-OCIAilanguageModel',
'Get-OCIAilanguageModelsList', 'Get-OCIAilanguageModelType',
'Get-OCIAilanguageProject', 'Get-OCIAilanguageProjectsList',
'Get-OCIAilanguageWorkRequest',
'Get-OCIAilanguageWorkRequestErrorsList',
'Get-OCIAilanguageWorkRequestLogsList',
'Get-OCIAilanguageWorkRequestsList',
'Invoke-OCIAilanguageBatchDetectDominantLanguage',
'Invoke-OCIAilanguageBatchDetectHealthEntity',
'Invoke-OCIAilanguageBatchDetectLanguageEntities',
'Invoke-OCIAilanguageBatchDetectLanguageKeyPhrases',
'Invoke-OCIAilanguageBatchDetectLanguagePiiEntities',
'Invoke-OCIAilanguageBatchDetectLanguageSentiments',
'Invoke-OCIAilanguageBatchDetectLanguageTextClassification',
'Invoke-OCIAilanguageBatchLanguageTranslation',
'Invoke-OCIAilanguageDetectDominantLanguage',
'Invoke-OCIAilanguageDetectLanguageEntities',
'Invoke-OCIAilanguageDetectLanguageKeyPhrases',
'Invoke-OCIAilanguageDetectLanguageSentiments',
'Invoke-OCIAilanguageDetectLanguageTextClassification',
'Move-OCIAilanguageEndpointCompartment',
'Move-OCIAilanguageJobCompartment',
'Move-OCIAilanguageModelCompartment',
'Move-OCIAilanguageProjectCompartment', 'New-OCIAilanguageEndpoint',
'New-OCIAilanguageJob', 'New-OCIAilanguageModel',
'New-OCIAilanguageProject', 'Remove-OCIAilanguageEndpoint',
'Remove-OCIAilanguageJob', 'Remove-OCIAilanguageModel',
'Remove-OCIAilanguageProject', 'Stop-OCIAilanguageJob',
'Update-OCIAilanguageEndpoint', 'Update-OCIAilanguageJob',
'Update-OCIAilanguageModel', 'Update-OCIAilanguageProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ailanguage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Set-WebConfig_1.ps1
|
Set-WebConfig_1.ps1
|
function Set-WebConfigSqlConnectionString {
param( [switch]$help,
[string]$configfile = $(read-host "Please enter a web.config file to read"),
[string]$connectionString = $(read-host "Please enter a connection string"),
[switch]$backup = $TRUE
)
$usage = "`$conString = `"Data Source=MyDBname;Initial Catalog=serverName;Integrated Security=True;User Instance=True`"`n"
$usage += "`"Set-WebConfigSqlConnectionString -configfile `"C:\\Inetpub\\wwwroot\\myapp\\web.config`" -connectionString `$conString"
if ($help) {Write-Host $usage}
$webConfigPath = (Resolve-Path $configfile).Path
$backup = $webConfigPath + ".bak"
# Get the content of the config file and cast it to XML and save a backup copy labeled .bak
$xml = [xml](get-content $webConfigPath)
#save a backup copy if requested
if ($backup) {$xml.Save($backup)}
$root = $xml.get_DocumentElement();
$root.connectionStrings.add.connectionString = $connectionString
# Save it
$xml.Save($webConfigPath)
}
|
combined_dataset/train/non-malicious/688.ps1
|
688.ps1
|
function Register-RsPowerBI
{
[CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')]
param
(
[Parameter(Mandatory = $True)]
[string]
$ClientId,
[Parameter(Mandatory = $True)]
[string]
$ClientSecret,
[Parameter(Mandatory = $True)]
[string]
$AppObjectId,
[Parameter(Mandatory = $True)]
[string]
$TenantName,
[Parameter(Mandatory = $True)]
[string]
$TenantId,
[string]
$ResourceUrl = 'https://analysis.windows.net/powerbi/api',
[string]
$AuthUrl = 'https://login.windows.net/common/oauth2/authorize',
[string]
$TokenUrl = 'https://login.microsoftonline.com/common/oauth2/token',
[Parameter(Mandatory = $True)]
[string]
$RedirectUrls,
[Alias('SqlServerInstance')]
[string]
$ReportServerInstance,
[Alias('SqlServerVersion')]
[Microsoft.ReportingServicesTools.SqlServerVersion]
$ReportServerVersion,
[string]
$ComputerName,
[System.Management.Automation.PSCredential]
$Credential
)
if ($PSCmdlet.ShouldProcess((Get-ShouldProcessTargetWmi -BoundParameters $PSBoundParameters), "Registering PowerBI for SQL Server Instance"))
{
$rsWmiObject = New-RsConfigurationSettingObjectHelper -BoundParameters $PSBoundParameters
Write-Verbose "Configuring Power BI ..."
$configureResult = $rsWmiObject.SavePowerBIInformation($ClientId,
$ClientSecret,
$AppObjectId,
$TenantName,
$TenantId,
$ResourceUrl,
$AuthUrl,
$TokenUrl,
$RedirectUrls)
if ($configureResult.HRESULT -eq 0)
{
Write-Verbose "Configuring Power BI ... Success!"
}
else
{
throw "Failed to register PowerBI for server instance: $ReportServerInstance. Errors: $($configureResult.ExtendedErrors)"
}
}
}
New-Alias -Name "Register-PowerBI" -Value "Register-RsPowerBI" -Scope Global
|
combined_dataset/train/non-malicious/sample_56_2.ps1
|
sample_56_2.ps1
|
#
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_21_36.ps1
|
sample_21_36.ps1
|
ConvertFrom-StringData @'
id_officeinv=Collecting Office inventory
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBo2EP+d3PakosN
# lVFQxSdqPIYUqMpDzbNG/OqK/TD90qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL98IJmNl/PlgQ6Dws2cFzkx
# Ep2duDgVdB7nTTqsRKuIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArnG1yeyA6Y1rt8HKeOC+GnTo63YVXtXPfEwjKG3jdiuUP6TYwJ03wtLb
# CT2UVet6YIQ/EX4CNg7sPGMStfds43mcbqMfus5dCxOEw/6ULxWh/F7eeyuxh3lP
# bvy8gYiZCHsFoc8O7zeGbC3w3gyqA9nFACqWFaYhG8WIV68IBHW1SD2CoSfidann
# RbbqTcZBb6zXFjmOn3fxaXfjFAfd3EY2q+0ktQ6weY76nVt9/TxCjpW7LDynlUV8
# 62IkVuRfIyV9U61MOCjtWxUarrdZmDuvy3oNj2GWT0Rp/H/LBzn48t8P4yIIlm9L
# Rz/TPm68/gJQSL34AGjSGGHRTHZ5yaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDloOhOS4VIrYBlfnz3uLluPF7YWsD2sZ12wyZtdhnZ4gIGZxp6XqTZ
# GBMyMDI0MTAyODExNDA0My4yNTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB
# /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv
# g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV
# ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5
# hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d
# 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f
# PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj
# +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5
# hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb
# K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6
# YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J
# OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9
# Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre
# rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55
# ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH
# XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb
# KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP
# maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY
# yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr
# 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA
# sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4
# vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh
# xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA
# Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAiGA8yMDI0MTAyODA0NDcy
# NloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZXe
# AgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrBl/FnL9GFyUGkxt5Hz/YP
# xhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj94wVSPeBrEy9PBwhiSqDW
# DINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQpLqiwuYZS76Io7iSbtEh
# MY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZobq1RJX7cvC0OFH4gYrGg
# GJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576CxdcnSGw9Vpf07jA/s0Rm
# Tcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBiSSLFiSEnXu8fdsdg58wkP5hKsNRQhkKCwGCZKawGMjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbd
# izXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TCsXUYprvY+OJSRQQYCPt9
# 9/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIAJOOzIzyVZDdkd0GnyCzLEizM
# FX8YV7/YlEXUC2ny8XupQYOBaB6HiPN+sM6s4So2Orr5xZtBHAeVsnIj/yQ/8yPj
# VFAQVqU/idJIWfHsJ4Kj65JrHlvEJ8xCDLTiRv5QHRD6PCRrNdyCL7khDOd+ZkRd
# cufeBF4ZAYJwyyV8mi9RwneofctR8v5DfJYsJFF19sfmwNkky2JHahkwIU5GufpD
# +bV1eAO7XxbpyKHjgIqxDWzGzJmnojRn/lkOoTHXLSNCB0HZ/DCH3IOVl+unHNPe
# 32OBJnOyivpOHq2g7bZlcBFBdBG8LidNRfINNdWOPAhP15uRbTT3+Mvkln8Z8TDT
# uAH985jy7mxqsPASLi/7Yu4dXQcKUl4Ya7t8X89sMkVwKfZZ3H9Ozrc2PoPdvvwa
# 6MoOZLwwjCjId3iq0+D4WH7XvKv0FBfKiQC/SJ1HbrSMLSqJFpXtuIt8zyi6Ol4D
# SWafZllN+0+OpQHB89731TlP6deHL08wf3/cQ7WIC5cw6xKTtOMjrINll8aNuRak
# nlcMS4yX4HSK5m3wIEgUIN9Xrl3MH9V01R4a5NOJg1YQ8W6lyF8ATiIVL8KgGOLy
# 5bP5ydGV6dMXaUheCw7jBe6dYfS4PTP55d1aIOb+YXTVGvJJMi3Evkz19QI7+C8f
# KJLKLcP9tD1IQKHge8w=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_1_42.ps1
|
sample_1_42.ps1
|
ConvertFrom-StringData @'
id_certs=Certificate information
id_certsdesc=Collecting information on installed certificates
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBWfKjLlRxXAbXG
# 8W8RTTxYsTY9l3OjO+Lu72y05dUX/6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPaW1HfzXkF1Ff1xe9hDLxN+
# +HKgFO8ooY8pbpoQ3M7aMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAZbA7h1yGxgHPD6/Grzk33DXWqpVZGMo2pd+lIuu6YDJb79njzHFC28Kf
# qCLbpYWmJsdYHXD4m49p9FNQSPXtxvKDE3R/uBhS59nhYwz8N4gjxjmz4V1JnZQy
# FVoKXLk/F//o0NFuEPriTjG4QgVbQvnpsiT/fOP9LmEljHw+4F2nA2+5B83oGUfT
# 85JRJyMj+xR3M9JgNUkjomqiJUz9ESadB2kZcuVzIWerL8lq6abdJFo81bUisN0B
# qa5A2BC68kINFuKfn1Zz/R7vx4kbO4pPb48YsXdRKHh62jm+6qU1Uh5lronjsP78
# Q94O49Ghfe84xwBlmowY3UwbbJzsGKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC5NOVJG7WR/TyXS6M6FqKVNgh5hYTs2l6rNEvSamqtqAIGZusiCs65
# GBMyMDI0MTAyODExNDA0MS44OThaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91ggdQTK+8L0AAEAAAH3MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM2MDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0OdHTBNom6/uXKaEKP9r
# PITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3k6EQlwqy6ROz42e0R5eD
# W+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW2NcWUJW3Qo2AuJ0HOtbl
# SpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8U6DRccQm1FdhmPKgDzgc
# fDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFHTDkGLdpnDV5FXjVObAgb
# SM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn1uA8hRhj09Hs33HRevt4
# oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE4feEkuz7TAwgkRBcUzLg
# Q4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPXD9It2ez+mqEzgFRRsJGL
# tcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pIvA5irlal7qFhkAeeeZqm
# op8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJQAQkllKsI+UJqGq9rmRA
# BJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9GqtDx3/aU+yqNRcB8w0tS
# XUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTfRqQzP3m9
# PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAN0ajafILeL6S
# QIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAbQxTrqnXvVWWeNst5YQD8
# saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXLzJXKhZM09ouPwNsrn8YO
# LIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0G5lcQknAXqHa9nQdWp1Z
# xXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWtqyLMl65TW6wRM7XlF7Y+
# PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9ba43UU6TgzVZaBm8VaA0w
# SwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjBVXm8KVDn2cML9IvRK02s
# 941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aMH5xa1Zjb/K8u9f9M05U0
# /bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2NiOcYTGV/DcLrLCBK2zG5
# 03FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG85anlhhGxxBQ5mFsJGkB
# n0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5VVN36CO1kDU4ABkSYTXOM
# 8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNBjmM7/nqw3bgrEOaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0MTAyOTA2NDM1MFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEAAgIPIDAHAgEAAgIT5zAK
# AgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBaN24RfbEDYuiZ
# zqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yduik5ad6IJA7n3eXZZvkf
# ovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0GfRa6QSb/KpHS+RGIAeR
# p0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578OFTecSrudpM+HrP9rwux
# bsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI/x2UnsP+/eCeuyNqOYe6
# VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRNky50Lo7MnEMgN3LQB6Hb
# 4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg7y9SlNKEtywF
# JmZrI+rPV/tw4zK63LgBuH3zQNXOqOMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5SoIH5Z4jCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB91ggdQTK+8L0AAEAAAH3
# MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/bgvEVMA0GCSqGSIb3DQEB
# CwUABIICAAp8Yl6E0ZN+9GwNb1JI1eJnG3CW/yq2qe9YsODtENYi114A7j0mTSfH
# 2BzvFlWtgLQ9akKc9pfJz24vhJKSzJuX/u9+K/aboRY9ErbT7D9B9l7rsK8tJJ/I
# tHbM0vt4KZ2paMJucxT+dWev98IPUP9pqwJsHsfyDEghWAONWcZnw0r/dqCLx427
# Wf8bwT1Nx7bDQwPz+8wcXirtB5Qb/h3u7I4a3SdWX9UIJ1vj0VU8V6AlTR5eFcI4
# Hfueh5n/sNoWdjNzrOFbQSh+maY4CaaYsjv/h+lPAxGdsO0ZI6nzsXrMv0eQZ0E8
# QMMy3G3xliyLzbcWe7UIjkvkxaElmgd5KDjBqOwMQzX0sIcKT0U3fgVTUrKKFuI3
# uT6Ed1sseBCCxdgKnNOWp02+0Y/jC+pwfFXvO3I/gE/5WLNux3zmHUwrGva+3+Wv
# qZg5EBIGex7kYu8WA5coZsHPm1BRLOX/+YWH5+fXecMoSl47ooD346PvSysH7feG
# vb3N5vtlNoDJks6/ZuXfx26Twlv25LtzmnZUOCXTa+Jh8oaQOebXa0qoc+tEouEc
# rNEhXYWLD3D/icm2tbWXXUz3LbfxGzIQ7mDH9880VubQIJzG1I05SefIsyT9MOWo
# MDeLfhSOXtOS/jmCoDicdct9HZnUCu++rHC8BQm9HANzmPexRNPY
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_25.ps1
|
sample_49_25.ps1
|
enum RepairAction {
Repair = 1
Reset
SilentUpdate
}
Set-Variable RECOVERY_VERSION -Option Constant -Value 1
Set-Variable SkypeUserAccountName -Option Constant -Value "Skype"
Set-Variable WINDOWS_VERSION_MAJOR -Option Constant -Value 10
Set-Variable WINDOWS_VERSION_MINOR -Option Constant -Value 0
Set-Variable WINDOWS_VERSION_BUILD_RS1 -Option Constant -Value 14393
Set-Variable WINDOWS_VERSION_BUILD_RS2 -Option Constant -Value 15063
Set-Variable WINDOWS_VERSION_BUILD_RS3 -Option Constant -Value 16299
Set-Variable WINDOWS_VERSION_BUILD_RS3_REQUIRED_UBR -Option Constant -Value 192
$RestartOnExit = $false
$RemoveAdminScriptsOnExit = $false
$AdminHookScriptsPath = [System.IO.Path]::Combine($SystemDrive, "Rigel", "AdminHookScripts")
Function ExitRecoveryTool {
if ($RemoveAdminScriptsOnExit) {
Write-Host "Clearing AdminHookScripts..."
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$targetPath = $AdminHookScriptsPath
Get-ChildItem -Path $targetPath | Remove-Item -Force -Recurse
Write-Host "OK"
}
if ($RestartOnExit) {
Write-Host "Initiating restart..."
Restart-Computer -Force
Write-Host "OK"
}
Exit
}
Function GetSkypeInstallFolder {
$SrsPackage = (Get-AppxPackage Microsoft.SkypeRoomSystem -AllUsers `
| Where-Object { $_ -ne $null -and !([string]::IsNullOrEmpty($_.InstallLocation)) } `
| ForEach-Object { [PsCustomObject]@{"Version"=([Version]$_.Version); "Package"=$_} } `
| Sort-Object -Property Version -Descending `
| Select-Object -First 1).Package
return $SrsPackage.InstallLocation
}
Function ReplaceFolder {
Param (
[String]$SourceFolder,
[String]$TargetFolder
)
Write-Host "Replacing $TargetFolder with $SourceFolder..."
if ($(Test-Path -Path $SourceFolder) -eq $false) {
Write-Host "ERROR: Cannot find $SourceFolder"
ExitRecoveryTool
}
Write-Host "Found $SourceFolder "
if (Test-Path -Path $TargetFolder) {
Write-Host "Deleting existing folder $TargetFolder"
Remove-Item -Path $TargetFolder -Force -Recurse
if (!$?) {
Write-Host "ERROR: Aborting operation because we failed to remove $TargetFolder"
ExitRecoveryTool
}
Write-Host "Deleted $TargetFolder"
}
Write-Host "Copying $SourceFolder to $TargetFolder"
Copy-Item -Recurse -Path $SourceFolder -Destination $TargetFolder
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to copy $SourceFolder to $TargetFolder"
ExitRecoveryTool
}
Write-Host "OK"
}
Function DisableAppLocker {
Write-Host "Disabling AppLocker..."
# Set permissive policy
Out-File -FilePath "$Env:temp\tempPolicy.xml" -Encoding ascii -InputObject '<AppLockerPolicy Version="1"><RuleCollection Type="Appx" EnforcementMode="Enabled" /><RuleCollection Type="Dll" EnforcementMode="NotConfigured" /><RuleCollection Type="Exe" EnforcementMode="Enabled" /><RuleCollection Type="Msi" EnforcementMode="NotConfigured" /><RuleCollection Type="Script" EnforcementMode="NotConfigured" /></AppLockerPolicy>'
Set-AppLockerPolicy -XmlPolicy "$Env:temp\tempPolicy.xml"
if (!$?) {
Write-Host "ERROR: Failed to set AppLocker policy"
ExitRecoveryTool
}
# Turn off everything
Out-File -FilePath "$Env:temp\tempPolicy.xml" -Encoding ascii -InputObject '<AppLockerPolicy Version="1"><RuleCollection Type="Appx" EnforcementMode="NotConfigured" /><RuleCollection Type="Dll" EnforcementMode="NotConfigured" /><RuleCollection Type="Exe" EnforcementMode="NotConfigured" /><RuleCollection Type="Msi" EnforcementMode="NotConfigured" /><RuleCollection Type="Script" EnforcementMode="NotConfigured" /></AppLockerPolicy>'
Set-AppLockerPolicy -XmlPolicy "$Env:temp\tempPolicy.xml"
if (!$?) {
Write-Host "ERROR: Failed to set AppLocker policy"
ExitRecoveryTool
}
# Clear out old policies
$path = [IO.Path]::Combine($Env:windir,"System32","AppLocker","*.AppLocker")
Remove-Item -Force -Path $path
if (!$?) {
Write-Host "ERROR: Failed to remove all .AppLocker files that match $path. Please delete all contents under $path and try again."
ExitRecoveryTool
}
Write-Host "OK"
}
Function EnableWindowsFeatures {
# Make sure embedded shell launcher enabled
Write-Host "Enabling Windows Feature: Client-EmbeddedShellLauncher..."
Enable-WindowsOptionalFeature -Online -FeatureName "Client-EmbeddedShellLauncher" -All
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to enable Windows feature Embedded Shell Launcher"
ExitRecoveryTool
}
Write-Host "OK"
Write-Host "Enabling Windows Feature: Client-KeyboardFilter..."
Enable-WindowsOptionalFeature -Online -FeatureName "Client-KeyboardFilter" -All
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to enable Windows feature Client-KeyboardFilter"
ExitRecoveryTool
}
Write-Host "OK"
}
Function RemoveScheduledTasks {
#Remove Existing Scheduled tasks
Write-Host "Removing old scheduled tasks..."
Get-ScheduledTask -TaskPath "\Microsoft\Skype\" -ErrorAction SilentlyContinue | Unregister-ScheduledTask -Confirm:$false
Write-Host "OK"
}
Function RemoveEventLogs {
#Remove Old Event Logs
Write-Host "Removing old event logs..."
Remove-EventLog -LogName "Skype Room System" -ErrorAction SilentlyContinue
Remove-EventLog -LogName "ScriptLaunch" -ErrorAction SilentlyContinue
Write-Host "OK"
}
Function RemoveRecoveryFolder {
#Delete older recovery folder
$targetPath = 'C:\Recovery\OEM\$oem$\$1\Rigel'
Write-Host "Deleting old recovery folder $targetPath..."
if (Test-Path -Path $targetPath) {
Remove-Item -Path $targetPath -Force -Recurse
if (!$?) {
Write-Host "ERROR: Aborting operation because we failed to remove $targetPath"
ExitRecoveryTool
}
}
Write-Host "OK"
}
Function StopSrsForAllUsers {
Write-Host "Stopping all instances of SkypeRoomSystem..."
Get-Process -Name "Watchdog" -ErrorAction SilentlyContinue | Stop-Process -Force
Get-Process -Name "Microsoft.SkypeRoomSystem" -ErrorAction SilentlyContinue | Stop-Process -Force
Write-Host "OK"
}
Function ForceAppRegistration {
Write-Host "Registering app package for Skype user..."
$appLocation = GetSkypeInstallFolder
if ($appLocation -eq $null) {
Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed"
ExitRecoveryTool
}
$appxManifest = "$appLocation\AppxManifest.xml"
#Register for Skype user
reg.exe add "HKLM\System\CurrentControlSet\Control\Lsa" /f /v "LimitBlankPasswordUse" /t REG_DWORD /d 0
$creds = New-Object System.Management.Automation.PSCredential ("Skype", (new-object System.Security.SecureString))
start-process -FilePath powershell.exe -wait -Credential $creds -ArgumentList @("Add-AppxPackage","-Register","-Path","`'$appxManifest`'", "-DisableDevelopmentMode")
reg.exe add "HKLM\System\CurrentControlSet\Control\Lsa" /f /v "LimitBlankPasswordUse" /t REG_DWORD /d 1
Write-Host "OK"
}
Function CheckSkypeUser {
Write-Host "Checking for Skype user account..."
$skypeUserFound = $false
$localUsers = Get-WmiObject -Class Win32_UserAccount -Filter "LocalAccount='True'"
ForEach ($user in $localUsers)
{
if ($user.Name -eq $SkypeUserAccountName)
{
$skypeUserFound = $true
}
}
if ($skypeUserFound -eq $false)
{
Write-Host "ERROR: The Skype user account cannot be found. Please run this tool again and choose the Reset System option."
ExitRecoveryTool
}
Write-Host "Skype user found"
}
Function CheckWindowsUpdates {
Write-Host "Checking if required Windows updates are installed..."
$osVer = [System.Environment]::OSVersion.Version;
$releaseId = Get-ItemPropertyValue -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" -Name "UBR"
# RS1 Check
if (($osVer.Major -eq $WINDOWS_VERSION_MAJOR) -and
($osVer.Minor -eq $WINDOWS_VERSION_MINOR) -and
($osVer.Build -eq $WINDOWS_VERSION_BUILD_RS1))
{
Write-Host "Windows 10 1607 is no longer supported, please update to a newer release of Windows 10 and try again. See http://aka.ms/srsupdate for assistance."
ExitRecoveryTool
}
# RS3 Check
if (($osVer.Major -eq $WINDOWS_VERSION_MAJOR) -and
($osVer.Minor -eq $WINDOWS_VERSION_MINOR) -and
($osVer.Build -eq $WINDOWS_VERSION_BUILD_RS3))
{
if (($releaseId -eq $null) -or ($releaseId -lt $WINDOWS_VERSION_BUILD_RS3_REQUIRED_UBR)) {
Write-Host "ERROR: Latest Windows Updates are not installed, please install lastest cumulative updates."
ExitRecoveryTool
}
}
Write-Host "Found acceptable Windows OS version $osVer with Release Id $releaseId"
}
Function StartLogging {
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$srcLocal = [IO.Path]::Combine($SystemDrive, "Users", "Skype", "AppData", "Local")
$recoveryLogDir = [IO.Path]::Combine($srcLocal, "Packages", "Microsoft.SkypeRoomSystem_8wekyb3d8bbwe", "LocalState", "Tracing", "RecoveryTool")
# Create log directory
if (!(Test-Path -Path $recoveryLogDir)){
New-Item -ItemType Directory -Force -Path $recoveryLogDir
}
# Delete old log files
$MaxOldFiles = 9
$logFiles = Get-ChildItem -Filter "RecoveryTool*.log" -Path $recoveryLogDir | Sort-Object -Property Name -Descending
if ($logFiles.Count -gt $MaxOldFiles) {
for ($i = $MaxOldFiles; $i -lt $logFiles.Count; $i++) {
Remove-Item -Force -Path "$($logFiles[$i].FullName)"
}
}
# Start Transcript
$logFilePath = [IO.Path]::Combine($recoveryLogDir,"RecoveryTool-$([DateTime]::Now.ToString("yyyy.MM.dd-HH.mm.ss")).log")
Start-Transcript -Path $logFilePath
}
Function ReplaceTextInFile {
Param(
$FilePath,
$ItemsToReplace
)
$content = ""
if (Test-Path -Path $FilePath) {
$content = Get-Content -Path $FilePath | Out-String
}
Foreach ($item in $ItemsToReplace) {
$old = $item[0]
$new = $item[1]
if ($content.Contains($old)) {
Write-Host "Replacing `"$old`" in $FilePath with `"$new`""
$content = $content.Replace($old,$new)
}
else {
Write-Host "WARNING: Could not find `"$old`" in $FilePath to replace with `"$new`""
}
}
return $content
}
Function GetSkypeSid {
$SkypeUser = New-Object System.Security.Principal.NTAccount("Skype")
$SkypeSid = $SkypeUser.Translate([System.Security.Principal.SecurityIdentifier])
return $SkypeSid
}
Function ApplySkypeUserReg {
Write-Host "Apply Skype User Registry Settings..."
# Get Skype User SID
$SkypeSid = GetSkypeSid
# Check if Skype User Registry Hive is Loaded
New-PSDrive -PSProvider Registry -Name HKU -Root HKEY_USERS
$SkypeRegistryLoaded = Test-Path -Path "HKU:\$SkypeSid"
# Load Skype Registry if necessary
if (!$SkypeRegistryLoaded) {
Write-Host "Mounting Skype user registry."
reg.exe load HKU\$SkypeSid $Env:SystemDrive\Users\Skype\NTUSER.DAT
}
else {
Write-Host "Skype user registry already loaded"
}
# Delete Registry Settings that may on the system
$regVal = Get-ItemProperty -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -ErrorAction SilentlyContinue
if ($regVal -ne $null) {
Remove-ItemProperty -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -Force
}
# Apply Modified SkypeUserReg from AdminHookScripts
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$OverridePath = [IO.Path]::Combine($SystemDrive, "Rigel", "AdminHookScripts")
$SkypeUserRegPath = [IO.Path]::Combine($OverridePath, "SkypeUser.reg")
if ($(Test-Path $SkypeUserRegPath)) {
# Apply Registry settings
reg.exe import $SkypeUserRegPath
if (!$?) {
Write-Host "ERROR: Failed to apply $SkypeUserRegPath"
ExitRecoveryTool
}
else {
Write-Host "Successfully imported $SkypeUserRegPath"
}
}
# Unload Skype Registry if necessary
if (!$SkypeRegistryLoaded) {
reg.exe unload HKU\$SkypeSid
}
Write-Host "OK"
}
Function IsProvisioningCurrent {
$isCurrent = $null
Write-Host "Checking current provisioning version..."
$currentProvisioning = Get-ItemPropertyValue -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningVersion" -ErrorAction SilentlyContinue
if (($currentProvisioning -eq $null) -or ($currentProvisioning -lt 5)) {
$isCurrent = $false
Write-Host "Your system provisioning version $currentProvisioning is out of date."
}
else {
$isCurrent = $true
Write-Host "Your system provisioning version $currentProvisioning is current."
}
return $isCurrent
}
Function ExtractSrsApp {
Param(
[String]$TargetFolder
)
if (Test-Path $TargetFolder){
Write-Host "Removing previous temp app folder $TargetFolder..."
Remove-Item -Path $TargetFolder -Force -Recurse
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to remove folder $TargetFolder"
ExitRecoveryTool
}
Write-Host "OK"
}
# Extract app package to App Temp Folder
$packageFolderPath = [io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages')
$packagePath = Get-Item "$packageFolderPath\*\*.appx"
if ($packagePath -eq $null)
{
Write-Host "ERROR: Aborting operation because app package cannot be found in $packageFolderPath"
ExitRecoveryTool
}
Write-Host "Extracting $packagePath to $TargetFolder..."
Add-Type -assembly "System.Io.Compression.Filesystem"
[io.compression.zipfile]::ExtractToDirectory($packagePath,$TargetFolder)
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to extract $packagePath to $TargetFolder"
ExitRecoveryTool
}
Write-Host "OK"
}
Function ModifyScript {
Param (
$FilePath,
$ItemsToReplace
)
Write-Host "Modifying $FilePath"
if (Test-Path -Path $FilePath) {
Write-Host "Found $FilePath"
$content = ReplaceTextInFile -FilePath $FilePath -ItemsToReplace $ItemsToReplace
Out-File -Force -FilePath $FilePath -InputObject $content -Encoding ascii
if (!$?) {
Write-Host "ERROR: Failed to apply edits to $FilePath"
ExitRecoveryTool
}
Write-Host "Successfully modified $FilePath"
}
else {
Write-Host "WARNING: Failed to find file $FilePath"
}
}
Function SetupProvisioningCustomizations {
Write-Host "Customizing setup scripts..."
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$ScriptPath = $AdminHookScriptsPath
# Modify Initialize.ps1
$initializePath = [io.path]::Combine($ScriptPath,"Initialize.ps1")
$itemsToReplace = @(
('reg.exe load HKU\Skype $Env:SystemDrive\Users\Skype\NTUSER.DAT',""),
('$SkypeUserReg = (Join-Path $PSScriptRoot SkypeUser.reg)',""),
('reg.exe import "$SkypeUserReg"',""),
('reg.exe unload HKU\Skype',""),
('Get-ChildItem $Env:SystemDrive\Users\Skype\AppData\Local\Microsoft\Windows\WinX\* -Include *.lnk -Recurse | Remove-Item',""))
ModifyScript -File $initializePath -ItemsToReplace $itemsToReplace
# Modify Config.cmd
$configPath = [io.path]::Combine($ScriptPath,"Config.cmd")
$itemsToReplace = @(
('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Sid S-1-5-32-545 -Privilege SeInteractiveLogonRight',""),
('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Account Skype -Privilege SeInteractiveLogonRight -Add',""),
('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -RemoveAll -Privilege SeNetworkLogonRight',""),
('powershell -executionpolicy unrestricted %~dp0UpdatePrivilegeGroupMembership.ps1 -Account Administrators -Privilege SeNetworkLogonRight -Add',""),
('mkdir %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\User\',""),
('powershell -executionpolicy unrestricted %~dp0textpol.ps1 %~dp0Registry.pol.txt %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\User\Registry.pol',""),
('copy /y %~dp0gpt.ini %SystemRoot%\System32\GroupPolicyUsers\S-1-5-32-545\',""),
('net accounts /maxpwage:unlimited',""),
('wmic useraccount set PasswordExpires=FALSE',""))
ModifyScript -File $configPath -ItemsToReplace $itemsToReplace
# Modify SkypeUser.reg
$SkypeSid = GetSkypeSid
$skypeUserRegPath = [io.path]::Combine($ScriptPath,"SkypeUser.reg")
$itemsToReplace = @(
('[-HKEY_USERS\Skype\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]',""),
("HKEY_USERS\Skype","HKEY_USERS\$SkypeSid"))
ModifyScript -File $skypeUserRegPath -ItemsToReplace $itemsToReplace
Write-Host "OK"
}
Function DeploySetupScripts {
Param (
[Bool]$UseInstalledApp
)
Write-Host "Deploying setup scripts..."
# Determine source to copy from
$SourcePath = ""
if ($UseInstalledApp) {
Write-Host "Deploying from installed app package..."
#Get installed app location
$appLocation = GetSkypeInstallFolder
if ($appLocation -eq $null) {
Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed"
ExitRecoveryTool
}
#Path is "Scripts" folder inside app
$SourcePath = [System.IO.Path]::Combine($appLocation,"Scripts")
}
else {
# Extract app package
$TEMP_APP_FOLDER = "RigelAppTemp"
$tempAppPath = [io.path]::Combine($env:TEMP,$TEMP_APP_FOLDER)
Write-Host "Extracting app from $tempAppPath"
ExtractSrsApp -TargetFolder $tempAppPath
# Path is "Scripts" folder inside expanded app
$SourcePath = [System.IO.Path]::Combine($tempAppPath,"Scripts")
}
Write-Host "Deploying from $SourcePath"
# Copy Files
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$TargetPath = $AdminHookScriptsPath
ReplaceFolder -SourceFolder $SourcePath -TargetFolder $TargetPath
# Apply Modifications
SetupProvisioningCustomizations
Write-Host "OK"
}
Function ReplaceRigelFolder {
# Update Entire Rigel Folder
$source = [IO.Path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64')
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$target = [io.path]::Combine($SystemDrive,"Rigel","x64")
ReplaceFolder -SourceFolder $source -TargetFolder $target
}
function Dismount-Registry {
param(
[String]$MountPoint
)
# Open handles from non-cleaned-up objects can prevent the hive from dismounting.
[gc]::Collect()
& reg.exe unload $MountPoint
if ($LASTEXITCODE -ne 0) {
Write-Error "Failed to unload registry"
return
}
}
Function CopyTelemetryId {
Write-Host "Porting existing telemetry id..."
$TelemetryName = "DeviceId"
$TelemetryPath = "Registry::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem"
$MountPoint = "HKLM\SkypeAppSettings"
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$SettingsFile = [io.path]::Combine($SystemDrive,"Users","Skype","AppData","Local","Packages","Microsoft.SkypeRoomSystem_8wekyb3d8bbwe","Settings","settings.dat")
# Check if it already exists
$currentId = Get-ItemProperty -Path $TelemetryPath -Name $TelemetryName -ErrorAction SilentlyContinue
if (!([string]::IsNullOrEmpty($currentId))) {
Write-Host "Telemetry Id already exists at $TelemetryPath $TelemetryName"
return
}
# Attempt to load Skype registry
& reg.exe load $MountPoint "$SettingsFile"
if ($LASTEXITCODE -ne 0) {
Write-Error "Failed to load registry."
return
}
Write-Host "Successfully mounted $SettingsFile at $MountPoint"
# Check if DeviceId exists in mounted registry
$currentId = Get-ItemProperty -Path "Registry::$MountPoint\Localstate" -Name $TelemetryName -ErrorAction SilentlyContinue
if ($currentId -eq $null) {
Write-Host "App settings does not contain a $TelemetryName property to copy"
return
}
Write-Host "Confirmed $MountPoint\LocalState $TelemetryName exists"
# Use reg query to read registry because PowerShell doesn't like reading registry data items of REG_NONE/Unknown type.
$queryResult = & reg.exe query $MountPoint\LocalState /v $TelemetryName
if ($LASTEXITCODE -ne 0) {
Write-Error "Failed to read Device ID: reg command error"
Dismount-Registry $MountPoint
return
}
if ($queryResult -eq $null -or $queryResult.Count -eq 0) {
Write-Error "Failed to read device ID: no data returned"
Dismount-Registry $MountPoint
return
}
Write-Host "Reg query result is $queryResult"
# Parse "reg query" output into just the data's value.
# The output contains multiple lines including a leading whitespace, the line
# we want starts with $TelemetryName. That line, once selected, then needs to be split
# based on space into three fields -- data name, data type, data value. The last
# field is the one we want. This is safe to perform on these setting values,
# because they are provided to us in hex form.
# Parse out hex data from query
$dataHex = $queryResult `
| ForEach-Object { $_.Trim() } `
| Where-Object { $_.StartsWith($TelemetryName) } `
| Select-Object -First 1 `
| ForEach-Object { $_.Split(" ",3,[stringsplitoptions]::RemoveEmptyEntries) } `
| Select-Object -Last 1
Write-Host "Hex data is $dataHex"
# Convert the hex nibbles, two at a time, into an array of bytes.
[byte[]]$dataBytes = $dataHex -split "(..)" `
| Where-Object { !([string]::IsNullOrEmpty($_)) } `
| ForEach-Object { [convert]::ToByte($_,16) }
# Convert the bytes to a string, and discard everything after the null terminator.
$foundDeviceId = [System.Text.Encoding]::Unicode.GetString($dataBytes).Split("`0") | Select-Object -First 1
Write-Host "Found DeviceId string $foundDeviceId"
# Set DeviceId in registry
if (!(Test-Path -Path $TelemetryPath)) {
New-Item -Path $TelemetryPath -Force
}
Set-ItemProperty -Path $TelemetryPath -Name $TelemetryName -Value "$foundDeviceId"
if (!$?) {
Write-Host "Failed to write $foundDeviceId to $TelemetryPath $TelemetryName"
Dismount-Registry $MountPoint
return
}
Write-Host "Successfully migrated telemetry id $foundDeviceId"
Dismount-Registry $MountPoint
Write-Host "OK"
}
Function RefreshAppAndProvisioning {
CheckWindowsUpdates
CheckSkypeUser
StopSrsForAllUsers
EnableWindowsFeatures
ReplaceRigelFolder
DeploySetupScripts -UseInstalledApp $false
DisableAppLocker
RemoveScheduledTasks
RemoveEventLogs
RemoveRecoveryFolder
#Run final setup.ps1
Write-Host "Running setup..."
$workingDirectory = [io.path]::Combine("$env:SystemDrive\","Rigel")
Set-Location $workingDirectory
& "C:\Rigel\x64\Scripts\Provisioning\FinalSetup.ps1"
Write-Host "OK"
#Make sure App is Registered
ForceAppRegistration
#Apply Skype User Reg
ApplySkypeUserReg
#Migrate existing telemetry id
CopyTelemetryId
#Upgrade registry to show provisioning was upgraded
Set-ItemProperty -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningUpgradeMethod" -Value "Repair v$RECOVERY_VERSION"
}
Function CopyScriptLaunchFromInstalledApp {
# Deploy ScriptLaunch.ps1
Write-Host "Deploying ScriptLaunch.ps1..."
$appLocation = GetSkypeInstallFolder
if ($appLocation -eq $null) {
Write-Host "ERROR: Microsoft.SkypeRoomSystem is not installed"
ExitRecoveryTool
}
$source = [IO.Path]::Combine($appLocation,"RecoveryTool","ScriptLaunch.ps1")
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$target = [io.path]::Combine($SystemDrive,"Rigel","x64","Scripts","Provisioning","ScriptLaunch.ps1")
Write-Host "Copying $source to $target"
Copy-Item -Force -Path $source -Destination $target
if (!$?) {
Write-Host "ERROR: Failed to deploy $source to $target"
ExitRecoveryTool
}
Write-Host "OK"
}
Function CreateAdminHooksFolder {
Write-Host "Creating AdminHooks folder..."
$adminHooksPath = [io.path]::Combine("$env:SystemDrive\","Rigel","AdminHookScripts")
if ($(Test-Path $adminHooksPath) -eq $false) {
Write-Host "Creating new folder because no existing folder detected"
mkdir "$adminHooksPath"
}
ICacls $adminHooksPath /reset
ICacls $adminHooksPath /Grant Administrators:`(OI`)`(CI`)F System:`(OI`)`(CI`)RX Users:`(OI`)`(CI`)RX /inheritance:r
ICacls $adminHooksPath\* /reset /T
Write-Host "OK"
}
Function SilentUpdateSetHklmRegKeys {
# Set HKLM Reg Keys
Write-Host "Apply HKLM User Registry Settings..."
# Make sure HKLM\Software\Microsoft\SkypeRoomSystem exists
if ($(Test-Path -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\") -eq $false) {
New-Item -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\" -Name "SkypeRoomSystem"
}
# Make sure HKLM\Software\Microsoft\SkypeRoomSystem\HasRun is empty
if (Test-Path -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\HasRun\") {
Remove-Item -Force -Recurse -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\HasRun\"
}
New-Item -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\" -Name "HasRun"
# Configure system to use user specified shell
Set-ItemProperty -Force -Path "REGISTRY::HKLM\Software\Microsoft\Windows NT\CurrentVersion\IniFileMapping\system.ini\boot\" -Name "Shell" -Value "USR:Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon"
# Configure default shell in case no user specified shell is present
Set-ItemProperty -Force -Path "REGISTRY::HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\" -Name "Shell" -Value "Explorer.exe"
# Set Provisioning version
Set-ItemProperty -Force -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem\" -Name "ProvisioningVersion" -Value 6
Write-Host "OK"
}
Function SilentUpdateSetSkypeUserRegKeys {
Write-Host "Updating Skype user reg keys..."
# Get Skype Sid
$SkypeSid = GetSkypeSid
# Check if Skype User Registry Hive is Loaded
New-PSDrive -PSProvider Registry -Name HKU -Root HKEY_USERS
$SkypeRegistryLoaded = Test-Path -Path "HKU:\$SkypeSid"
# Load Skype Registry if necessary
if (!$SkypeRegistryLoaded) {
Write-Host "Mounting Skype user registry."
reg.exe load HKU\$SkypeSid $Env:SystemDrive\Users\Skype\NTUSER.DAT
}
else {
Write-Host "Skype user registry already loaded"
}
# Delete Old Run Key
Remove-ItemProperty -Force -Path "HKU:\$SkypeSid\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "SkypeRoomSystemLaunch" -ErrorAction SilentlyContinue
# Unload Skype Registry if necessary
if (!$SkypeRegistryLoaded) {
reg.exe unload HKU\$SkypeSid
}
Write-Host "OK"
}
Function DisarmSkypeDailyMaintenance {
Write-Host "Disarming old SkypeDailyMaintenance.ps1..."
$SystemDrive = Join-Path "${env:SystemDrive}" ""
$target = [io.path]::Combine($SystemDrive,"Rigel","x64","Scripts","Provisioning","SkypeDailyMaintenance.ps1")
Out-File -FilePath "$target" -Encoding ascii -InputObject ''
Write-Host "OK"
}
Function SilentUpdate {
CheckSkypeUser
StopSrsForAllUsers
CopyScriptLaunchFromInstalledApp
DisableAppLocker
DisarmSkypeDailyMaintenance
# Create ScriptLaunch event log that normally happens in FinalSetup.ps1
New-EventLog -LogName "ScriptLaunch" -Source "ScriptLaunch"
Limit-EventLog -LogName "ScriptLaunch" -MaximumSize 15168KB
# Get path to Scripts folder in Skype App Package
Write-Host "Get path to scripts folder..."
$appFolder = GetSkypeInstallFolder
if ($appFolder -eq $null) {
Write-Host "ERROR: Cannot find SkypeRoomSystem app folder"
ExitRecoveryTool
}
$scriptsFolder = [io.path]::Combine($appFolder,"Scripts")
Write-Host "Path to scripts folder is $scriptsFolder"
Write-Host "OK"
# Schedule the NightlyReboot.ps1 entry hook
Write-Host "Creating Nightly Reboot task..."
$NightlyRebootTaskXmlPath = (Join-Path $scriptsFolder NightlyRebootTask.xml)
schtasks.exe /create /xml "$NightlyRebootTaskXmlPath" /tn Microsoft\Skype\NightlyReboot
Write-Host "OK"
# Schedule the Logon.ps1 entry hook
Write-Host "Creating Logon task..."
$LogonTaskXmlPath = (Join-Path $scriptsFolder LogonTask.xml)
schtasks.exe /create /xml "$LogonTaskXmlPath" /tn Microsoft\Skype\Logon
Write-Host "OK"
# Set the start menu layout to reference only our app.
# This is necessary for our app to survive the sysprep /generalize process.
Write-Host "Pin SkypeRoomSystem app to start menu..."
$StartLayout = (Join-Path $scriptsFolder LayoutModification.xml)
Import-StartLayout -LayoutPath $StartLayout -MountPath $Env:SystemDrive\
Write-Host "OK"
CreateAdminHooksFolder
SilentUpdateSetSkypeUserRegKeys
SilentUpdateSetHklmRegKeys
#Migrate existing telemetry id
CopyTelemetryId
#Upgrade registry to show provisioning was upgraded
Set-ItemProperty -Path "REGISTRY::HKLM\SOFTWARE\Microsoft\SkypeRoomSystem" -Name "ProvisioningUpgradeMethod" -Value "SilentUpdate v$RECOVERY_VERSION"
}
Function IsNonUserSelectableOption
{
Param(
[Nullable[RepairAction]]$Selection
)
if ($Selection -eq [RepairAction]::SilentUpdate) { return $true }
return $false
}
Function Get-RepairAction {
param(
[Nullable[RepairAction]]$RepairAction = $null
)
if (IsNonUserSelectableOption -Selection $RepairAction) {
return $RepairAction
}
while (($RepairAction -eq $null) -or (IsNonUserSelectableOption -Selection $RepairAction)) {
[RepairAction].GetEnumValues() | ForEach-Object { if (!(IsNonUserSelectableOption -Selection $_)) { Write-Host ("[{0}] {1}" -f [int]$_, $_) }}
$selection = Read-Host -Prompt "Please choose an option"
try { $RepairAction = [RepairAction]$selection } catch {}
}
return $RepairAction
}
# Make sure we are elevated
$isElevated = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
if (!$isElevated)
{
Write-Host "ERROR: Aborting operation because elevated privileges are not available. Please run this script as Administrator."
ExitRecoveryTool
}
# Start Logging
StartLogging
# Detect the command
$selection = Get-RepairAction @ARGS
# Do System Repair
if ($selection -eq [RepairAction]::Repair) {
RefreshAppAndProvisioning
# Repair complete
Write-Host ""
Write-Host "---------------------------------------------------"
Write-Host "-- REPAIR COMPLETE. PLEASE RESTART THE SYSTEM. --"
Write-Host "---------------------------------------------------"
Write-Host ""
ExitRecoveryTool
}
# Do BackgroundRepair
if ($selection -eq [RepairAction]::SilentUpdate) {
# Trigger restart on exit
$RestartOnExit = $true
# Perform repair is provisioning is out of date
if ($(IsProvisioningCurrent) -eq $false) {
SilentUpdate
}
ExitRecoveryTool
}
# Do System Reset
#Check current Windows Version
Write-Host "Checking current Windows installation..."
CheckWindowsUpdates
Write-Host "OK"
# Get correct provisioning folder for Windows Version
Write-Host "Verifying Windows Version..."
$ProvisioningFolderPathForCurrentOS = ""
$osVer = [System.Environment]::OSVersion.Version;
switch ($osVer.Build) {
$WINDOWS_VERSION_BUILD_RS3 {
$ProvisioningFolderPathForCurrentOS = [io.path]::Combine($PSScriptRoot,'Provisioning','RS3')
}
$WINDOWS_VERSION_BUILD_RS2 {
$ProvisioningFolderPathForCurrentOS = [io.path]::Combine($PSScriptRoot,'Provisioning','RS2')
}
default {
Write-Host "The current Windows version $($osVer.ToString()) is not supported."
ExitRecoveryTool
}
}
Write-Host "OK"
# Check Windows Edition
Write-Host "Verifying Windows Edition..."
$edition = (Get-WmiObject Win32_OperatingSystem).OperatingSystemSKU
if ($edition -ne 4)
{
Write-Host "ERROR: The current OS edition is not supported. Windows Enterprise or Windows IoT Enterprise is required."
ExitRecoveryTool
}
Write-Host "OK"
Write-Host ""
Write-Host "========================"
Write-Host "OS Requirements Verified"
Write-Host "========================"
Write-Host ""
# Remove any previous App Temp Folder
$TEMP_APP_FOLDER = "RigelAppTemp"
$tempAppPath = [io.path]::Combine($env:TEMP,$TEMP_APP_FOLDER)
ExtractSrsApp -TargetFolder $tempAppPath
Write-Host ""
Write-Host "=========================="
Write-Host "App Successfully Extracted"
Write-Host "=========================="
Write-Host ""
# Verify necessary items are present
$itemsToVerify = @(
[io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem'),
$ProvisioningFolderPathForCurrentOS,
[io.path]::Combine($tempAppPath,'Scripts','EnableCustomizationsAfterRecovery.cmd'),
[io.path]::Combine($tempAppPath,'Scripts','ResetConfig.xml')
)
ForEach ($item in $itemsToVerify) {
Write-Host "Verifying $item..."
if (!$(Test-Path $item))
{
Write-Host "ERROR: Aborting operation because the following item cannot be found: $item"
ExitRecoveryTool
}
Write-Host "OK"
}
Write-Host ""
Write-Host "======================================"
Write-Host "Necessary items verified to be present"
Write-Host "======================================"
Write-Host ""
# Remove any previous staging directory
$STAGING_DIRECTORY = "OEM_TEMP"
$stagingDir = [io.path]::Combine("$env:SystemDrive\",'Recovery',$STAGING_DIRECTORY)
if (Test-Path ($stagingDir))
{
Write-Host "Removing old staging directory $stagingDir..."
Remove-Item -Path $stagingDir -Recurse -Force
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to remove old staging directory $stagingDir"
ExitRecoveryTool
}
Write-Host "OK"
}
# Copy New items to Staging Directory
$itemsToCopy = @(
([io.path]::Combine($PSScriptRoot,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem'), [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','Ship','AppPackages','SkypeRoomSystem')),
($ProvisioningFolderPathForCurrentOS, [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','Scripts','Provisioning')),
([io.path]::Combine($ProvisioningFolderPathForCurrentOS,'AutoUnattend.xml'), [io.path]::Combine($stagingDir,'AutoUnattend.xml')),
([io.path]::Combine($tempAppPath,'Scripts','EnableCustomizationsAfterRecovery.cmd'), [io.path]::Combine($stagingDir,'EnableCustomizationsAfterRecovery.cmd')),
([io.path]::Combine($tempAppPath,'Scripts','ResetConfig.xml'), [io.path]::Combine($stagingDir,'ResetConfig.xml'))
)
foreach ($item in $itemsToCopy)
{
$source = $item[0]
$target = $item[1]
Write-Host "Copying $source to $target..."
Copy-Item -Recurse -Path $source -Destination $target
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to copy $source to $target"
ExitRecoveryTool
}
Write-Host "OK"
}
Write-Host ""
Write-Host "========================="
Write-Host "Items successfully staged"
Write-Host "========================="
Write-Host ""
# Setup Autounattend file
$autoUnattendPath = [io.path]::Combine($stagingDir,'AutoUnattend.xml')
$autoUnattendInProvisioningPath = [io.path]::Combine($stagingDir,'$oem$','$1','Rigel','x64','scripts','provisioning','AutoUnattend.xml')
$autoUnattendXml = New-Object XML
Write-Host "Loading AutoUnattend.xml file..."
$autoUnattendXml.Load($autoUnattendPath)
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to load $autoUnattendPath"
ExitRecoveryTool
}
$ns = New-Object Xml.XmlNamespaceManager $autoUnattendXml.NameTable
$ns.AddNamespace("ns","urn:schemas-microsoft-com:unattend")
Write-Host "OK"
# Check features are present
if ($autoUnattendXml.unattend.servicing.package.ChildNodes -ne $null)
{
Write-Host "Inspecting installed Windows Features..."
$featureNodes = $autoUnattendXml.SelectNodes("//ns:unattend/ns:servicing/ns:package/ns:selection",$ns)
foreach ($node in $featureNodes)
{
$feature = Get-WindowsOptionalFeature -Online -FeatureName $node.name
if ($feature -ne $null)
{
Write-Host "Found $($node.name)"
}
else
{
if ($node.state -eq $false)
{
Write-Host "INFO: Removing command to disable feature $($node.name) because it is not installed"
$autoUnattendXml.unattend.servicing.package.RemoveChild($node) | Out-Null
}
else
{
Write-Host "ERROR: Aborting operation because the required Windows Feature $($node.name) is not installed"
ExitRecoveryTool
}
}
}
Write-Host "OK"
}
$fixNode = $autoUnattendXml.SelectSingleNode('//ns:unattend/ns:settings/ns:component/ns:RunSynchronous/ns:RunSynchronousCommand/ns:Path[contains(text(),"/generalize")]',$ns)
if ($fixNode -ne $null)
{
Write-Host "Fixing up AutoUnattend.xml..."
$fixNode.'#text' = $fixNode.'#text'.Replace("/generalize","")
Write-Host "OK"
}
$packageName = ""
Get-WindowsPackage -online | ForEach-Object { if ($_.PackageName.Contains("Microsoft-Windows-Foundation-Package")) {$packageName = $_.PackageName}}
if ($packageName.Length -gt 0) {
$packageVersion = $packageName.Substring($packageName.LastIndexOf('~')+1)
$fixNode = $autoUnattendXml.SelectSingleNode("//ns:unattend/ns:servicing/ns:package/ns:assemblyIdentity",$ns)
$fixNode.version = $packageVersion
}
Write-Host "Saving AutoUnattend.xml..."
$autoUnattendXml.Save($autoUnattendPath)
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to write to $autoUnattendPath"
ExitRecoveryTool
}
#Persist modified autounattend.xml for future resets
Copy-Item -Path $autoUnattendPath -Destination $autoUnattendInProvisioningPath -Force
if (!$?)
{
Write-Host "ERROR: Aborting operation because we failed to write to $autoUnattendInProvisioningPath"
ExitRecoveryTool
}
Write-Host "OK"
Write-Host ""
Write-Host "======================="
Write-Host "AutoUnattend is updated"
Write-Host "======================="
Write-Host ""
# Backup old recovery directory if it exists
$recoveryDir = [io.path]::Combine("$env:SystemDrive\",'Recovery')
$oemDir = [io.path]::Combine($recoveryDir,'OEM')
$oldOemDir = [io.path]::Combine($recoveryDir,"OEM.$(Get-Date -Format "yyyy-MM-dd-HH.mm.ss")")
if (Test-Path $oemDir)
{
Write-Host "Renaming $oemDir to $oldOemDir..."
Rename-Item -Path $oemDir -NewName $oldOemDir
Write-Host "OK"
}
# Swap in new recovery directory
Write-Host "Renaming $stagingDir directory to $oemDir..."
Rename-Item -Path $stagingDir -NewName $oemDir
Write-Host "OK"
Write-Host ""
Write-Host "=========================="
Write-Host "Recovery Directory Updated"
Write-Host "=========================="
Write-Host ""
Write-Host ""
Write-Host ""
Write-Host 'OPERATION COMPLETE: Please use Windows to "Reset This PC" and choose option to "Remove Everything"'
Write-Host ""
Write-Host 'NOTE: If Windows Reset fails because Windows Recovery Environment is not enabled, do the following:'
Write-Host '1) Go to "Settings->System->About" to verify device encryption is turned OFF. If device encryption is ON, turn it OFF and wait for decryption to complete.'
Write-Host '2) Start an elevated command prompt and run "reagentc.exe /enable"'
Write-Host '3) Use Windows to "Reset This PC" and choose option to "Remove Everything"'
Write-Host ""
ExitRecoveryTool
|
combined_dataset/train/non-malicious/1677.ps1
|
1677.ps1
|
function Add-LocalAdmin {
param (
[string]$comp,
[string]$sam,
[string]$domain = $env:USERDOMAIN
)
if ($comp -match '^\s*$') {
throw "Comp not found '$comp'"
}
if ($sam -match '^\s*$') {
throw "Sam not acceptable '$sam'"
}
([adsi]"WinNT://$comp/Administrators").add("WinNT://$domain/$sam")
}
|
combined_dataset/train/non-malicious/PowerShell Template_7.ps1
|
PowerShell Template_7.ps1
|
Function new-script
{
$strName = $env:username
$date = get-date -format d
$name = Read-Host "Filename"
$email = Read-Host "eMail Address"
$file = New-Item -type file "c:\\Scripts\\$name.ps1" -force
add-content $file "#=========================================================================="
add-content $file "#"
add-content $file "# NAME: $name.ps1"
add-content $file "#"
add-content $file "# AUTHOR: $strName"
add-content $file "# EMAIL: $email"
add-content $file "#"
add-content $file "# COMMENT: "
add-content $file "#"
add-content $file "# You have a royalty-free right to use, modify, reproduce, and"
add-content $file "# distribute this script file in any way you find useful, provided that"
add-content $file "# you agree that the creator, owner above has no warranty, obligations,"
add-content $file "# or liability for such use."
add-content $file "#"
add-content $file "# VERSION HISTORY:"
add-content $file "# 1.0 $date - Initial release"
add-content $file "#"
add-content $file "#=========================================================================="
ii $file
}
|
combined_dataset/train/non-malicious/sample_35_83.ps1
|
sample_35_83.ps1
|
#
# Module manifest for module 'OCI.PSModules.Generativeaiinference'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText',
'Invoke-OCIGenerativeaiinferenceSummarizeText',
'New-OCIGenerativeaiinferenceText'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_8_77.ps1
|
sample_8_77.ps1
|
PARAM($XMLFilename)
. ./utils_cts.ps1
SkipSecondExecution
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_
continue
}
if (Test-Path ($XMLFilename))
{
$AlertDisplay = "Performance Monitor Warning"
[xml] $ReportXML = Get-Content -Path $XMLFilename
foreach ($Table in $ReportXML.SelectNodes("/Report/Section[@name='advice']/Table"))
{
if ($Table.name -eq "warning")
{
$ItemNumber = 0
$AlertSeverity = "Warning"
foreach ($Item in $Table.SelectNodes("Item"))
{
$MSG_Summary = new-object PSObject
$ItemNumber ++
foreach ($Data in $Item.SelectNodes("Data"))
{
$ColumnName = "Details"
if ($null -ne $Data.img)
{
$AlertSeverity = $Data.img
}
if ($Data.name -eq "severity")
{
$AlertDisplay = $Data.Get_InnerText()
}
elseif ($Data.name -eq "warning")
{
$WarningMsg = $Data.Get_InnerText()
}
else
{
$WarningMsg = $Data.Get_InnerText()
$ColumnName = ($Data.name.Substring(0,1).ToUpper()) + $Data.name.Substring(1,$Data.name.Length -1)
}
switch ($AlertSeverity)
{
"warning"
{
$AlertVerbosity = "Warning"
}
"error"
{
$AlertVerbosity = "Error"
}
default
{
$AlertVerbosity = "Informational"
}
}
if ($ColumnName -ne 'Related')
{
add-member -inputobject $MSG_Summary -membertype noteproperty -name $ColumnName -value $WarningMsg
}
}
if (($MSG_Summary | Get-Member).Count -gt 4)
{
$MSG_Summary | ConvertTo-Xml2 | update-diagreport -ID ("MSG_" + $ItemNumber.ToString() + "_" + (Get-Random) + "_Details") -name $AlertDisplay -verbosity $AlertVerbosity
}
else
{
"There is nothing to add. XML: " + $Table.get_InnerXML()
}
}
}
}
# $XMLFilename| Remove-Item
}
else
{
"Error: $XMLFilename does not exist" | WriteTo-StdOut
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9H5aCP4z+BoXW
# Qxe3ddsAYNVW9E/eUi7A/fuXSeJoaKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKzf
# eyrzxN2b8Tu1Fh+EJCt4IQtCOYJ7YSyPBIb5jhZvMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAZDOvoZgYDv1l+krt4Sr7syA16kiB784nnxcf
# 3mLUa8qhuBIjb31vqejrZKP+e8CFHwNlSspJiJowd4jEtHRgnNSsXVAc/WhagKgv
# XCnajaT8tIMja55WKQklbIu9g6o1ptmTPIwntiaoUZsEdSmaIOYPyC2RT1xB7AyA
# pfbiunQojO9J/60+7k33FrOrTXQHFUigAHzYgLaQuHy7+kF5Sn07IOZgIupn9D/l
# g+tv3bllBQtC7trlli5nrRVn1Jc+LOYhAxWJREqk5alPh1tBcxBQc+kxopGcQ6+j
# nuOiDwW/g0NeSlCfsXNYV0DlH+LjEEfe0Z7iEzd/8Q+nqTsBr6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBeEsSjvtb4XefIDReGfHaHDlgy76x9FFNg
# xrf5o3MfdAIGZuto66JBGBMyMDI0MTAyODExNDA0MS40ODhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL
# bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV
# +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB
# U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY
# EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV
# urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC
# yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK
# pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp
# Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8
# zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT
# ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ
# VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT
# HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ
# MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv
# cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f
# CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT
# DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh
# Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG
# DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+
# //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx
# /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk
# 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz
# 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0
# MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA
# AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV
# cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0
# aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ
# GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz
# QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw
# /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgnQhaqwPWDqsqzVGOzoCq4Ofojw9O7o78LlE1xk7zUlQwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY
# qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4
# qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAF3srx+15IM0cbxhzdQtK9R59MoS1vYx
# YPoXAGsord0SfEykMTSbcH/z73pffGJsPSm6gIdG1n2Zu6WRzC6avdFICnheQS6g
# S6kZ42o4dbuSRZMcpnJU6PxJBQaOx0+s6RxA5IiA4pMIai3/HCIRHboveLyO7lve
# sZvO6dFKzucf+nuiTpwjTm9T1rLFj0rYA4eXcu3BBO4cLAurFiwe4t6Wb/pFKQFY
# CvreqWiiyzeSGxzKUtIhuTXNZm2An2HtfBo1N1vUyEm7muiJphFh7xGNFm1+BIzJ
# /3JbL5JxjAWddmk0svwRdNQ/+FZgBqo66RePMbxWida1+eD0A91jsNrg04oIxm7D
# W3CEraTCX7b4jChG6AEuHY50nSFefIFKIBj5o0pT/zOxbmhAlEgFPlA4cSrJ9a+W
# Zv9lr1mZArdsrwOiU8NdGTdNWlvtYLgiOhat2ZBUbyyn/DqY33oT9I6fFkYpWylb
# 3I98DKwgXnsEltJCX0uOjMuxYMSlvK8lSdxkXJY+iYuDJK2C77fe7Bdao+8RZuRL
# GEd7ySguTHQYX7ZVggtD/9WW5vXfuysvejTLiQrv64bHpBFulo4LV2m4PZMAK3dh
# nNaQDX/4Jv38IUsUZKezszoMfU0+6++WgHOayVaL40/dw7/3Zm2lPeRXxzkMVPo/
# /F64Jb4qA80G
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_12_18.ps1
|
sample_12_18.ps1
|
##----------------------------------------------------------------------------
## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved.
##----------------------------------------------------------------------------
# Import string constants
. ./StringConstants.ps1
Stop-Service -Name $ServiceConstants.serviceName
# SIG # Begin signature block
# MIIoIgYJKoZIhvcNAQcCoIIoEzCCKA8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAW7wwqQJ4OHGcv
# 6bLN7vx21lDcEnYp8vpAWEb+0YOYFqCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx
# MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW
# QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0
# aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH
# zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9
# hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB
# UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t
# 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g
# fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu
# j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP
# cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc
# aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI
# KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E
# BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp
# Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5
# NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH
# fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY
# SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs
# X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G
# Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j
# +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB
# Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl
# EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet
# ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF
# xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM
# aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGeowghnm
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF
# AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAS
# smX1d620XZjZ7nRh//JATWCW3XKXO16V9PuN9wb59jANBgkqhkiG9w0BAQEFAASC
# AYBs6wN8g3lv+5iR6ZT/tsdTc9+/zrkZaV77f2gJ2rGZXmevQ6+quX2Oem2UODSd
# dG9uz+KPRTwzcQ/CBiBVocvmhdB5rKe84vFjp+rbP7cHICsdnhAukiDDwFIPkHe8
# 8gOLY1RBA25iSc4UGidpcGt2qx1Z2Ji0aRqiY2vdPheI76WIMGTT7knFOzTQEkZl
# VVxxlx5NGmU9jE22pmQ4kt3ylKoGASZ43omj0VAPpdPue3sq00p69NkAAKkwDAYw
# ylWrZYOt6T6nEA+zgOEzvbV0dj0NYRy9tHpF2GVawI1oJG/woDa4HRjZDYkOIii/
# GX689G9NS+t8C6lK9UOi5qmY89EnTGihNP8Scz94r4Nle/ubjhyg1w1Cww1Zivne
# 5u4rrD+S1xG5HLBa+2WVcWpD2Zx+laMML5y3L/GNswRg+7/9XHG1rNoxKdm95EH1
# uj+6F4mnA6kVwhHCOtsFBb0WENTsHMQgL1HG/t5AO0RS+qvTkzWa8kmKhUhXWra8
# tLShghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG9w0BBwKgghcZMIIX
# FQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEEoGkEZzBlAgEBBglg
# hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgJycv/TLLs/RksM5GDdfg6HtjLtvD
# 8v5WTI448DYPaYsCEQDY7rEwXOK5cqOd1ytPs7InGA8yMDI0MDkyMDA5NTUzOFqg
# ghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjANBgkqhkiG9w0BAQsF
# ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV
# BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w
# aW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1OVowSDELMAkGA1UE
# BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2Vy
# dCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfcYhVYwamTEafNqrJq
# 3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD1isgHMGXlLSlUIHy
# z8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkP
# G2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH13gpOWvgeFmX40Qr
# StWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52
# fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495uZBkHNwGRDxy1Uc2q
# TGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPTaR58ZE2dD9/O0V6M
# qqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZW
# pST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM
# /vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRwo+wK8REuZODLIivK
# 8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMBAAGjggGLMIIBhzAO
# BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEF
# BQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgw
# FoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW27xPn783QZKHVVqll
# MaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5j
# cmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k
# aWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0
# LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdD
# QS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xwjU+KPGic2CX/yyzk
# zepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt7T1IjrhrunxdvcJh
# N2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703
# DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJpddNQ5EQSviANnqlE
# 0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqXTzON1I13fXVFoaVY
# JmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3701S88lgIcRWR+3a
# EUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhf
# ysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7B145WPR8czFVoIAR
# yxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6r
# r3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBcYLso/zjlUlrWrBci
# I0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZ
# rZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0oZipeWzANBgkqhkiG
# 9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw
# FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVz
# dGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIyMjM1OTU5WjBjMQsw
# CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRp
# Z2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENB
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1BkmzwT1ySVFVxyUD
# xPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3znIkLf50fng8zH1AT
# CyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW
# 1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald68Dd5n12sy+iEZLRS
# 8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zkpsUdzTYNXNXmG6jB
# ZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCY
# Jn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucf
# WmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLc
# GEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJTYsg0ixXNXkrqPNF
# YLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJRk8mMDDtbiiKowSYI
# +RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEoAA6EVO7O6V3IXjAS
# vUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1UdEwEB/wQIMAYBAf8C
# AQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX
# 44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggr
# BgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3Nw
# LmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl
# cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDag
# NIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RH
# NC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3
# DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJL
# Kftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYSlm/EUExiHQwIgqgW
# valWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2M
# vGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl2szwcqMj+sAngkSu
# mScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJ
# xLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05et3/JWOZJyw9P2un
# 8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SV
# e+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSweJywm228Vex4Ziza4
# k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJ
# Dwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr
# 5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzgaoSv27dZ8/DCCBY0w
# ggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkG
# A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp
# Z2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENB
# MB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMx
# FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv
# bTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orY
# WcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8ae
# FaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckg
# HWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwr
# t0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y
# 1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjX
# WkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIb
# Zpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0c
# lcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLim
# dwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIW
# IgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZ
# qbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX
# 44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3z
# bcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBF
# BgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
# cnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG
# 9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviH
# GmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59Pes
# MHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3
# A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rb
# II01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+
# 2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNyAgEBMHcwYzELMAkG
# A1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdp
# Q2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQ
# BUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMx
# DQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDkyMDA5NTUzOFowKwYL
# KoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZI
# hvcNAQkEMSIEIJ6vzYzS37Xy9GHCtReQ6tUGLASl3FidbzMGWhV9rSweMDcGCyqG
# SIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+CitpVmq4zFq9NGprU
# DHgoMA0GCSqGSIb3DQEBAQUABIICAI3lmFvoMG/s+IpgKF8RfaZJo34x0D7U/+Q+
# BLirQTEZrQRiqV5O0oo0IWaFEhfrasyv/WCH49cM3S4Ro9LtH90zE3jIpK7vNBCH
# 5W5mS78qfDZrnXUOknXKWqdZsRql26SpKIzJcFhaJ+6iDKj42szk7GzacThuIYOK
# 2t81QvuC2LaeCOs8K5zRrDJmbFylrS1LoaSxslq1gMx7udwoCrmlaCRFfrQcI/D6
# mWP6O7dKOyDp8clqfVNiQdYsWAYpZGjQaO7WXFmuIx25wesgg9bpu5PVYMJ/UNHk
# I6QsWy+HavwFhATSYnjWWt5QhczpYc3/+ChsWKK7v8tTrfUW4Qq4v3OkJBMU7Gtu
# q3l6WyYjgDx35VBeYFND6SVx6NhmCmSD+8ikWiF5klSh192YE2wTrlf05AlofyTy
# whDCROLw7bDWkx6Jmt9HZCtE+A3Atxyc98Z8+bpamU/gw179qYTs+9D/6PixnQ5v
# ez0u0GCKlpyGFsBYmmL0wrQH80/+kzzRzuUbJHSqkgFeMiQPcEgsmWFXqQPQuyD3
# wCI7RiSoR0VRtrzWVoJZO3GRVQBs+70ykMJsMFpGV/PeTelPDbftdOIGmy/rY4YB
# iy4JuBgdRHFeUWScDGjMw4SyqlFWyxHeRaaycLNJY1WnXVjD5jvA0SZfgKEX7BfX
# a0bx3+GP
# SIG # End signature block
|
combined_dataset/train/non-malicious/Import-ADUser.ps1
|
Import-ADUser.ps1
|
#############################################################################\n##\n## Import-AdUser\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n#############################################################################\n\n<#\n\n.SYNOPSIS\n\nCreate users in Active Directory from the content of a CSV.\n\n.DESCRIPTION\n\nIn the user CSV, One column must be named "CN" for the user name.\nAll other columns represent properties in Active Directory for that user.\n\nFor example:\nCN,userPrincipalName,displayName,manager\nMyerKen,Ken.Myer@fabrikam.com,Ken Myer,\nDoeJane,Jane.Doe@fabrikam.com,Jane Doe,"CN=MyerKen,OU=West,OU=Sales,DC=..."\nSmithRobin,Robin.Smith@fabrikam.com,Robin Smith,"CN=MyerKen,OU=West,OU=..."\n\n.EXAMPLE\n\nPS >$container = "LDAP://localhost:389/ou=West,ou=Sales,dc=Fabrikam,dc=COM"\nPS >Import-ADUser.ps1 $container .\\users.csv\n\n#>\n\nparam(\n ## The container in which to import users\n ## For example:\n ## "LDAP://localhost:389/ou=West,ou=Sales,dc=Fabrikam,dc=COM)")\n [Parameter(Mandatory = $true)]\n $Container,\n\n ## The path to the CSV that contains the user records\n [Parameter(Mandatory = $true)]\n $Path\n)\n\nSet-StrictMode -Off\n\n## Bind to the container\n$userContainer = [adsi] $container\n\n## Ensure that the container was valid\nif(-not $userContainer.Name)\n{\n Write-Error "Could not connect to $container"\n return\n}\n\n## Load the CSV\n$users = @(Import-Csv $Path)\nif($users.Count -eq 0)\n{\n return\n}\n\n## Go through each user from the CSV\nforeach($user in $users)\n{\n ## Pull out the name, and create that user\n $username = $user.CN\n $newUser = $userContainer.Create("User", "CN=$username")\n\n ## Go through each of the properties from the CSV, and set its value\n ## on the user\n foreach($property in $user.PsObject.Properties)\n {\n ## Skip the property if it was the CN property that sets the\n ## user name\n if($property.Name -eq "CN")\n {\n continue\n }\n\n ## Ensure they specified a value for the property\n if(-not $property.Value)\n {\n continue\n }\n\n ## Set the value of the property\n $newUser.Put($property.Name, $property.Value)\n }\n\n ## Finalize the information in Active Directory\n $newUser.SetInfo()\n}
|
combined_dataset/train/non-malicious/sample_51_93.ps1
|
sample_51_93.ps1
|
#
# Module manifest for module 'OCI.PSModules.Limits'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Limits.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2639cc9c-eb7c-4e6a-9e53-b91506263439'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Limits Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Limits.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCILimitsQuotaLock', 'Get-OCILimitsLimitDefinitionsList',
'Get-OCILimitsLimitValuesList', 'Get-OCILimitsQuota',
'Get-OCILimitsQuotasList', 'Get-OCILimitsResourceAvailability',
'Get-OCILimitsServicesList', 'New-OCILimitsQuota',
'Remove-OCILimitsQuota', 'Remove-OCILimitsQuotaLock',
'Update-OCILimitsQuota'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Limits'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Resolve-Aliases 1.7.ps1
|
Resolve-Aliases 1.7.ps1
|
#requires -version 2.0
## ResolveAliases Module v 1.6
########################################################################################################################
## Sample Use:
## Resolve-Aliases Script.ps1 | Set-Content Script.Resolved.ps1
## ls *.ps1 | Resolve-Aliases -Inplace
########################################################################################################################
## Version History
## 1.0 - First Version. "It worked on my sample script"
## 1.1 - Now it parses the $(...) blocks inside strings
## 1.2 - Some tweaks to spacing and indenting (I really gotta get some more test case scripts)
## 1.3 - I went back to processing the whole script at once (instead of a line at a time)
## Processing a line at a time makes it impossible to handle Here-Strings...
## I'm considering maybe processing the tokens backwards, replacing just the tokens that need it
## That would mean I could get rid of all the normalizing code, and leave the whitespace as-is
## 1.4 - Now resolves parameters too
## 1.5 - Fixed several bugs with command resolution (the ? => ForEach-Object problem)
## - Refactored the Resolve-Line filter right out of existence
## - Created a test script for validation, and
## 1.6 - Added resolving parameter ALIASES instead of just short-forms
## 1.7 - Minor tweak to make it work in CTP3
##
## * *TODO:* Put back the -FullPath option to resolve cmdlets with their snapin path
## * *TODO:* Add an option to put #requires statements at the top for each snapin used
########################################################################################################################
function which {
PARAM( [string]$command )
# aliases, functions, cmdlets, scripts, executables, normal files
$cmds = @(Get-Command $command -EA "SilentlyContinue")
if($cmds.Count -gt 1) {
$cmd = @( $cmds | Where-Object { $_.Name -match "^$([Regex]::Escape($command))" })[0]
} else {
$cmd = $cmds[0]
}
if(!$cmd) {
$cmd = @(Get-Command "Get-$command" -EA "SilentlyContinue" | Where-Object { $_.Name -match "^Get-$([Regex]::Escape($command))" })[0]
}
if( $cmd.CommandType -eq "Alias" ) {
$cmd = which $cmd.Definition
}
return $cmd
}
function Resolve-Aliases
{
[CmdletBinding(ConfirmImpact="low",DefaultParameterSetName="Files")]
Param (
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Text")]
[string]$Line
,
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Files")]
[Alias("FullName","PSChildName","PSPath")]
[IO.FileInfo]$File
,
[Parameter(Position=1, ParameterSetName="Files")]
[Switch]$InPlace
)
BEGIN {
Write-Debug $PSCmdlet.ParameterSetName
}
PROCESS {
if($PSCmdlet.ParameterSetName -eq "Files") {
if($File -is [System.IO.FileInfo]){
$Line = ((Get-Content $File) -join "`n")
} else {
throw "We can't resolve a whole folder at once yet"
}
}
$Tokens = [System.Management.Automation.PSParser]::Tokenize($Line,[ref]$null)
for($t = $Tokens.Count; $t -ge 0; $t--) {
$token = $Tokens[$t]
# DEBUG $token | fl * | out-host
switch($token.Type) {
"Command" {
$cmd = which $token.Content
Write-Debug "Command $($token.Content) => $($cmd.Name)"
#if($cmd.CommandType -eq "Alias") {
$Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, $cmd.Name )
#}
}
"CommandParameter" {
Write-Debug "Parameter $($token.Content)"
for($c = $t; $c -ge 0; $c--) {
if( $Tokens[$c].Type -eq "Command" ) {
$cmd = which $Tokens[$c].Content
# if($cmd.CommandType -eq "Alias") {
# $cmd = @(which $cmd.Definition)[0]
# }
$short = $token.Content -replace "^-?","^"
Write-Debug "Parameter $short"
$parameters = $cmd.ParameterSets | Select -expand Parameters
$param = @($parameters | Where-Object { $_.Name -match $short -or $_.Aliases -match $short} | Select -Expand Name -Unique)
if($param.Count -eq 1) {
$Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, "-$($param[0])" )
}
break
}
}
}
}
}
switch($PSCmdlet.ParameterSetName) {
"Text" {
$Line
}
"Files" {
switch($File.GetType()) {
"System.IO.FileInfo" {
if($InPlace) {
$Line | Set-Content $File
} else {
$Line
}
}
default { throw "We can't resolve a whole folder at once yet" }
}
}
default { throw "ParameterSet: $($PSCmdlet.ParameterSetName)" }
}
}
}
|
combined_dataset/train/non-malicious/240.ps1
|
240.ps1
|
function Get-SCSMObjectPrefix
{
[OutputType([psobject])]
param
(
[ValidateSet(
'DependentActivity',
'ManualActivity',
'ParallelActivity',
'ReviewActivity',
'RunbookAutomationActivity',
'SequentialActivity',
'IncidentRequest',
'ServiceRequest',
'Change',
'Knowledge',
'Problem',
'Release'
)]
[string]$ClassName
)
BEGIN
{
Import-Module -Name Smlets
$ActivitySettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ActivitySettings")
$ChangeSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ChangeSettings")
$KnowledgedSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.KnowledgeSettings")
$ProblemSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ProblemSettings")
$ReleaseSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ReleaseSettings")
$ServiceRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ServiceRequestSettings")
$IncidentRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.WorkItem.Incident.GeneralSetting")
}
PROCESS
{
Switch ($ClassName)
{
"DependentActivity" { $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix }
"ManualActivity" { $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix }
"ParallelActivity" { $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix }
"ReviewActivity" { $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix }
"RunbookAutomationActivity" { $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix }
"SequentialActivity" { $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix }
"IncidentRequest" { $IncidentRequestSettingsObj.PrefixForId }
"ServiceRequest" { $ServiceRequestSettingsObj.ServiceRequestPrefix }
"Change" { $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix }
"Knowledge" { $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix }
"Problem" { $ProblemSettingsObj.ProblemIdPrefix }
"Release" { $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix }
default
{
[pscustomobject][ordered]@{
"DependentActivity" = $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix
"ManualActivity" = $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix
"ParallelActivity" = $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix
"ReviewActivity" = $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix
"RunbookAutomationActivity" = $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix
"SequentialActivity" = $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix
"IncidentRequest" = $IncidentRequestSettingsObj.PrefixForId
"ServiceRequest" = $ServiceRequestSettingsObj.ServiceRequestPrefix
"Change" = $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix
"Knowledge" = $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix
"Problem" = $ProblemSettingsObj.ProblemIdPrefix
"Release" = $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix
}
}
}
}
}
|
combined_dataset/train/non-malicious/New-Struct_1.ps1
|
New-Struct_1.ps1
|
## New-Struct
## Creates a Struct class and emits it into memory
## The Struct includes a constructor which takes the parameters in order...
##
## Usage:
## # Assuming you have a csv file with no header and columns: artist,name,length
## New-Struct Song @{
## Artist=[string];
## Name=[string];
## Length=[TimeSpan];
## }
## $songs = gc C:\\Scripts\\songlist.csv | % { new-object Song @($_ -split ",") }
##
function New-Struct {
param([string]$Name,[HashTable]$Properties)
switch($Properties.Keys){{$_ -isnot [String]}{throw "Invalid Syntax"}}
switch($Properties.Values){{$_ -isnot [type]}{throw "Invalid Syntax"}}
# CODE GENERATION MAGIKS!
$code = @"
using System;
public struct $Name {
$($Properties.Keys | % { " public {0} {1};`n" -f $Properties[$_],($_.ToUpper()[0] + $_.SubString(1)) })
public $Name ($( [String]::join(',',($Properties.Keys | % { "{0} {1}" -f $Properties[$_],($_.ToLower()) })) )) {
$($Properties.Keys | % { " {0} = {1};`n" -f ($_.ToUpper()[0] + $_.SubString(1)),($_.ToLower()) })
}
}
"@
## Obtains an ICodeCompiler from a CodeDomProvider class.
$provider = New-Object Microsoft.CSharp.CSharpCodeProvider
## Get the location for System.Management.Automation DLL
$dllName = [PsObject].Assembly.Location
## Configure the compiler parameters
$compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters
$assemblies = @("System.dll", $dllName)
$compilerParameters.ReferencedAssemblies.AddRange($assemblies)
$compilerParameters.IncludeDebugInformation = $true
$compilerParameters.GenerateInMemory = $true
$compilerResults = $provider.CompileAssemblyFromSource($compilerParameters, $code)
if($compilerResults.Errors.Count -gt 0) {
$compilerResults.Errors | % { Write-Error $_.Line + ":`t" + $_.ErrorText }
}
}
|
combined_dataset/train/non-malicious/117.ps1
|
117.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-AADUser(){
[cmdletbinding()]
param
(
$userPrincipalName,
$Property
)
$graphApiVersion = "v1.0"
$User_resource = "users"
try {
if($userPrincipalName -eq "" -or $userPrincipalName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
if($Property -eq "" -or $Property -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName"
Write-Verbose $uri
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName/$Property"
Write-Verbose $uri
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AADGroup(){
[cmdletbinding()]
param
(
$GroupName,
$id,
[switch]$Members
)
$graphApiVersion = "v1.0"
$Group_resource = "groups"
try {
if($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($GroupName -eq "" -or $GroupName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
if(!$Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
$Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
if($Group){
$GID = $Group.id
$Group.displayName
write-host
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AADDevice(){
[cmdletbinding()]
param
(
$DeviceID
)
$graphApiVersion = "v1.0"
$Resource = "devices"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=deviceId eq '$DeviceID'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Add-AADGroupMember(){
[cmdletbinding()]
param
(
$GroupId,
$AADMemberId
)
$graphApiVersion = "v1.0"
$Resource = "groups"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource/$GroupId/members/`$ref"
$JSON = @"
{
"@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/$AADMemberId"
}
"@
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $Json -ContentType "application/json"
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-ManagedDevices(){
[cmdletbinding()]
param
(
[switch]$IncludeEAS,
[switch]$ExcludeMDM
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/managedDevices"
try {
$Count_Params = 0
if($IncludeEAS.IsPresent){ $Count_Params++ }
if($ExcludeMDM.IsPresent){ $Count_Params++ }
if($Count_Params -gt 1){
write-warning "Multiple parameters set, specify a single parameter -IncludeEAS, -ExcludeMDM or no parameter against the function"
Write-Host
break
}
elseif($IncludeEAS){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource"
}
elseif($ExcludeMDM){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'eas'"
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'mdm' and managementAgent eq 'easmdm'"
Write-Warning "EAS Devices are excluded by default, please use -IncludeEAS if you want to include those devices"
Write-Host
}
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$AADGroup = Read-Host -Prompt "Enter the Azure AD device group name where devices will be assigned as members"
$GroupId = (get-AADGroup -GroupName "$AADGroup").id
if($GroupId -eq $null -or $GroupId -eq ""){
Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red
Write-Host
exit
}
else {
$GroupMembers = Get-AADGroup -GroupName "$AADGroup" -Members
}
$FilterName = Read-Host -Prompt "Specify the Azure AD display name search string"
if($FilterName -eq "" -or $FilterName -eq $null){
Write-Host
Write-Host "A string is required to identify the set of users." -ForegroundColor Red
Write-Host
break
}
$count = 0
$countAdded = 0
Write-Host
Write-Host "Checking if any Managed Devices are registered with Intune..." -ForegroundColor Cyan
Write-Host
$Devices = Get-ManagedDevices
if($Devices){
Write-Host "Intune Managed Devices found..." -ForegroundColor Yellow
Write-Host
foreach($Device in $Devices){
$DeviceID = $Device.id
$AAD_DeviceID = $Device.azureActiveDirectoryDeviceId
$LSD = $Device.lastSyncDateTime
$userId = $Device.userPrincipalName
$User = Get-AADUser -userPrincipalName $userId
if(($User.displayName).contains("$FilterName")){
Write-Host "----------------------------------------------------"
Write-Host
write-host "Device Name:"$Device.deviceName -f Green
write-host "Management State:"$Device.managementState
write-host "Operating System:"$Device.operatingSystem
write-host "Device Type:"$Device.deviceType
write-host "Last Sync Date Time:"$Device.lastSyncDateTime
write-host "Jail Broken:"$Device.jailBroken
write-host "Compliance State:"$Device.complianceState
write-host "Enrollment Type:"$Device.enrollmentType
write-host "AAD Registered:"$Device.aadRegistered
Write-Host "UPN:"$Device.userPrincipalName
write-host
write-host "User Details:" -f Green
write-host "User Display Name:"$User.displayName
Write-Host "Adding user device" $Device.deviceName "to AAD Group $AADGroup..." -ForegroundColor Yellow
$AAD_Device = Get-AADDevice -DeviceID $AAD_DeviceID
$AAD_Id = $AAD_Device.id
if($GroupMembers.id -contains $AAD_Id){
Write-Host "Device already exists in AAD Group..." -ForegroundColor Red
$countAdded++
}
else {
Write-Host "Adding Device to AAD Group..." -ForegroundColor Yellow
Add-AADGroupMember -GroupId $GroupId -AADMemberId $AAD_Id
$count++
}
Write-Host
}
}
Write-Host "----------------------------------------------------"
Write-Host
Write-Host "$count devices added to AAD Group '$AADGroup' with filter '$filterName'..." -ForegroundColor Green
Write-Host "$countAdded devices already in AAD Group '$AADGroup' with filter '$filterName'..." -ForegroundColor Yellow
Write-Host
}
else {
write-host "No Intune Managed Devices found..." -f green
Write-Host
}
|
combined_dataset/train/non-malicious/sample_41_83.ps1
|
sample_41_83.ps1
|
## Copyright (c) Microsoft Corporation. All rights reserved.
<#
.SYNOPSIS
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans.
.DESCRIPTION
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans. These performance recordings contain Microsoft-Antimalware-Engine
and NT kernel process events and can be analyzed after collection using the
Get-MpPerformanceReport cmdlet.
This cmdlet requires elevated administrator privileges.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl
#>
function New-MpPerformanceRecording {
[CmdletBinding(DefaultParameterSetName='Interactive')]
param(
# Specifies the location where to save the Microsoft Defender Antivirus
# performance recording.
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
# Specifies the duration of the performance recording in seconds.
[Parameter(Mandatory=$true, ParameterSetName='Timed')]
[ValidateRange(0,2147483)]
[int]$Seconds,
# Specifies the PSSession object in which to create and save the Microsoft
# Defender Antivirus performance recording. When you use this parameter,
# the RecordTo parameter refers to the local path on the remote machine.
[Parameter(Mandatory=$false)]
[System.Management.Automation.Runspaces.PSSession[]]$Session,
# Optional argument to specifiy a different tool for recording traces. Default is wpr.exe
# When $Session parameter is used this path represents a location on the remote machine.
[Parameter(Mandatory=$false)]
[string]$WPRPath = $null
)
[bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive')
[bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed')
# Hosts
[string]$powerShellHostConsole = 'ConsoleHost'
[string]$powerShellHostISE = 'Windows PowerShell ISE Host'
[string]$powerShellHostRemote = 'ServerRemoteHost'
if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) {
$ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.'
$category = [System.Management.Automation.ErrorCategory]::NotImplemented
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name
$psCmdlet.WriteError($errRecord)
return
}
if ($null -ne $Session) {
[int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 }
Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
[Parameter(Mandatory=$true)]
[ValidateRange(-1,2147483)]
[int]$RemotedSeconds
)
if ($RemotedSeconds -eq -1) {
New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath
} else {
New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath
}
}
return
}
if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo
$psCmdlet.WriteError($errRecord)
return
}
# Resolve any relative paths
$RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo)
# Dependencies: WPR Profile
[string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp"
if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies: WPR Version
try
{
# If user provides a valid string as $WPRPath we go with that.
[string]$wprCommand = $WPRPath
if (!$wprCommand) {
$wprCommand = "wpr.exe"
$wprs = @(Get-Command -All "wpr" 2> $null)
if ($wprs -and ($wprs.Length -ne 0)) {
$latestVersion = [System.Version]"0.0.0.0"
$wprs | ForEach-Object {
$currentVersion = $_.Version
$currentFullPath = $_.Source
$currentVersionString = $currentVersion.ToString()
Write-Host "Found $currentVersionString at $currentFullPath"
if ($currentVersion -gt $latestVersion) {
$latestVersion = $currentVersion
$wprCommand = $currentFullPath
}
}
}
}
}
catch
{
# Fallback to the old ways in case we encounter an error (ex: version string format change).
[string]$wprCommand = "wpr.exe"
}
finally
{
Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n"
}
#
# Test dependency presence
#
if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
# Exclude versions that have known bugs or are not supported any more.
[int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int]
if ($wprFileVersion -le 6) {
$ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again."
$category = [System.Management.Automation.ErrorCategory]::NotInstalled
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
function CancelPerformanceRecording {
Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline
& $wprCommand -cancel -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583000 {
Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording."
return
}
default {
Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been cancelled."
}
#
# Ensure Ctrl-C doesn't abort the app without cleanup
#
# - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved
# - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved
# - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated
[bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole)
$savedControlCAsInput = $null
$shouldCancelRecordingOnTerminatingError = $false
try
{
if ($canTreatControlCAsInput) {
$savedControlCAsInput = [Console]::TreatControlCAsInput
[Console]::TreatControlCAsInput = $true
}
#
# Start recording
#
Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline
$shouldCancelRecordingOnTerminatingError = $true
& $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583001 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording."
return
}
default {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has started." -NoNewline
if ($timedMode) {
Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline
Start-Sleep -Seconds:$Seconds
Write-Host "ok." -NoNewline
} elseif ($interactiveMode) {
$stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording"
if ($canTreatControlCAsInput) {
Write-Host "${stopPrompt}: "
do {
$key = [Console]::ReadKey($true)
if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) {
CancelPerformanceRecording
$shouldCancelRecordingOnTerminatingError = $false
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
return
}
} while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter))
} else {
Read-Host -Prompt:$stopPrompt
}
}
#
# Stop recording
#
Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... "
& $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {
$shouldCancelRecordingOnTerminatingError = $false
}
0xc5583000 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace."
return
}
default {
Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been saved to '$RecordTo'."
Write-Host `
'
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
'
Write-Host `
'
The trace you have just captured may contain personally identifiable information,
including but not necessarily limited to paths to files accessed, paths to
registry accessed and process names. Exact information depends on the events that
were logged. Please be aware of this when sharing this trace with other people.
'
} catch {
throw
} finally {
if ($shouldCancelRecordingOnTerminatingError) {
CancelPerformanceRecording
}
if ($null -ne $savedControlCAsInput) {
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
}
}
}
function PadUserDateTime
{
[OutputType([DateTime])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[DateTime]$UserDateTime
)
# Padding user input to include all events up to the start of the next second.
if (($UserDateTime.Ticks % 10000000) -eq 0)
{
return $UserDateTime.AddTicks(9999999)
}
else
{
return $UserDateTime
}
}
function ValidateTimeInterval
{
[OutputType([PSCustomObject])]
param(
[DateTime]$MinStartTime = [DateTime]::MinValue,
[DateTime]$MinEndTime = [DateTime]::MinValue,
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
[DateTime]$MaxEndTime = [DateTime]::MaxValue
)
$ret = [PSCustomObject]@{
arguments = [string[]]@()
status = $false
}
if ($MinStartTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt $MaxStartTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinEndTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt [DateTime]::MinValue)
{
try
{
$MinStartFileTime = $MinStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinStartTime', $MinStartFileTime)
}
if ($MaxEndTime -lt [DateTime]::MaxValue)
{
try
{
$MaxEndFileTime = $MaxEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxEndTime', $MaxEndFileTime)
}
if ($MaxStartTime -lt [DateTime]::MaxValue)
{
try
{
$MaxStartFileTime = $MaxStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxStartTime', $MaxStartFileTime)
}
if ($MinEndTime -gt [DateTime]::MinValue)
{
try
{
$MinEndFileTime = $MinEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinEndTime', $MinEndFileTime)
}
$ret.status = $true
return $ret
}
function ParseFriendlyDuration
{
[OutputType([TimeSpan])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[string]
$FriendlyDuration
)
if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$')
{
[string]$seconds = $Matches[1]
[string]$decimals = $Matches[2]
[string]$unit = $Matches[3]
[uint32]$magnitude =
switch ($unit)
{
'sec' {7}
'ms' {4}
'us' {1}
}
if ($decimals.Length -gt $magnitude)
{
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.")
}
return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0')))
}
[timespan]$result = [timespan]::FromTicks(0)
if ([timespan]::TryParse($FriendlyDuration, [ref]$result))
{
return $result
}
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.")
}
[scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) }
function New-FriendlyTimeSpan
{
param(
[Parameter(Mandatory = $true)]
[uint64]$Ticks,
[bool]$Raw = $false
)
if ($Raw) {
return $Ticks
}
$result = [TimeSpan]::FromTicks($Ticks)
$result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan')
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString
$result
}
function New-FriendlyDateTime
{
param(
[Parameter(Mandatory = $true)]
[uint64]$FileTime,
[bool]$Raw = $false
)
if ($Raw) {
return $FileTime
}
[DateTime]::FromFileTime($FileTime)
}
function Add-DefenderCollectionType
{
param(
[Parameter(Mandatory = $true)]
[ref]$CollectionRef
)
if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder'))
{
$CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection')
}
}
[scriptblock]$FriendlyScanInfoToString = {
[PSCustomObject]@{
ScanType = $this.ScanType
StartTime = $this.StartTime
EndTime = $this.EndTime
Duration = $this.Duration
Reason = $this.Reason
Path = $this.Path
ProcessPath = $this.ProcessPath
ProcessId = $this.ProcessId
Image = $this.Image
}
}
function Get-ScanComments
{
param(
[PSCustomObject[]]$SecondaryEvents,
[bool]$Raw = $false
)
$Comments = @()
foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) {
if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) {
if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw
$Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString())
if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) {
$item.Debug | ForEach-Object {
if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) {
$Comments += "$_"
}
}
}
}
else {
if ($item.Message.Contains("subtype=Lowfi")) {
$Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection")
}
else {
$Comments += $item.Message
}
}
}
elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$OpId = "Internal opertion"
if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.Path
}
elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.ProcessPath
}
$Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString())
}
}
$Comments
}
filter ConvertTo-DefenderScanInfo
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
ScanType = [string]$_.ScanType
StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw
EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw
Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw
Reason = [string]$_.Reason
SkipReason = [string]$_.SkipReason
}
if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path)
}
if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath)
}
if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image)
}
elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) {
try {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name)
} catch {
# Silently ignore.
}
}
$ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null }
if ($ProcessId) {
$result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId)
}
if ($result.Image -and $result.ProcessId) {
$ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId
$result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName)
}
if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) {
$Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw)
$result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo')
}
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString
$result
}
filter ConvertTo-DefenderScanOverview
{
param(
[bool]$Raw = $false
)
$vals = [ordered]@{}
foreach ($entry in $_.PSObject.Properties) {
if ($entry.Value) {
$Key = $entry.Name.Replace("_", " ")
if ($Key.EndsWith("Time")) {
$vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw
}
elseif ($Key.EndsWith("Duration")) {
$vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw
}
else {
$vals[$Key] = $entry.Value
}
}
}
# Remove duplicates
if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) {
$hints = [ordered]@{}
foreach ($hint in $_.PerfHints) {
$hints[$hint] = $true
}
$vals["PerfHints"] = @($hints.Keys)
}
$result = New-Object PSCustomObject -Property:$vals
$result
}
filter ConvertTo-DefenderScanStats
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
Count = $_.Count
TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw
MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw
AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw
MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw
MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats')
}
$result
}
[scriptblock]$FriendlyScannedFilePathStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
}
}
filter ConvertTo-DefenderScannedFilePathStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedPathsStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
Folder = $this.Folder
}
}
filter ConvertTo-DefenderScannedPathsStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedFileExtensionStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Extension = $this.Extension
}
}
filter ConvertTo-DefenderScannedFileExtensionStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats')
}
$result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
[scriptblock]$FriendlyScannedProcessStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
ProcessPath = $this.ProcessPath
}
}
filter ConvertTo-DefenderScannedProcessStats
{
param(
[bool]$Raw
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats')
}
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Extensions)
{
$result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@(
$_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
<#
.SYNOPSIS
This cmdlet reports the file paths, file extensions, and processes that cause
the highest impact to Microsoft Defender Antivirus scans.
.DESCRIPTION
This cmdlet analyzes a previously collected Microsoft Defender Antivirus
performance recording and reports the file paths, file extensions and processes
that cause the highest impact to Microsoft Defender Antivirus scans.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start at MinStartTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start before or at MaxStartTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end at MinEndTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end before or at MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview
#>
function Get-MpPerformanceReport {
[CmdletBinding()]
param(
# Specifies the location of Microsoft Defender Antivirus performance recording to analyze.
[Parameter(Mandatory=$true,
Position=0,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Location of Microsoft Defender Antivirus performance recording.")]
[ValidateNotNullOrEmpty()]
[string]$Path,
# Requests a top files report and specifies how many top files to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFiles = 0,
# Specifies how many top scans to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFile = 0,
# Specifies how many top processes to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerFile = 0,
# Specifies how many top scans to output for each top process for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerFile = 0,
# Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPaths = 0,
# Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used.
[ValidateRange(1,1024)]
[int]$TopPathsDepth = 0,
# Specifies how many top scans to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPath = 0,
# Specifies how many top files to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerPath = 0,
# Specifies how many top scans to output for each top file for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerPath = 0,
# Specifies how many top extensions to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerPath = 0,
# Specifies how many top scans to output for each top extension for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerPath = 0,
# Specifies how many top processes to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerPath = 0,
# Specifies how many top scans to output for each top process for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerPath = 0,
# Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensions = 0,
# Specifies how many top scans to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtension = 0,
# Specifies how many top paths to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerExtension = 0,
# Specifies how many top scans to output for each top path for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerExtension = 0,
# Specifies how many top files to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerExtension = 0,
# Specifies how many top scans to output for each top file for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerExtension = 0,
# Specifies how many top processes to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerExtension = 0,
# Specifies how many top scans to output for each top process for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerExtension = 0,
# Requests a top processes report and specifies how many top processes to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcesses = 0,
# Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcess = 0,
# Specifies how many top files to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerProcess = 0,
# Specifies how many top scans to output for each top file for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerProcess = 0,
# Specifies how many top extensions to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerProcess = 0,
# Specifies how many top scans to output for each top extension for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerProcess = 0,
# Specifies how many top paths to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerProcess = 0,
# Specifies how many top scans to output for each top path for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerProcess = 0,
# Requests a top scans report and specifies how many top scans to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScans = 0,
## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f)
# Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report.
# Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.
[ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')]
[string]$MinDuration = '0us',
# Specifies the minimum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinStartTime = [DateTime]::MinValue,
# Specifies the minimum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinEndTime = [DateTime]::MinValue,
# Specifies the maximum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
# Specifies the maximum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxEndTime = [DateTime]::MaxValue,
# Adds an overview or summary of the scans captured in the trace to the regular output.
[switch]$Overview,
# Specifies that the output should be machine readable and readily convertible to serialization formats like JSON.
# - Collections and elements are not be formatted.
# - TimeSpan values are represented as number of 100-nanosecond intervals.
# - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC).
[switch]$Raw
)
#
# Validate performance recording presence
#
if (-not (Test-Path -Path:$Path -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path
$psCmdlet.WriteError($errRecord)
return
}
function ParameterValidationError {
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[string]
$ParameterName,
[Parameter(Mandatory)]
[string]
$ParentParameterName
)
$ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'."
$category = [System.Management.Automation.ErrorCategory]::MetadataError
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName
$psCmdlet.WriteError($errRecord)
}
#
# Additional parameter validation
#
if ($TopFiles -eq 0)
{
if ($TopScansPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles'
}
if ($TopProcessesPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles'
}
}
if ($TopProcessesPerFile -eq 0)
{
if ($TopScansPerProcessPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile'
}
}
if ($TopPathsDepth -gt 0)
{
if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0))
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension'
}
}
if ($TopPaths -eq 0)
{
if ($TopScansPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths'
}
if ($TopFilesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths'
}
if ($TopExtensionsPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths'
}
if ($TopProcessesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths'
}
}
if ($TopFilesPerPath -eq 0)
{
if ($TopScansPerFilePerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath'
}
}
if ($TopExtensionsPerPath -eq 0)
{
if ($TopScansPerExtensionPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath'
}
}
if ($TopProcessesPerPath -eq 0)
{
if ($TopScansPerProcessPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath'
}
}
if ($TopExtensions -eq 0)
{
if ($TopScansPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopFilesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopProcessesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopPathsPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions'
}
}
if ($TopFilesPerExtension -eq 0)
{
if ($TopScansPerFilePerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension'
}
}
if ($TopProcessesPerExtension -eq 0)
{
if ($TopScansPerProcessPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension'
}
}
if ($TopPathsPerExtension -eq 0)
{
if ($TopScansPerPathPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension'
}
}
if ($TopProcesses -eq 0)
{
if ($TopScansPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopFilesPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopExtensionsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopPathsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses'
}
}
if ($TopFilesPerProcess -eq 0)
{
if ($TopScansPerFilePerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess'
}
}
if ($TopExtensionsPerProcess -eq 0)
{
if ($TopScansPerExtensionPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess'
}
}
if ($TopPathsPerProcess -eq 0)
{
if ($TopScansPerPathPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess'
}
}
if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies
[string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation
#
# Test dependency presence
#
[string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe"
if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand
$psCmdlet.WriteError($errRecord)
return
}
# assemble report arguments
[string[]]$reportArguments = @(
$PSBoundParameters.GetEnumerator() |
Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } |
ForEach-Object { "-$($_.Key)"; "$($_.Value)"; }
)
[timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration
if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0))
{
$reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks))
}
$MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime
$MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime
$ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime
if ($false -eq $ret.status)
{
return
}
[string[]]$intervalArguments = $ret.arguments
if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0))
{
$reportArguments += $intervalArguments
}
if ($Overview)
{
$reportArguments += "-Overview"
}
$report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json
$result = [PSCustomObject]@{}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result')
}
if ($TopFiles -gt 0)
{
$reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles)
}
}
if ($TopPaths -gt 0)
{
$reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths)
}
}
if ($TopExtensions -gt 0)
{
$reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions)
}
}
if ($TopProcesses -gt 0)
{
$reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses)
}
}
if ($TopScans -gt 0)
{
$reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans)
}
}
if ($Overview)
{
if ($null -ne $report.Overview) {
$reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw
$result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview
if (-not $Raw) {
$result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview')
}
}
}
$result
}
$exportModuleMemberParam = @{
Function = @(
'New-MpPerformanceRecording'
'Get-MpPerformanceReport'
)
}
Export-ModuleMember @exportModuleMemberParam
# SIG # Begin signature block
# MIIllgYJKoZIhvcNAQcCoIIlhzCCJYMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH
# 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mTCCGZUCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3
# RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq
# tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7
# EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/
# 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt
# SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC
# FygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL
# JZwfEO4YeUvzRyzBGzb6/QIGZbql/Em5GBIyMDI0MDIyMTA3MjkwOC4wMVowBIAC
# AfSggdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm
# MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgIT
# MwAAAeKZmZXx3OMg6wABAAAB4jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MjVaFw0yNTAxMTAxOTA3MjVa
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAtWO1mFX6QWZvxwpCmDabOKwOVEj3vwZvZqYa9sCYJ3TglUZ5N79AbMzw
# ptCswOiXsMLuNLTcmRys+xaL1alXCwhyRFDwCRfWJ0Eb0eHIKykBq9+6/PnmSGXt
# us9DHsf31QluwTfAyamYlqw9amAXTnNmW+lZANQsNwhjKXmVcjgdVnk3oxLFY7zP
# Baviv3GQyZRezsgLEMmvlrf1JJ48AlEjLOdohzRbNnowVxNHMss3I8ETgqtW/UsV
# 33oU3EDPCd61J4+DzwSZF7OvZPcdMUSWd4lfJBh3phDt4IhzvKWVahjTcISD2CGi
# un2pQpwFR8VxLhcSV/cZIRGeXMmwruz9kY9Th1odPaNYahiFrZAI6aSCM6YEUKpA
# UXAWaw+tmPh5CzNjGrhzgeo+dS7iFPhqqm9Rneog5dt3JTjak0v3dyfSs9NOV45S
# w5BuC+VF22EUIF6nF9vqduynd9xlo8F9Nu1dVryctC4wIGrJ+x5u6qdvCP6UdB+o
# qmK+nJ3soJYAKiPvxdTBirLUfJidK1OZ7hP28rq7Y78pOF9E54keJKDjjKYWP7fg
# hwUSE+iBoq802xNWbhBuqmELKSevAHKqisEIsfpuWVG0kwnCa7sZF1NCwjHYcwqq
# mES2lKbXPe58BJ0+uA+GxAhEWQdka6KEvUmOPgu7cJsCaFrSU6sCAwEAAaOCAUkw
# ggFFMB0GA1UdDgQWBBREhA4R2r7tB2yWm0mIJE2leAnaBTAfBgNVHSMEGDAWgBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
# JTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAC
# hlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29m
# dCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAA
# MBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG
# 9w0BAQsFAAOCAgEA5FREMatVFNue6V+yDZxOzLKHthe+FVTs1kyQhMBBiwUQ9WC9
# K+ILKWvlqneRrvpjPS3/qXG5zMjrDu1eryfhbFRSByPnACGc2iuGcPyWNiptyTft
# +CBgrf7ATAuE/U8YLm29crTFiiZTWdT6Vc7L1lGdKEj8dl0WvDayuC2xtajD04y4
# ANLmWDuiStdrZ1oI4afG5oPUg77rkTuq/Y7RbSwaPsBZ06M12l7E+uykvYoRw4x4
# lWaST87SBqeEXPMcCdaO01ad5TXVZDoHG/w6k3V9j3DNCiLJyC844kz3eh3nkQZ5
# fF8Xxuh8tWVQTfMiKShJ537yzrU0M/7H1EzJrabAr9izXF28OVlMed0gqyx+a7e+
# 79r4EV/a4ijJxVO8FCm/92tEkPrx6jjTWaQJEWSbL/4GZCVGvHatqmoC7mTQ16/6
# JR0FQqZf+I5opnvm+5CDuEKIEDnEiblkhcNKVfjvDAVqvf8GBPCe0yr2trpBEB5L
# +j+5haSa+q8TwCrfxCYqBOIGdZJL+5U9xocTICufIWHkb6p4IaYvjgx8ScUSHFze
# xo+ZeF7oyFKAIgYlRkMDvffqdAPx+fjLrnfgt6X4u5PkXlsW3SYvB34fkbEbM5tm
# ab9zekRa0e/W6Dt1L8N+tx3WyfYTiCThbUvWN1EFsr3HCQybBj4Idl4xK8Ewggdx
# MIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGI
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
# aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5
# MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciEL
# eaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa
# 4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxR
# MTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEByd
# Uv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi9
# 47SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
# ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
# /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY
# 7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco
# dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH
# 29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94
# q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcV
# AQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0G
# A1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQB
# gjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
# cGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgw
# GQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
# /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
# BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv
# ZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w
# TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRs
# fNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6
# Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveV
# tihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKB
# GUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoy
# GtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
# cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
# a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+
# k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0
# +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cir
# Ooo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEA
# oYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w
# KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk
# BgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxN
# aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAWm5lp
# +nRuekl0iF+IHV3ylOiGb6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA6X+AFzAiGA8yMDI0MDIyMTAzNDYzMVoY
# DzIwMjQwMjIyMDM0NjMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpf4AXAgEA
# MAcCAQACAh5yMAcCAQACAhFnMAoCBQDpgNGXAgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQEFBQADgYEAxGcZAoFeXbm0lSQcN8Ii+gQFo+lM2tRNqdOYlFFNPU7xJ4Lw9Y67
# jm2t9W//iJj6K88iWRalx/8BcaWPo729WgTLvx4YfmI6ypuIu4rOPlE+YdA7hnz/
# w0EFGCiyUWOWHvHsZkjbauU2GtBCp+N4bEb01+9j5pGQeTKaIyK6shQxggQNMIIE
# CQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw
# JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeKZmZXx
# 3OMg6wABAAAB4jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG
# SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCB8ktuaSiTkHlGMsDLd+eJk1xuWpAnK
# 3AHzWxyywJgJOTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICuJKkoQ/Sa4
# xsFQRM4Ogvh3ktToj9uO5whmQ4kIj3//MIGYMIGApH4wfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwIgQgip5HuJg0dybm
# 2DGucdSAdFUqvt3kdMKJWSPdl6NuwcYwDQYJKoZIhvcNAQELBQAEggIAVVucEcXx
# ySMHsYHgPC7skc+sQcQ7EFmXGs9NuQAD/ShwuDdASBA8mhTOYH1fVUlAoXgTifAu
# pLo8OA+h8R6K3ahZMbNTURgAKzXAlwFeyCpqwmjLYA9730U20FnMd++zlOJFBK/C
# rosaN6PNrcLWCpbCIVtlznGx+X33ILTO8WxhElSl6ttq6g4VarGwvpB9cDuqILIP
# xCYlXmlQuiQWzhb+cC2AziyC3XKiTwMbMSc9hlKnTOj1yBzywngrwTyJeBDCQb+n
# ZSOpjB40+IbCtIJ4CROkbbQnQ/ozJq0DZFf8cgb8HnOQ7DC/O6UIXQVkoIm5vOiI
# VjJtdLmZIHvDj259oBgWdhr3GHPji5an2ZVZ6vWiH3MgQ3qiCJIO5O6VgwD6RHpl
# JYDL8O6FntkuhhD1yGhaNQtAE9pX/pHTwdgroF4VIGR1YHaWiMygXZDduCwUgcXS
# Po8Y0AEFml1ajqgUspgPDLRuTSBCM1mlBt7SQbj0aF9K9O8DNLknHgOTgk+zbw0I
# iNwmXPOo8aQsXbNesF7hgYBHQb3+wUFV9KBu6vq0MCsiFAMo71sHRTvNtAhKtNoQ
# c0aYoxfY8EPWX87iNKSct3eZTMMk8K1sBcuCG2F37ESWbiLiFJVpAM9yN10sOTNO
# Ls9C9ghKwvUpEDxB9PBpQjPkQ3exnOTrNtY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_27_46.ps1
|
sample_27_46.ps1
|
@{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ
# gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b
# 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAXspH6BNY7nbQAAzC1kvWt9mAW2aV64hI290LtAjJOjj9tyjJNAREJUod
# Ti94rwhNCwq2Qpv0KJBSuHJ1XYbEkLboaiEPI/5smx7L4A+eGYgZ0dGNoCpVWYpe
# FgCRxD0fAmKZ8Ed3S54uX3J+EfpMXkrPhjkfKNvropz0oK7MeUXy74sWd1lUaIpQ
# 5smOjzDyQijq8o2dIo6S2GoxZiRcq8wgpT0UY7lhySgmkFFZiU5CUm7xEkHB0rWR
# TpDsR3r6kTAX9miBICR+sR/V6zs03MTba8DNLXGLxKq0pdHkclj8ohNFmYDsjewl
# /irOwKDbn8oN3G2ptSd59iFx7s5GoqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBghnvISx3TWuYdWp0s1Tt43KKzwQFCwn2wxdlvF7cmhwIGZc4rEAPw
# GBMyMDI0MDIyMDE4MTg0My45OTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz
# CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd
# seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x
# Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+
# TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ
# sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9
# f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP
# aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja
# VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn
# WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9
# 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw
# qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema
# ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo
# ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5
# EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+
# xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7
# ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH
# u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ
# 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1
# 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN
# ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh
# y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0
# SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu
# HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X9A8TAiGA8yMDI0MDIyMDE1MTcw
# NVoYDzIwMjQwMjIxMTUxNzA1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpf0Dx
# AgEAMAoCAQACAgjVAgH/MAcCAQACAhOtMAoCBQDpgJJxAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAE+gQPeZ+1/8UmDTu/iwG2OPrgCoLD4sJulVcxKqKOTS
# 7Ezst3KQTTif6AAf14TBO7QucyoofmwOoWOnDH/6j6VREPUxNxvxwtB1pmpHdIvj
# 5tN9HaSDg3DuaQIWdx9xlAlEIHlqwNwUloanyqAJQoht7StV8PigjykbwUdUz6I4
# A/ahhVP/fpF2LCZ0XfRfdLSpSSNOfhtdiKbqeZ81G1mtA62ZqpE2kgyjzOzAXqTS
# /HDs2qxc1q4cGHBSjHr11I2VxKUzHds8XtxAFl1JoNInmbr4lZn+wqMY0NvW1Lgm
# 9kj7CesrwN1DmUZ7+veolNirH3+N2RMYyhHPjqA/YPMxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB
# 7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCByoVvnou+zXqw6phSC4HAOYSmV+42kKco0+gAG6bN6
# sTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrI
# wrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgTN+DWnwSIDCPoA2pkntJYGyJ
# qZnJLcOa/o4e8mNk6gYwDQYJKoZIhvcNAQELBQAEggIAbc40VIkIDzagsbmb2xgR
# S8kxINu/NahK4zni3ONZgLy/DPxAqOqosbMM0t3QYLuNVVG3te2SyUOpwO+Tuq0Z
# 7Kt0dbbl06mWW7z2lMs0tHCEPOO8gC334pWdC+X5oZdLk4YULFdDd1ajruzS2QxG
# MBEh3ZTEKelno1CpI87nzTi5Z2yumud2HZq0pEftBt86TNUbEz3aW30GvgbOmIlB
# yuQDbibTvdVChERgyWtNERAWPN8HEtu5aqC3m/TY/rg1n2+u3OY3MwJb7clMwNyT
# WOrOvYJ+EZKB76SJ89yAWcxeCHyU1ezWe17vePB/k5BsrAgwT+yw/AJ/GdSLFlth
# RL64ortCDT+4blTDK0TMwpwwCDGhCPdgKv4+vIf0Vn4bnqBj4Jq9PtZz5ZiGtkh6
# u0TfOfnmcDUms7O3PyYD7NopWHBv7OHHmdArKHVXi7plH7RCMECUJBDjEZAJL9po
# 1vewhLK5hUabdqLI7v7D9jqK2ETpLwBbtIWIqZ6z9Wy4NjDIms8G8TM6em2S73ep
# s/pCaS5OkWndFCfYaFCgIU4yc1l97jvZ3ONwmuHIvPccRNa1IlIrmkbTaWp/g2oZ
# SRpOB4pTd1QXB4Qmd/qIYh6J9sN2cEJr9vHn9QUg09WQyV09pGBVyaOpY+A/Vn2L
# 6jGFLrwUehFqUcOnh71Qz5A=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Move-VMThin SVMotion.ps1
|
Move-VMThin SVMotion.ps1
|
function Move-VMThin {
PARAM(
[Parameter(Mandatory=$true,ValueFromPipeline=$true,HelpMessage="Virtual Machine Objects to Migrate")]
[ValidateNotNullOrEmpty()]
[System.String]$VM
,[Parameter(Mandatory=$true,HelpMessage="Destination Datastore")]
[ValidateNotNullOrEmpty()]
[System.String]$Datastore
)
Begin {
#Nothing Necessary to process
} #Begin
Process {
#Prepare Migration info, uses .NET API to specify a transformation to thin disk
$vmView = Get-View -ViewType VirtualMachine -Filter @{"Name" = "$VM"}
$dsView = Get-View -ViewType Datastore -Filter @{"Name" = "$Datastore"}
#Abort Migration if free space on destination datastore is less than 50GB
if (($dsView.info.freespace / 1GB) -lt 50) {throw "Move-ThinVM ERROR: Destination Datastore $Datastore has less than 50GB of free space. This script requires at least 50GB of free space for safety. Please free up space or use the VMWare Client to perform this Migration"}
#Prepare VM Relocation Specificatoin
$spec = New-Object VMware.Vim.VirtualMachineRelocateSpec
$spec.datastore = $dsView.MoRef
$spec.transform = "sparse"
#Perform Migration
$vmView.RelocateVM($spec, $null)
} #Process
}
|
combined_dataset/train/non-malicious/Robocopy Wrapper.ps1
|
Robocopy Wrapper.ps1
|
function Copy-Robocopy
{
param
(
[Parameter(Position=0, Mandatory=$true)]
[String] $Source,
[Parameter(Position=1, Mandatory=$true)]
[String] $Target,
[Parameter(Position=2, Mandatory=$false)]
[String[]] $Files = @("*.*"),
[Parameter(Position=3, Mandatory=$false)]
[String] $Options = ""
)
# Result
$Result = @{
"Params" = @{}
"Timing" = @{}
"Result" = @{}
}
# Define Log File
$LogFile = $ENV:TEMP + "\\Robocopy." + (Get-Date -UFormat "%Y%m%d.%H%M%S") + "." + (Get-Random -Minimum 1000 -Maximum 9999) + ".log"
# Remove Wrong Options
$Options = $Options.Replace('/NJH', "")
$Options = $Options.Replace('/NJS', "")
# Start Process
$Duration = Measure-Command { Start-Process -FilePath 'ROBOCOPY' -ArgumentList ('"' + $Source + '" "' + $Target + '" "' + [String]::Join('" "', $Files) + '" ' + $Options) -RedirectStandardOutput $LogFile -NoNewWindow -Wait }
# Import Robocopy Log
$Robocopy = Get-Content -Path $LogFile
# Line Numbers
$LineHeaderFirst = (0..($Robocopy.Count - 1) | Where-Object { $Robocopy[$_] -eq "-------------------------------------------------------------------------------" })[0]
$LineHeaderLast = (0..($Robocopy.Count - 1) | Where-Object { $Robocopy[$_] -eq "------------------------------------------------------------------------------" })[0]
$LineFooterFirst = (($Robocopy.Count - 1)..0 | Where-Object { $Robocopy[$_] -eq "------------------------------------------------------------------------------" })[0]
$LineFooterLast = ($Robocopy.Count - 1)
# Result Params
$Result["Params"]["Source"] = ([String]($Robocopy[$LineHeaderFirst + 5].Split(":", 2)[1].Trim()))
$Result["Params"]["Target"] = ([String]($Robocopy[$LineHeaderFirst + 6].Split(":", 2)[1].Trim()))
$Result["Params"]["Files"] = ([String]::Join(", ", (($LineHeaderFirst + 8)..($LineHeaderLast - 4) | ForEach-Object { $Robocopy[$_].Split(":", 2)[-1].Trim() })))
$Result["Params"]["Options"] = ([String]($Robocopy[$LineHeaderLast - 2].Split(":", 2)[1].Trim()))
# Result Timing
$Result["Timing"]["Duration"] = ([String]($Duration))
$Result["Timing"]["Started"] = ([String](Get-Date -Date $Robocopy[$LineHeaderFirst + 4].Split(":", 2)[1].Trim()))
$Result["Timing"]["Ended"] = ([String](Get-Date -Date $Robocopy[$LineFooterLast - 1].Split(":", 2)[1].Trim()))
# Result Result
for ($Line = ($LineFooterFirst + 3); $Line -le ($LineFooterFirst + 6); $Line++)
{
$Key = $Robocopy[$Line].Substring(02,07).Trim()
$Result["Result"][$Key] = @{}
for ($Col = 10; $Col -le 60; $Col += 10)
{
$Title = $Robocopy[$LineFooterFirst + 2].Substring($Col, 10).Trim()
$Title = $Title.Substring(0,1).ToUpper() + $Title.Substring(1).ToLower()
$Result["Result"][$Key][$Title] = $Robocopy[$Line].Substring($Col, 10).Trim()
}
}
# Return
return $Result
}
|
combined_dataset/train/non-malicious/5a74e43a-a30a-486b-a5a6-349644cb654a.ps1
|
5a74e43a-a30a-486b-a5a6-349644cb654a.ps1
|
#You'll need admin perms on all the servers to run this...
Write-Host "ComputerName in White, then Local Groups in Green, Local Groups' Members in White"
#This feeds the script a list of server names (ServerList.txt, placed in the same directory)
#for which I want the Local Groups and all those groups' Members.
$x = Get-Content ServerList.txt
# this feeds each servername, one by one, into the process...
foreach ($j in $x) {
#The server name becomes variable $strComputer
$strComputer = "$j"
#The Server name then becomes the variable $strComputer, and its name
#is printed out in all CAPS
$computer = [ADSI]("WinNT://" + $strComputer + ",computer")
$g = $computer.name.ToString()
$g.ToUpper(); " "
#The local security groups on the Server is then found,
#and fed to the array $a
$group = $computer.psbase.children | where{$_.psbase.schemaclassname -eq "group"}
$a = @()
foreach ($member in $group.psbase.syncroot)
{$a += $member.name }
#Each Local Group Member is then printed (in white,and with a space) underneath its Group's name
#(Group name printed in green)
foreach ($i in $a) {
$group =[ADSI]"WinNT://$j/$i"
Write-Host "$i" -fore green
$members = @($group.psbase.Invoke("Members"))
$members | foreach { Write-Host " ",$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)}
}
Write-host " "
Write-host " "
Write-host " "
}
|
combined_dataset/train/non-malicious/ESXiMgmt module sample 3.ps1
|
ESXiMgmt module sample 3.ps1
|
#######################################################################################################################
# File: ESXiMgmt_machines_poweroff_sample.ps1 #
# Author: Alexander Petrovskiy #
# Publisher: Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com #
# Copyright: © 2011 Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com. All rights reserved. #
# Prerequisites: The module was tested with Vmware ESXi 4.1 U1 on the server side and #
# Vmware PowerCLI 4.1 U1 #
# plink.exe 0.60.0.0 #
# Usage: To load this module run the following instruction: #
# Import-Module -Name ESXiMgmt -Force #
# Please provide feedback in the SoftwareTestingUsingPowerShell.WordPress.Com blog. #
#######################################################################################################################
param([string]$Server,
[string]$User,
[string]$Password,
[string]$DatastoreName,
[string]$MachinePrefix,
[int]$OperationTimeout
)
# USAGE: .\\ESXiMgmt_machines_poweroff_sample.ps1 192.168.1.1 root 123 datastore3 XPSP2 10
cls
Set-StrictMode -Version Latest
Import-Module ESXiMgmt -Force;
Connect-ESXi -Server $Server -Port 443 `
-Protocol HTTPS -User $User -Password $Password `
-DatastoreName $DatastoreName;
$VerbosePreference = [System.Management.Automation.ActionPreference]::Continue;
$VMs = Get-VM *
foreach($vm in $VMs)
{
if ($vm.Name -like "$($MachinePrefix)*" -and `
$vm.PowerState -eq 1) #PoweredOn
{
Write-Verbose "$($vm.Name) is stopping";
Stop-ESXiVM -Server $Server `
-User $User -Password $Password `
-Id (Get-ESXiVMId $vm);
sleep -Seconds $OperationTimeout;
}
}
Disconnect-ESXi
# to restart virtual machines instead of shutdown them
# simply call the ESXiMgmt_machines_poweron_sample.ps1 script:
# USAGE: .\\ESXiMgmt_machines_poweron_sample.ps1 192.168.1.1 root 123 datastore3 host1ds3 XPSP2 300
|
combined_dataset/train/non-malicious/sample_58_72.ps1
|
sample_58_72.ps1
|
@{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K
# unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3
# 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVfJ1ILiIhHa334FkEGyThAKw4Uxh4Ma9O6/FkNz2Gqc3x/tho9yTLI1Q
# N/AneW+ULsb3H37YAKrBCJrDtzhz2OMgAjiZKA9Lifc4lwZAs1sd2Zf6/kDBKLed
# pTWdMX4lcgqSjGRXDlXg2PHQZxSkL338yQqcHGqXp5UVN2tRNfmyrfUI0QsDztLe
# aVV0pe/gQKEZDGT7lJrGUkuGhJF/sdBM6vk8GITG7zws6MkvNhWlrxVp3EUz5Cl/
# mHeYldjCgflhnT1JRIqFpkIBq9ycwvmLuVGswJ7oYfPv66Lq/eDCTKprx0nND3Nz
# DInWgWetIXPB50DZuke+gahaHfC49aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCzJOs/FZX9ZlLhlluLF1pb/dOVfZC5cEes0rrG4txjAwIGZkXwf3mV
# GBMyMDI0MDYxMzAzMjE0My4yNTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hSuNDAiGA8yMDI0MDYxMjIzMzEw
# MFoYDzIwMjQwNjEzMjMzMTAwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFK40
# AgEAMAcCAQACAhzxMAcCAQACAhONMAoCBQDqFf+0AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBABAuYguPMidY9IQ12NdIKL3WDNmh2a8R0r6YLsCfz60P4dn5
# 9cKQKDMFxcoe6vR8yhniFlgCP5ZoaOvQfveZCJtImb+kNevTS4+LKjbCXnX/Cxj8
# prEywCleY3qnhfE8WCZEEFWdIblwN62k43CJOkw8CqK6MxbXcIQaHMgaRwJ2eD4B
# 5DBcRRewj7UNplZQE3BoYruC+Ox5upozY+z+x07TvYEZq9yzEDCnhStE+Fgft2uc
# HFnTWSTCcj3FrWy89MO4x7/vg2zKl4CXu/zWJ/BPlMFqXxL9mp+DYrMNOjYcGDvs
# gNm1NrAfLoFJWDf/PUKF9cOgdsK5fE/EpDhyy3UxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAZjVvWv0yZElvadKOjA2KJHD8fAdsXonk2zJiIwqdFNjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgMMw2VuPSoE7p6mVCdjxgFZzvQHCr
# mI2TiclrRCVLYwkwDQYJKoZIhvcNAQELBQAEggIADFwXZAql+ynNwiuxwTihMb0e
# GWcyujphB/wPYlO3CkCYkETYtzmronFPeNgM0FUam9GAYq7UqatQ/eaez2WqclXc
# x8lSVmRGt2BVep1tcoNx5bGyF4lkVJC4BKU+3TumZVmIH0hX9TWPSx1ANnrsvWnJ
# gcefVJDigLSLJIBcjlpBdVCgGt3Ke1oR7aiJzqTyLPBWrtioNvsBVsBTvtM8Dgob
# EYTxQwkCZm3r2vKfB8jZu1Hu5nGrBka/xVZbzG9T4UcjXLSaZL2kOgyqGUl+rLSa
# XWPXGBnyXYBhWwfDrYZI9LalHfWjbGDkX0jhs1uri60xfvF5o37uUnUSW4gilsiT
# wWerU0wLwDIopt3LcqC7tmGQpcqjcDMojRSv6cgzPip4CcMynYPZawLaqxv48MJq
# HyV4TVH1Ltj587BnrtO2oisrvUyAZMlBWOq1aAUXzju0468G25Ck0hS5mGQdO33C
# 4gczgedIZI21Jft8806MTVE5JXD4V06ZFRNIzaQAay7Ww4sl5gWHrrhYph5v7mf6
# /I4O1R2mhRAKpeqqXu79Uv4hy7W7fezFCGonNvbcran4kPNcQLY/4WiaXnBo6ume
# +K+IqQy3pSjkGqsbCY5+YrtC1dGngdFQeWNr6xeVO5OlhPbhgqNuisAz3WK0wd/N
# k3WLKV7BMU1y9mVpvCo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_5.ps1
|
sample_49_5.ps1
|
#
# Module manifest for module 'OCI.PSModules.Oce'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Oce.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Oce Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList',
'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList',
'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList',
'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance',
'Remove-OCIOceInstance', 'Update-OCIOceInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_66_90.ps1
|
sample_66_90.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
API to register a new machine and thereby create a tracked resource in ARM
.Description
API to register a new machine and thereby create a tracked resource in ARM
#>
function Connect-AzConnectedMachine {
[CmdletBinding()]
param(
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')]
[System.String]
# The name of the resource group you want to add the machine to.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the subscription you want to add the machine to.
${SubscriptionId},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Body')]
[System.String]
# The location for the created ConnectedMachine.
${Location},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Path')]
[System.String]
# The name that will be used for this machine. The hostname is used by default.
${Name},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Alias('Session')]
[ValidateNotNull()]
[System.Management.Automation.Runspaces.PSSession[]]
# When specified, the command that onboards machines to Azure will be run within each PSSession. NOTE: This only works on Windows for now.
${PSSession},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.ITrackedResourceTags]))]
[System.Collections.Hashtable]
# Resource tags.
${Tag},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
try {
$Account = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureRmProfileProvider]::Instance.Profile.DefaultContext.Account
$Env = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureEnvironment]::PublicEnvironments[[Microsoft.Azure.Commands.Common.Authentication.Abstractions.EnvironmentName]::AzureCloud]
$TenantId = [Microsoft.Azure.Commands.Common.Authentication.Abstractions.AzureRmProfileProvider]::Instance.Profile.DefaultContext.Tenant.Id
$PromptBehavior = [Microsoft.Azure.Commands.Common.Authentication.ShowDialog]::Never
$Token = [Microsoft.Azure.Commands.Common.Authentication.AzureSession]::Instance.AuthenticationFactory.Authenticate($account, $env, $tenantId, $null, $promptBehavior, $null)
$AccessToken = $Token.AccessToken
} catch {
throw 'Error retrieving access token. Are you logged in? (Run Connect-AzAccount)'
}
if (!$AccessToken) {
throw 'Error retrieving access token. Are you logged in? (Run Connect-AzAccount)'
}
$azcmagentArgs = [System.Collections.Generic.List[string]]@(
'connect'
'--access-token'
$AccessToken
'--tenant-id'
$TenantId
'--subscription-id'
$SubscriptionId
'--resource-group'
$ResourceGroupName
'--location'
$Location
)
if ($Name) {
$azcmagentArgs.Add('--resource-name')
$azcmagentArgs.Add($Name)
}
if ($Tag) {
$azcmagentArgs.Add('--tags')
# Build tag string
$tagStrings = foreach ($key in $Tag.Keys) {
$t = $key
if ($Tag[$key] -and $Tag[$key].GetType() -eq [string]) {
$t += "=$($Tag[$key])"
}
$t
}
$azcmagentArgs.Add([string]::Join(',', $tagStrings))
}
$script = {
if ($IsMacOS) {
throw "Registration doesn't work on macOS. Only Linux and Windows are supported."
}
if ($IsLinux) {
# Download the installation package
Invoke-RestMethod -Uri https://aka.ms/azcmagent -OutFile ~/install_linux_azcmagent.sh -UseBasicParsing
# Install the hybrid agent
$installArgs = if ($Proxy) {
'--proxy', $P.ToString()
} else {
@()
}
bash ~/install_linux_azcmagent.sh @installArgs | ForEach-Object {
Write-Host $_
}
# Set executable path
$azcmagentPath = "azcmagent"
} else {
Invoke-RestMethod -Uri https://aka.ms/AzureConnectedMachineAgent -OutFile AzureConnectedMachineAgent.msi -UseBasicParsing
# Install the package
msiexec /i AzureConnectedMachineAgent.msi /l*v installationlog.txt /qn | ForEach-Object {
Write-Host $_
}
if ($Proxy) {
[System.Environment]::SetEnvironmentVariable("https_proxy", $Proxy.ToString(), "Machine")
}
# Set executable path
$azcmagentPath = "$env:ProgramFiles\AzureConnectedMachineAgent\azcmagent.exe"
}
# Run connect command
if ($IsLinux) {
sudo $azcmagentPath @args | ForEach-Object {
Write-Host $_
}
} else {
& $azcmagentPath @args | ForEach-Object {
Write-Host $_
}
}
if ($LASTEXITCODE -ne 0) {
throw "azcmagent exited with a non-zero exit code: $LASTEXITCODE"
}
$showResult = if ($IsLinux) {
sudo $azcmagentPath show
} else {
# Windows
& $azcmagentPath show
}
# Combine the output into one string
[string]::Join("`n", $showResult)
}
if ($PSSession) {
$scriptWithUsings = {
if ($IsLinux) {
Write-Error "Linux PSSessions are not supported because PowerShell doesn't support sudo password prompts over PSSessions. (PowerShell issue #1527)"
return
}
$Proxy = $using:Proxy
$script = $using:script
Invoke-Command -ScriptBlock ([scriptblock]::Create($script)) -ArgumentList $args
}
$showResult = Invoke-Command -ScriptBlock $scriptWithUsings -Session $PSSession -ArgumentList $azcmagentArgs
} else {
$showResult = & $script $azcmagentArgs
}
# Handle show result by getting the name and getting the machine object
$showResult | ForEach-Object {
# Get name of machine registered
$selectStrResult = $_ | Select-String -Pattern "^Resource Name\s+: (?<resourceName>.*)\n"
$Name = $selectStrResult.Matches.Groups |
Where-Object Name -EQ resourceName |
Select-Object -ExpandProperty Value
# Return the ConnectedMachine object.
Get-AzConnectedMachine -Name $Name -ResourceGroupName $ResourceGroupName -SubscriptionId $SubscriptionId
}
}
# SIG # Begin signature block
# MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAviGcSnDOVecYN
# v6UEFSZZX/njqI30dP5bffsgAJKTlaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICXI
# oS+cAqkbsjX64ZG3hDb/toRSHxt51jKxJVfVePh6MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAHbq20JXDe6rK/Vg7sCEgE10XgwRl1CiQ8vc4
# bBWO1FR0BkaIJU0rHwI95DEoD2H5Bd8RDk9LVazdSAGjH4GHnENOhSDQrj0blocw
# wsW8WdYQ5qYihKAy/0A4HOdcbvz153ZsrvdkdZq2ZLB8ao+/xiPGkudoYsrIQTLC
# Rai82rf2F+i76V0cLBzXmFn0FRCE8g4EZXn7+G0BPJ7UvvReR9hDBMebKZe5/qu3
# kleYiZG9Ur/Uv6TsLNBhe1hpxxoAiaGAUGIXIZzrtOJ8gD7Tu17f8Mdy2OpVYSlb
# y8uL4FOsHVF8U/tsmK1c96yXNsf6+n2HqL9TrLAlUut+upfN0KGCFywwghcoBgor
# BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBWFR66bWE4kmWU+LbrHGyrFJIhvpHKwPNr
# 572LgXBofgIGZlPWmKseGBMyMDI0MDUyOTA1NDEyMS40ODZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkie
# lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB
# 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU
# IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo
# KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn
# vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2
# RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9
# OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS
# qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1
# G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++
# 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy
# k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK
# IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu
# y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X
# EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi
# D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S
# QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY
# huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7
# 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg
# Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r
# rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg
# 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH
# doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy
# 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOoA9/MwIhgPMjAyNDA1MjkwODQwMTlaGA8yMDI0MDUz
# MDA4NDAxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6gD38wIBADAKAgEAAgIM
# uAIB/zAHAgEAAgISjTAKAgUA6gJJcwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA
# A4GBAIEUqCR84pJJqoTCVd9uZNjk7+SK2bzodtyDoYMxv3ZZJi/nn7fGeogtCjR5
# +R6P+ko6e4Niq774YCDLDIewP26eu055sArtr0wHt/UKWIoWCSa9LUsvc5vrNQYB
# nZURI0DRkLz/27nFQckYSzsEwTK3fBKs1DCsGzvChMLzojh0MYIEDTCCBAkCAQEw
# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0A
# AQAAAd4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B
# CRABBDAvBgkqhkiG9w0BCQQxIgQgaGI6iB+4CdVgQvQBUItTRlZk9MLIZUS+DVmX
# 8dbEAWcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/m
# C3MgrT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIGucVMt0tqgotrpNH0qI
# ipz8e4uJs49SUZGgKgoC+kXxMA0GCSqGSIb3DQEBCwUABIICABWukE59j35DzDdw
# Pbfvu3Eur4N7Dfmt5m8OoJD4+VSQIBYqWclb9W8Y0PdQZcTyVB/67tH3jpMISQLZ
# QAY0CuAYFAEfrztHGWfz630OsFy2wvXtH+TLoLPKaSmrfTIxwWc27aVDmUwHvf2L
# jFF+Az2USJlwqRsju244gCjSbLJGCuKVLaasNATzcKkmuPv4OnvoEvocVDtVWMAB
# S0Gv6MKBbomp1+Cc6aYhrIFHY6a3c4B3RXZdN1asYEoXw4qaCbF74jrvtK+NqdpW
# KpAO+nsZsX5cuyffB55uoOsN+Dwkcg7jGjGI7gD/TDnn3t5/ZwFARjqlT8dFex0s
# 6sS3yftkJCsOXqvKTQ664CWRrEZH56bqg1vnrtF8zYTwhGR7U7kjQImn1bh1xlR1
# xL8oVf/Z7C4S4I0Yv7JJcZBV64Q+AwHp5IAtLmZhkaES3myz3rWUJbE1gBU3n2DU
# Qc3HvKNXR8AySrLk5Rc6M5jqDVMC59Hngob9jRbuF4F+/IMVCffIxLhVj61Aox35
# 5rm5xOva8ls4zXNrfzywZPN3ZGa4X9S38GsT0wcBX9CsqAcdVJBg/aIIS+rdGgbq
# abYwKbKmZwp3+cUSeI75Fi3G0GELm5XEr3HAAfFffTZ4wDNrAzZw4nYFsTn8kyHm
# 6xI8g76QZGeyLOnNbOCPg9Uo0T4F
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_41_5.ps1
|
sample_41_5.ps1
|
# <copyright>
# INTEL CONFIDENTIAL
#
# Copyright 2022 Intel Corporation
#
# This software and the related documents are Intel copyrighted materials, and your use of
# them is governed by the express license under which they were provided to you ("License").
# Unless the License provides otherwise, you may not use, modify, copy, publish, distribute,
# disclose or transmit this software or the related documents without Intel's prior written
# permission.
#
# This software and the related documents are provided as is, with no express or implied
# warranties, other than those that are expressly stated in the License.
#
# <copyright>
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")]
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "", Scope="function")] Param()
#.ExternalHelp IntelEthernetCmdlets.dll-Help.xml
function Get-IntelEthernetSetting
{
[CmdletBinding()]
Param(
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$Name = '',
[parameter(Mandatory = $false, Position=0, ValueFromPipeline = $true)]
[ValidateNotNullOrEmpty()]
[object[]]
$Adapter = $null,
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$DisplayName = '',
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$RegistryKeyword = ''
)
Begin
{
$AdapterName = $Name
$script:ErrorMessagesGet = @()
$script:WarningMessagesGet = @()
$FinalObject = @()
GetIntelEthernetDevices @('icei*', 'i40ei*')
if ($script:SupportedAdapters)
{
$script:MSNetAdapters = Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue
}
$script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue)
}
Process
{
$Adapters = $Adapter
$PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesGet)
$AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesGet))
do
{
if (!(ValidateSettingParams $DisplayName $RegistryKeyword))
{
break
}
foreach ($a in $AdapterNamesArray)
{
$TmpStatusMsg = CheckDeviceError $a
if (-not [string]::IsNullOrEmpty($TmpStatusMsg))
{
$script:WarningMessagesGet += $TmpStatusMsg
}
$FinalObject += GetAdapterSettings $a $DisplayName $RegistryKeyword
}
} while ($false)
}
End
{
$FinalObject | Sort-Object -Property 'DisplayName'
foreach ($WarningMessage in $script:WarningMessagesGet)
{
Write-Warning $WarningMessage
}
foreach ($ErrorMessage in $script:ErrorMessagesGet)
{
Write-Error $ErrorMessage
}
}
}
function ValidateSettingParams($DisplayName, $RegistryKeyword)
{
$result = $true
if (-not [string]::IsNullOrEmpty($DisplayName) -and -not [string]::IsNullOrEmpty($RegistryKeyword))
{
$script:ErrorMessagesGet += $Messages.InvalidParams
$result = $false
}
return $result
}
# SIG # Begin signature block
# MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAvC0HuIwgJYKI6
# Wrabiy8hSC7k79LdToDq4slv1BTRdqCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU
# jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM
# EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy
# dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG
# EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv
# IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s
# hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD
# J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7
# P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme
# me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz
# T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q
# RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz
# mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc
# QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T
# OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/
# AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID
# AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD
# VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV
# HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE
# VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v
# ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE
# KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI
# hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF
# OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC
# J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ
# pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl
# d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH
# +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio
# kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD
# VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv
# ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5
# NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs
# BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi
# MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw
# hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl
# wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo
# PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND
# brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62
# 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME
# Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx
# G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6
# zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud
# IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE
# osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT
# BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw
# SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv
# UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI
# KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv
# ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl
# Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS
# /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3
# ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT
# s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp
# GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr
# OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb
# MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN
# r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt
# CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF
# 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG
# 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim
# VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ
# KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt
# aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW
# IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF
# EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT
# CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv
# cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN
# AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8
# FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR
# MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA
# tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9
# HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB
# wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b
# H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD
# jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr
# hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS
# QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj
# MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF
# BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0
# dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG
# Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n
# Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v
# Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu
# Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE
# JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG
# 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh
# NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa
# UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw
# FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP
# Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M
# c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ
# YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV
# k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB
# XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE
# ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl
# IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC
# AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIIKCQTBdpraRCCdL8CZuiYaJ
# OAa9VSX2ZccE36RD8ovLMA0GCSqGSIb3DQEBAQUABIIBgEUD3iPBQugWayIb5tgV
# lKl6JXcMXh0s1RILk0TeYxOtnzEme/fbdRQvQdna5e7TIoxon8kPrsW7x6YsWG9q
# BZiU68cwpjso+ID0OIOaB5bDI5GvZWznsEzTWj8MSkOXk0WnGkgMAvTRF7mUsAFQ
# 8oSAkOxBUo64IV8qqnjYmkeCcHYNuS6JMrMzCPLFlfbxM8pfb06EnvDYM5ha917E
# 2TvQwpl8qXduXjvNAz2sJBxoRE5wQZoHpQ59EAvD9OJoWwCbhizZDmzozOPNP536
# dcb1YHTt48a+V26pnhIU4QYmcmRZy6BUpsBui11tbjj8gYdTuUNC0oAYpL/5WCD7
# WQU46ehtPFalk+GCcSx3HcR02t8Td7OARHW0U0PR052eA1gq5WsA29ozYZgzg12+
# wLDvbhwNL+/Rvd4LEzgxWlOSfX5VVmFfh84pOtfpugpTlGZiNGa4cf//EzskLBPA
# 6leh0efYUySSYxr9m3CwDWVFT4ZzWWBQKKJHyYBIfy1J2qGCE08wghNLBgorBgEE
# AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD
# BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw
# DQYJYIZIAWUDBAIBBQAEIBW3nH3iGqIibbC24f0WRYPkYriHv8DnThXTRyC1Wgd2
# AhUA+JQENxg5j8VN8gSDKVe4orMTn20YDzIwMjQwMzE4MTgyMzUzWqBupGwwajEL
# MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp
# Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT
# aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq
# hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j
# aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0
# ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw
# NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE
# CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD
# DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk
# is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB
# IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc
# rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN
# 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7
# HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl
# TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY
# B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re
# DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE
# qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT
# cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP
# 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf
# BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD
# AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g
# BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0
# aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j
# cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr
# BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v
# U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov
# L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD
# Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf
# +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66
# kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s
# IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1
# RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T
# jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01
# 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA
# bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP
# jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV
# Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8
# KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2
# p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l
# dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF
# UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh
# dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE
# pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0
# RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray
# cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv
# f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi
# nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1
# r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F
# GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs
# dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm
# /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA
# V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID
# AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD
# VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV
# HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw
# BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j
# b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB
# BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v
# VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v
# Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB
# kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk
# VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w
# QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb
# sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB
# c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah
# c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M
# 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0
# PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x
# uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx
# py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu
# tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC
# R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y
# ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT
# QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC
# AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF
# MQ8XDTI0MDMxODE4MjM1M1owPwYJKoZIhvcNAQkEMTIEMFk7x7Wi6gxYv8Tg/xlT
# +nAPs+J87Iso5NWEpLs3R2PHHQBIfnkzsnUYUGnm18iMRTCB7QYLKoZIhvcNAQkQ
# Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB
# VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV
# U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp
# Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF
# AASCAgAXHS47lC5AslVEPDnPdCea52i+1jETBskbJ+GxEHMQe0R24ig/FGEDmHgW
# 1bVwNrwLWTqSfZqwxsQdnIxGcGb4cYOOR+DLHU69mLL9reBQ4/Sits3pPEBH/cSp
# hZ/3tc+feda4IiS5vjR/rHzAsHL5Q29wTlvxiOX+gz8E5B4AkNGlZ8uGIHYQ48sz
# mf+Z5RvsRdkcBRLFeo8KYkGe+cDBBWYo87qLaIjauIpEyZ/BfdV9b/fxfXMOIr3y
# ETF0nZ6TDt+Z3aUd3J3GLyGlKkVUkJfgrM8CMWbkxtH7OOGHeQlE+E3S5nGrF0HT
# c/bv6jH2xX3fXkYoaNFEgOeD42GjEeTLsrv+ZAydIYP4QRjSXeBD8tVOkbUwlgEq
# zx3yXRBxmTyorjTUTL3m+puNAKtDfOtxdnTsnHqIMhTyQFUW99RS0W3eSRY/bMSG
# AywqzITiHwx9G/6hT9PP0dluDzIjBo30aoIXaMYqjfb9sUSnjsKrwCm4ulpMiYPY
# PNxHaIN9nmGyaneZZD7abZUbFcZgSTKj2FBI551pmdEGtYWYpS6o3arjEe92o1ty
# g5JtdeW9FyKTG6i1Omznsyb+V+cfeRiRUpzJ0CIN/xyoP6EL006RGMWc1w+YJm/X
# 0/0n2nRHDS9yWKzwgwm6Vvl3bPVG2gGdY/o8WV20YvBxN9XObw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/Backup Cisco UCS FI.ps1
|
Backup Cisco UCS FI.ps1
|
<#
.Synopsis
Does a backup of a single UCS target.
.Description
Uses the UCS PowerTool cmdlet 'Backup-Ucs' and does all four types of UCS backup.
Filenames include the UCS name, date/time stamp, and backup type.
The backup directory is set by a variable in the script. If it doesn't exist the script will create. Since the backup files are XML I recommend enabling compression on the directory.
.Parameter Ucs
The UCS environment to backup. This can be either an IP address or the DNS name.
.Parameter CredentialFile
The location of the credential file to log on to the UCSM with. Defaults to the current directory.
.Example
Backup-mUcs.ps1 -Ucs ucspoc -CredentialPath C:\\Temp\\credentials.enc.xml
.Notes
NAME: Backup-mUcs.ps1
AUTHOR: Chris Monahan
LASTEDIT: 10/2/2012
KEYWORDS: UCS, PowerTool
.Link
http://batchlife.wordpress.com/2012/11/14/powershell-script-to-backup/
Requires -Powershell Version 2.0
Requires -Cisco PowerTool Version 0.99
Requires -Hal Rottenberg's PsCredential functions: http://poshcode.org/501 & http://halr9000.com/article/531
#>
<# Instructions for one time setup are at the bottom of the script #>
param($Ucs=$null, $CredentialFile=$null)
if ($Ucs -eq $null) { Write-Host "Enter the name/address of the UCS you're backing up" -BackgroundColor DarkYellow -ForegroundColor DarkRed; break }
if ($CredentialFile -eq $null) { Write-Host "Enter path to the credential file." -BackgroundColor DarkYellow -ForegroundColor DarkRed; break }
#-----------------------------
# Prep
#-----------------------------
#Static parameters
Set-Variable -Name ScriptDir -Value "\\\\server\\share" -Scope Local
Set-Variable -Name BackupPath -Value "C:\\Backups\\UCSM_Configuration_Backups" -Scope Local
Set-Variable -Name BackupTypes -Value ('config-system','config-logical','config-all','full-state')
Write-Verbose "`nStatic parameters`n-----------------`nScriptDir = $($ScriptDir)`nBackupPath = $($BackupPath)`nBackupTypes = $($BackupTypes)`n"
$errmailTo = "name@address"
$errmailFrom = "name@address"
$errmailSMTP = "emailserver"
If ( !(Test-Path $BackupPath) ) { mkdir $BackupPath }
. $ScriptDir\\Hals_PSCredentials.ps1
$UcsCred = Import-PsCredential -Path $CredentialFile
#-----------------------------
# Start doing the real work.
#-----------------------------
# Connect to the UCS
Connect-Ucs -Name $Ucs -Credential $UcsCred -ErrorVariable errConnectingUcs| select Ucs,UserName,Version
if ($errConnectingUcs -ne $null) {
$errmailBody = @()
$errmailBody += "$(Get-Now) - Error connecting to UCS`n`n"
$errmailBody += $errConnectingUcs
Send-MailMessage -From $errmailFrom -To $errmailTo -Subject "Backup-mUcs Error-- Failed connecting to $($Ucs)" -Body ($errmailBody | Out-String) -SmtpServer $errmailSMTP
break
}
# Get one of each type of UCS backup.
ForEach ($type in $backuptypes) {
Backup-Ucs -Type $type -PreservePooledValues -PathPattern ($BackupPath + '\\${ucs}_${yyyy}${MM}${dd}_${HH}${mm}_' + $type + '.xml') -ErrorVariable errBackupUcs
if ($errBackupUcs -ne $null) {
$errmailBody = @()
$errmailBody += "$(Get-Now) - Error running backup of type $($type)`n`n"
$errmailBody += $error[0]
Send-MailMessage -From $errmailFrom -To $errmailTo -Subject "Backup-mUcs Error-- On $($Ucs) backup of type $($type) failed" -Body ($errmailBody | Out-String) -SmtpServer $errmailSMTP
}
}
# Don't leave a stale session on the UCS
Disconnect-Ucs
<# One time setup
1- Copy script to SCRIPTHOST server for the datacenter you're working in.
$> copy \\\\server\\share\\Hals_PSCredentials.ps1 C:\\Scripts
2- Log on locally to the SCRIPTHOST with the service account the script will run under in Task Scheduler.
3- If necessary install the Cisco PowerTool module and configure it to load automatically in the PowerShell profile.
a- The PowerTool module can be copied from \\\\server\\share\\Modules to the same directory on the local scripthost.
b- The PowerShell profile may not exist yet. If it doesn't create file in the path specified by the "$profile" variable.
$> notepad $profile
1- Add the line "Import-Module C:\\Ops\\Modules\\CiscoUCSPowerTool\\CiscoUcsPS.psd1"
2- Save and exit the file
4- Create the credential file containing the UCS login credentials to use in the script. The credential file can only opened by the Windows user account that created it. That's why you have to log on with the Windows service account used to run the task in Task Scheduler. The Windows credentials encrypt the file, and inside the file are the UCS login username and password. You can store the credential files in any directory you want. The directory in the example is for demonstration.
$> mkdir C:\\Scripts\\CredentialFiles
$> . \\\\server\\share\\Hals_PSCredentials.ps1
$> $creds = Get-Credential # Username/password to login to the UCS with.
$> Export-PSCredential -Credential $creds -Path C:\\Scripts\\CredentialFiles\\somename.enc.xml
5- Copy \\\\vmscripthost201\\C$\\Scripts\\Run_Backup-mUcs.ps1 to the vmscripthost you're setting up.
a- This is the wrapper script that will be put into Task Scheduler. It will call Backup-mUcs.ps1 for each UCS environment to be backed up.
b- Edit the script so that it has the correct UCS DNS name(s) or IP address(es) for the datacenter you're configuring this for.
6- Test the script interactively first by running Backup-mUcs.ps1 and then by running Run_Backup-mUcs.ps1.
7- Add Run_Backup-mUcs.ps1 into Task Scheduler and test.
a- For now copy the Task Scheduler settings for the job from what's in the \\\\server Task Scheduler. May put the full instructions in later.
8- Verify the scripthost server is getting backed up somehow. Preferably as a normal OS level full backup by the backup group. The size of the backups for our UCS's so far for four UCS environments is 12MB a day.
#>
|
combined_dataset/train/non-malicious/1201.ps1
|
1201.ps1
|
if( Test-Path -Path 'env:APPVEYOR' )
{
Write-Warning -Message 'Can''t test Initialize-Lcm under AppVeyor.'
return
}
$originalLcm = $null
$tempDir = $null
$privateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPrivateKey.pfx' -Resolve
$publicKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPublicKey.cer' -Resolve
$publicKey = $null
$certPath = $null
$userName = $CarbonTestUser.UserName
$password = 'Aa1Bb2Cc3Dd4'
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
$tempDir = New-TempDirectory -Prefix $PSCommandPath
}
function Stop-TestFixture
{
Uninstall-Directory -Path $tempDir -Recurse
}
function Start-Test
{
$originalLcm = Get-DscLocalConfigurationManager
Uninstall-TestLcmCertificate
}
function Stop-Test
{
configuration SetPullMode
{
Set-StrictMode -Off
$customData = @{ }
foreach( $item in $originalLcm.DownloadManagerCustomData )
{
$customData[$item.key] = $item.value
}
node 'localhost'
{
LocalConfigurationManager
{
AllowModuleOverwrite = $originalLcm.AllowModuleOverwrite;
ConfigurationMode = $originalLcm.ConfigurationMode;
ConfigurationID = $originalLcm.ConfigurationID;
ConfigurationModeFrequencyMins = $originalLcm.ConfigurationModeFrequencyMins;
CertificateID = $originalLcm.CertificateID;
DownloadManagerName = $originalLcm.DownloadManagerName;
DownloadManagerCustomData = $customData
RefreshMode = $originalLcm.RefreshMode;
RefreshFrequencyMins = $originalLcm.RefreshFrequencyMins;
RebootNodeIfNeeded = $originalLcm.RebootNodeIfNeeded;
}
}
}
$outputPath = Join-Path -Path $tempDir -ChildPath 'originalLcm'
& SetPullMode -OutputPath $outputPath
Set-DscLocalConfigurationManager -Path $outputPath
Uninstall-TestLcmCertificate
}
function Uninstall-TestLcmCertificate
{
$script:publicKey = Get-Certificate -Path $publicKeyPath
Assert-NotNull $publicKey
$script:certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $publicKey.Thumbprint
if( (Test-Path -Path $certPath -PathType Leaf) )
{
Uninstall-Certificate -Thumbprint $publicKey.Thumbprint -StoreLocation LocalMachine -StoreName My
}
}
function Test-ShouldConfigurePushMode
{
$lcm = Get-DscLocalConfigurationManager
$rebootIfNeeded = -not $lcm.RebootNodeIfNeeded
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -RebootIfNeeded
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $lcm.CertificateID $publicKey.Thumbprint
Assert-True $lcm.RebootNodeIfNeeded
Assert-Equal 'Push' $lcm.RefreshMode
Assert-True (Test-Path -Path $certPath -PathType Leaf)
}
function Test-ShouldPreserveCertificateIDWhenCertFileNotGiven
{
$lcm = Get-DscLocalConfigurationManager
$rebootIfNeeded = -not $lcm.RebootNodeIfNeeded
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertificateID 'fubar' -CertFile $privateKeyPath -RebootIfNeeded
Assert-NoError
Assert-Equal $publicKey.Thumbprint $lcm.CertificateID
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertificateID $publicKey.Thumbprint -RebootIfNeeded
Assert-Equal $publicKey.Thumbprint $lcm.CertificateID
}
function Test-ShouldValidateCertFilePath
{
$originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile 'C:\jdskfjsdflkfjksdlf.pfx' -ErrorAction SilentlyContinue
Assert-Error -Last -Regex 'not found'
Assert-Null $lcm
Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID
}
function Test-ShouldHandleFileThatIsNotACertificate
{
$originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $PSCommandPath -ErrorAction SilentlyContinue
Assert-Error -Last -Regex 'Failed to create X509Certificate2 object'
Assert-Null $lcm
Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID
}
function Test-ShouldHandleRelativeCertFilePath
{
Push-Location -Path $PSScriptRoot
try
{
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile (Resolve-Path -Path $privateKeyPath -Relative)
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $publicKey.Thumbprint $lcm.CertificateID
}
finally
{
Pop-Location
}
}
function Test-ShouldValidateCertHasPrivateKey
{
$originalLcm = Get-DscLocalConfigurationManager
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $publicKeyPath -ErrorAction SilentlyContinue
Assert-Error -Last -Regex 'does not have a private key'
Assert-Null $lcm
Assert-Equal $originalLcm.CertificateID (Get-DscLocalConfigurationManager).CertificateID
}
function Test-ShouldClearUnprovidedPushValues
{
$originalLcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -RebootIfNeeded
$lcm = Initialize-Lcm -Push -ComputerName 'localhost'
Assert-NoError
Assert-NotNull $lcm
Assert-Null $lcm.CertificateID
Assert-False $lcm.RebootNodeIfNeeded
}
function Test-ShouldValidateComputerName
{
$lcm = Initialize-Lcm -Push -ComputerName 'fubar' -ErrorAction SilentlyContinue
Assert-Error -Last -Regex 'not found or is unreachable'
Assert-Null $lcm
}
function Test-ShouldUploadCertificateWithSecureStringAndPlaintextPasswords
{
$securePrivateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPrivateKey2.pfx'
$securePrivateKeyPasswod = 'fubar'
$securePrivateKeySecurePassword = ConvertTo-SecureString -String $securePrivateKeyPasswod -AsPlainText -Force
$securePrivateKey = Get-Certificate -Path $securePrivateKeyPath -Password $securePrivateKeyPasswod
Assert-NotNull $securePrivateKey
Uninstall-Certificate -Thumbprint $securePrivateKey.Thumbprint -StoreLocation LocalMachine -StoreName My
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $securePrivateKeyPath -CertPassword $securePrivateKeyPasswod
Assert-NoError $lcm
$secureCertPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $securePrivateKey.Thumbprint
Assert-True (Test-Path -Path $secureCertPath -PathType Leaf)
Assert-Equal $securePrivateKey.Thumbprint $lcm.CertificateID
Uninstall-Certificate -Thumbprint $securePrivateKey.Thumbprint -StoreLocation LocalMachine -StoreName My
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $securePrivateKeyPath -CertPassword $securePrivateKeySecurePassword
Assert-NoError $lcm
Assert-True (Test-Path -Path $secureCertPath -PathType Leaf)
Assert-Equal $securePrivateKey.Thumbprint $lcm.CertificateID
}
function Test-ShouldSupportWhatIf
{
$lcm = Initialize-Lcm -Push -ComputerName 'localhost'
$lcm = Initialize-Lcm -Push -ComputerName 'localhost' -CertFile $privateKeyPath -WhatIf
Assert-NotNull $lcm
Assert-Null $lcm.CertificateID
Assert-False (Test-Path -Path $certPath -PathType Leaf)
}
function Test-ShouldConfigureFileDownloadManager
{
$Global:Error.Clear()
$configID = [Guid]::NewGuid()
$lcm = Initialize-Lcm -SourcePath $PSScriptRoot `
-ConfigurationID $configID `
-ComputerName 'localhost' `
-AllowModuleOverwrite `
-CertFile $privateKeyPath `
-ConfigurationMode ApplyOnly `
-RebootIfNeeded `
-RefreshIntervalMinutes 35 `
-ConfigurationFrequency 3 `
-LcmCredential $CarbonTestUser `
-ErrorAction SilentlyContinue
if( [Environment]::OSVersion.Version.Major -ge 10 )
{
Assert-Error ('can''t configure\b.*\bmanager')
return
}
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $configID $lcm.ConfigurationID
Assert-True $lcm.AllowModuleOverwrite
Assert-True $lcm.RebootNodeIfNeeded
Assert-Equal 'ApplyOnly' $lcm.ConfigurationMode
Assert-Equal 35 $lcm.RefreshFrequencyMins
Assert-Equal 105 $lcm.ConfigurationModeFrequencyMins
Assert-Equal 'DscFileDownloadManager' $lcm.DownloadManagerName
Assert-Equal $PSScriptRoot $lcm.DownloadManagerCustomData[0].value
Assert-Equal $username $lcm.Credential.UserName
Assert-Equal $publicKey.Thumbprint $lcm.CertificateID
Assert-Equal 'Pull' $lcm.RefreshMode
$configID = [Guid]::NewGuid().ToString()
$lcm = Initialize-Lcm -SourcePath $env:TEMP -ConfigurationID $configID -ConfigurationMode ApplyAndMonitor -ComputerName 'localhost'
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $configID $lcm.ConfigurationID
Assert-False $lcm.AllowModuleOverwrite
Assert-False $lcm.RebootNodeIfNeeded
Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode
Assert-Equal 30 $lcm.RefreshFrequencyMins
Assert-Equal 30 $lcm.ConfigurationModeFrequencyMins
Assert-Equal 'DscFileDownloadManager' $lcm.DownloadManagerName
Assert-Equal $env:TEMP $lcm.DownloadManagerCustomData[0].value
Assert-Null $lcm.CertificateID
Assert-Null $lcm.Credential
Assert-Equal 'Pull' $lcm.RefreshMode
}
function Test-ShouldConfigureWebDownloadManager
{
$Global:Error.Clear()
$configID = [Guid]::NewGuid()
$lcm = Initialize-Lcm -ServerUrl 'http://localhost:8976' `
-AllowUnsecureConnection `
-ConfigurationID $configID `
-ComputerName 'localhost' `
-AllowModuleOverwrite `
-CertFile $privateKeyPath `
-ConfigurationMode ApplyOnly `
-RebootIfNeeded `
-RefreshIntervalMinutes 40 `
-ConfigurationFrequency 3 `
-LcmCredential $CarbonTestUser `
-ErrorAction SilentlyContinue
if( [Environment]::OSVersion.Version.Major -ge 10 )
{
Assert-Error ('can''t configure\b.*\bmanager')
return
}
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $configID $lcm.ConfigurationID
Assert-True $lcm.AllowModuleOverwrite
Assert-True $lcm.RebootNodeIfNeeded
Assert-Equal 'ApplyOnly' $lcm.ConfigurationMode
Assert-Equal 40 $lcm.RefreshFrequencyMins
Assert-Equal 120 $lcm.ConfigurationModeFrequencyMins
Assert-Equal 'WebDownloadManager' $lcm.DownloadManagerName
Assert-Equal 'http://localhost:8976' $lcm.DownloadManagerCustomData[0].value
Assert-Equal 'True' $lcm.DownloadManagerCustomData[1].value
Assert-Equal $username $lcm.Credential.UserName
Assert-Equal $publicKey.Thumbprint $lcm.CertificateID
Assert-Equal 'Pull' $lcm.RefreshMode
$configID = [Guid]::NewGuid().ToString()
$lcm = Initialize-Lcm -ServerUrl 'https://localhost:6798' -ConfigurationID $configID -ConfigurationMode ApplyAndMonitor -ComputerName 'localhost'
Assert-NoError
Assert-NotNull $lcm
Assert-Equal $configID $lcm.ConfigurationID
Assert-False $lcm.AllowModuleOverwrite
Assert-False $lcm.RebootNodeIfNeeded
Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode
Assert-Equal 30 $lcm.RefreshFrequencyMins
Assert-Equal 30 $lcm.ConfigurationModeFrequencyMins
Assert-Equal 'WebDownloadManager' $lcm.DownloadManagerName
Assert-Equal 'https://localhost:6798' $lcm.DownloadManagerCustomData[0].value
Assert-Equal 'False' $lcm.DownloadManagerCustomData[1].value
Assert-Null $lcm.Credential
Assert-Null $lcm.CertificateID
Assert-Equal 'Pull' $lcm.RefreshMode
}
if( [Environment]::OSVersion.Version.Major -lt 10 )
{
function Test-ShouldClearPullValuesWhenSwitchingToPush
{
$configID = [Guid]::NewGuid()
$lcm = Initialize-Lcm -SourcePath $PSScriptRoot `
-ConfigurationID $configID `
-ComputerName 'localhost' `
-AllowModuleOverwrite `
-CertFile $privateKeyPath `
-ConfigurationMode ApplyOnly `
-RebootIfNeeded `
-RefreshIntervalMinutes 45 `
-ConfigurationFrequency 3 `
-LcmCredential $CarbonTestUser
Assert-NoError
Assert-NotNull $lcm
$lcm = Initialize-Lcm -Push -ComputerName 'localhost'
Assert-NoError
Assert-NotNull $lcm
Assert-Null $lcm.ConfigurationID
Assert-Equal 'False' $lcm.AllowModuleOverwrite
Assert-Equal 'False' $lcm.RebootNodeIfNeeded
Assert-Equal 'ApplyAndMonitor' $lcm.ConfigurationMode
Assert-NotEqual (45 * 3) $lcm.RefreshFrequencyMins
Assert-NotEqual 45 $lcm.ConfigurationModeFrequencyMins
Assert-Null $lcm.DownloadManagerName
Assert-Null $lcm.DownloadManagerCustomData
Assert-Null $lcm.Credential
Assert-Null $lcm.CertificateID
Assert-Equal 'Push' $lcm.RefreshMode
}
}
|
combined_dataset/train/non-malicious/VMWare Quick Migration.ps1
|
VMWare Quick Migration.ps1
|
#########################################
#Name: VMWare Quick Migration Function
#Author: Justin Grote <jgrote NOSPAMAT enpointe DOT com>
#Credit: Inspired by Mike DiPetrillo's Quick Migration Script: http://www.mikedipetrillo.com/mikedvirtualization/2008/10/quick-migration-for-vmware-the-power-of-powershell.html
#Version: 0.1
#Last Revised: 31 July 2009
#
#Description: Performs the fucntional equivalent of a Hyper-V Quick Migration by suspending a VM,
# moving it to a new host, and resuming it. This does not require vMotion licensing.
# it works by providing required VM objects via the pipeline or the second argument,
# and specifying the Destination host in the first argument.
# The commeand accepts both text strings and VMHost objects for the VMHost Parameter
#
#Prerequisites:
# Powershell v1
# VMWare PowerCLI 4.0 (May work with earlier version but not tested)
#
#Instructions to Install: Save this script and import into your session with, for example, . C:\\temp\\quickmigrate.ps1
# You can also include it in your PowerCLI profile to have it automatically included.
#Command Usage: get-vm MyTestVM | Quick-MigrateVM "MyTestHost2"
#########################################
function QuickMigrate-VM {
PARAM(
$NewVMHost = ""
, [VMware.VimAutomation.Client20.VirtualMachineImpl]$VMsToMigrate = $null
)
BEGIN {
if (!$NewVMHost){
Write-Error "No Destination VMHost Specified. You must specify a host to migrate to. `n Example: Get-VM `"Test`" | QuickMigrate-VM `"Host1`""
break
}
elseif ($VMsToMigrate) {
Write-Output $InputObject | &($MyInvocation.InvocationName) -NewVMHost $newVMHost
}
else {
#If NewVMHost was provided as a String, convert it into a VMHost Object.
if ($NewVMHost.GetType().Name -eq "String") {
set-variable -name destinationVMHost -value (get-vmhost $NewVMHost) -scope 1
}
#Make sure that we have a VMHost object to work with.
if (! $destinationVMHost -or (! $destinationVMHost.GetType().Name -eq "VMHostImpl")) {
write-error "Destination VM Host was not found or you provided the wrong object type. Please provide a VMHostImpl object or specify the fully qualified name of a VM Host"
break
}
write-host -fore white "===Begin Quick Migration==="
}
}
PROCESS {
$step = 0
$skip = $false
#In the Event of an error, output the error, and skip the rest of the current item.
#This is a workaround for the fact that "continue" doesn't work in a function process loop.
trap {
write-host -fore yellow "`tSKIPPED: "$_.Exception.Message
set-variable -name skip -value ($true) -scope 1
continue
}
$vmToMigrate = $_
### Validation Checks
if($_ -is [VMware.VimAutomation.Client20.VirtualMachineImpl]) {
write-host -fore white "Quick Migrating $($vmToMigrate.Name) to $NewVMHost..."
}
else {
throw "Object Passed was not a Virtual Machine object. Object must be of type VMware.VimAutomation.Client20.VirtualMachineImpl."
}
# Check for connected devices
if (! $skip -and (get-cddrive $vmToMigrate).ConnectionState.Connected -ieq "TRUE") {
throw "Connected CD Drive. Please disconnect and try again."
}
if (! $skip -and (get-floppydrive $vmToMigrate).ConnectionState.Connected -ieq "TRUE") {
throw "Connected Floppy Drive. Please disconnect and try again."
}
# Make sure the current VM Host and the Destination Host are different.
$sourceVMHost = get-vmhost -vm $vmToMigrate
if (! $skip -and ($sourceVMHost.Name -eq $destinationVMHost.Name)) {
throw "Source and Destination Hosts are the same."
}
###Validation Complete, begin Migration
if (! $skip) {
$step++
write-host -fore cyan "`t$($step. Suspending" $vmToMigrate.Name"..."
$suspend = Suspend-VM -VM $vmToMigrate -confirm:$false
}
if (! $skip) {
$step++
write-host -fore cyan "`t($step). Moving" $vmToMigrate.Name "to" $destinationVMHost.Name"..."
$migrate = Get-VM $vmToMigrate | Move-VM -Destination $destinationVMHost
}
if (! $skip) {
$step++
write-host -fore cyan "`t($step). Resuming" $vmToMigrate.Name"..."
$resume = Start-VM -VM $vmToMigrate
}
write-host -fore green "`tCOMPLETED"
}
END { write-host -fore white "===END Quick Migration===" }
}
|
combined_dataset/train/non-malicious/596.ps1
|
596.ps1
|
function Run-SQLServerAgentJob{
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[String]
$JobName,
[Parameter(Mandatory = $false)]
[String]
$Hostname = $env:COMPUTERNAME,
[Parameter(Mandatory=$false)]
[ScriptBlock]
$LogScriptBlock = {Write-Host $Message}
)
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.Smo") | Out-Null
[Microsoft.SqlServer.Management.Smo.Server]$SqlServer = New-Object Microsoft.SqlServer.Management.Smo.Server $HostName
if(-not $SqlServer.Urn){
throw "The hostname provided is not a valid SQL Server instance. Did you mistype the alias or forget to add the instance name?"
}
$Job = $SqlServer.JobServer.Jobs | where{ $_.Name -eq $JobName }
if(-not $Job){
throw "No such job on the server.";
}
Write-Host "Executing job: $JobName";
$Job.Start();
}
|
combined_dataset/train/non-malicious/sample_7_45.ps1
|
sample_7_45.ps1
|
#
# Module manifest for module 'OCI.PSModules.Onesubscription'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Onesubscription.dll'
# Version number of this module.
ModuleVersion = '92.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '22bf5ba6-749f-401c-8b99-0cf5afbd2958'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Onesubscription Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Onesubscription.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOnesubscriptionAggregatedComputedUsagesList',
'Get-OCIOnesubscriptionBillingSchedulesList',
'Get-OCIOnesubscriptionCommitment',
'Get-OCIOnesubscriptionCommitmentsList',
'Get-OCIOnesubscriptionComputedUsage',
'Get-OCIOnesubscriptionComputedUsagesList',
'Get-OCIOnesubscriptionInvoicelineComputedUsagesList',
'Get-OCIOnesubscriptionInvoicesList',
'Get-OCIOnesubscriptionOrganizationSubscriptionsList',
'Get-OCIOnesubscriptionRateCardsList',
'Get-OCIOnesubscriptionSubscribedService',
'Get-OCIOnesubscriptionSubscribedServicesList',
'Get-OCIOnesubscriptionSubscriptionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Onesubscription'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1523.ps1
|
1523.ps1
|
function Assert-GreaterThan
{
[CmdletBinding()]
param(
[Parameter(Position=0)]
[object]
$InputObject,
[Parameter(Position=1)]
[object]
$LowerBound,
[Parameter(Position=2)]
[string]
$Message
)
Set-StrictMode -Version 'Latest'
if( -not ($InputObject -gt $LowerBound ) )
{
Fail "'$InputObject' is not greater than '$LowerBound': $message"
}
}
|
combined_dataset/train/non-malicious/sample_28_97.ps1
|
sample_28_97.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
List the available operations supported by the Microsoft.EventGrid resource provider.
.Description
List the available operations supported by the Microsoft.EventGrid resource provider.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IOperation
.Link
https://learn.microsoft.com/powershell/module/az.eventgrid/get-azeventgridoperation
#>
function Get-AzEventGridOperation {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IOperation])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Returns true when the command succeeds
${PassThru},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
$mapping = @{
List = 'Az.EventGrid.private\Get-AzEventGridOperation_List';
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
throw
}
}
end {
try {
$steppablePipeline.End()
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBRHs6SUZUubli+
# zKJVUFugVbNqYtbADlTgHfLfekV1a6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILo6GLnKGK1NvuAjvKJli9lY
# 1/UelGi0ZAN3EYdyF/YXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAkNqzc0s0Mv984S/37jPrKWQ+Vg/r3dybjFCWeZbtvP/byc5wVCqlt8c
# 1o4Z8O8a60NU4z9SAzJ03m7V4CDJ3tN9SRV8netns3qrCFeikXRyJdNoFqoxEdzd
# jVDzSwUtw5umAJTm2/t6NFnK9Myelj3dN5c72IPGG0eHBbq/8UWTl6J86VZNKkPi
# rC8iXa7sz/UAA5AQUGVrCFuIabYop+hK1FiFbtCcU/D0vihL3o7p+UhDFFc7QEBL
# wmvOLtDJwCpPsScey5P39fqo+P301nUcCFkbWOEBUxCw9YF4cqqeWLFAgwsajQvO
# WBXIyob2t/p72LMkriAQhycig9/oB6GCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCKjAZgMl/lEuFtQkn3UOJatxz5bCI7vrODczbwF1i4+AIGZjOrur94
# GBIyMDI0MDUxNjA2NDIxMy4zOFowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAd1dVx2V1K2qGwABAAAB3TANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA3MDlaFw0yNTAxMTAxOTA3MDlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC
# Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqE4DlETqLnecdREfiWd8oun7
# 0m+Km5O1y1qKsLExRKs9LLkJYrYO2uJA/5PnYdds3aDsCS1DWlBltMMYXMrp3Te9
# hg2sI+4kr49Gw/YU9UOMFfLmastEXMgcctqIBqhsTm8Um6jFnRlZ0owKzxpyOEdS
# Z9pj7v38JHu434Hj7GMmrC92lT+anSYCrd5qvIf4Aqa/qWStA3zOCtxsKAfCyq++
# pPqUQWpimLu4qfswBhtJ4t7Skx1q1XkRbo1Wdcxg5NEq4Y9/J8Ep1KG5qUujzyQb
# upraZsDmXvv5fTokB6wySjJivj/0KAMWMdSlwdI4O6OUUEoyLXrzNF0t6t2lbRsF
# f0QO7HbMEwxoQrw3LFrAIS4Crv77uS0UBuXeFQq27NgLUVRm5SXYGrpTXtLgIqyp
# HeK0tP2o1xvakAniOsgN2WXlOCip5/mCm/5hy8EzzfhtcU3DK13e6MMPbg/0N3zF
# 9Um+6aOwFBCQrlP+rLcetAny53WcdK+0VWLlJr+5sa5gSlLyAXoYNY3n8pu94WR2
# yhNUg+jymRaGM+zRDucDn64HFAHjOWMSMrPlZbsEDjCmYWbbh+EGZGNXg1un6fvx
# yACO8NJ9OUDoNgFy/aTHUkfZ0iFpGdJ45d49PqEwXQiXn3wsy7SvDflWJRZwBCRQ
# 1RPFGeoYXHPnD5m6wwMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRuovW2jI9R2kXL
# IdIMpaPQjiXD8TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEALlTZsg0uBcgdZsxy
# pW5/2ORRP8rzPIsG+7mHwmuphHbP95o7bKjU6hz1KHK/Ft70ZkO7uSRTPFLInUhm
# SxlnDoUOrrJk1Pc8SMASdESlEEvxL6ZteD47hUtLQtKZvxchmIuxqpnR8MRy/cd4
# D7/L+oqcJBaReCGloQzAYxDNGSEbBwZ1evXMalDsdPG9+7nvEXFlfUyQqdYUQ0nq
# 6t37i15SBePSeAg7H/+Xdcwrce3xPb7O8Yk0AX7n/moGTuevTv3MgJsVe/G2J003
# l6hd1b72sAiRL5QYPX0Bl0Gu23p1n450Cq4GIORhDmRV9QwpLfXIdA4aCYXG4I7N
# OlYdqWuql0iWWzLwo2yPlT2w42JYB3082XIQcdtBkOaL38E2U5jJO3Rh6EtsOi+Z
# lQ1rOTv0538D3XuaoJ1OqsTHAEZQ9sw/7+91hSpomym6kGdS2M5//voMCFXLx797
# rNH3w+SmWaWI7ZusvdDesPr5kJV2sYz1GbqFQMEGS9iH5iOYZ1xDkcHpZP1F5zz6
# oMeZuEuFfhl1pqt3n85d4tuDHZ/svhBBCPcqCqOoM5YidWE0TWBi1NYsd7jzzZ3+
# Tsu6LQrWDwRmsoPuZo6uwkso8qV6Bx4n0UKpjWwNQpSFFrQQdRb5mQouWiEqtLsX
# CN2sg1aQ8GBtDOcKN0TabjtCNNswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2
# REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQA2I0cZZds1oM/GfKINsQ5yJKMWEKCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6e/1MTAiGA8yMDI0MDUxNjExMDAwMVoYDzIwMjQwNTE3MTEwMDAxWjB0MDoGCisG
# AQQBhFkKBAExLDAqMAoCBQDp7/UxAgEAMAcCAQACAg1SMAcCAQACAhKrMAoCBQDp
# 8UaxAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAQsMRAONVITufCmmSZjnw
# jC6Z0K5HH+bL/tumfGmFgybZ/z5fwTwzUrk/27d9nlkxq0Yp3Pk2x26i8cZYizPV
# dF53XxemeViEF6kNhi2Oea419DRw3LA5fsYJG/qFNZYXUIvMtJw/tiTILIJppKBQ
# OgdpF/JPXaWLmrIW6csgF80xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCDfZSxcrS6+2XTQrexvvXdtt0DNdZrBczLZ4Jxq00BcsjCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rAMWNm
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd
# ldStqhsAAQAAAd0wIgQgCt9IYpRHgxbrBBuklb2PUHAuxJsw7YIVBMm0gRczAvgw
# DQYJKoZIhvcNAQELBQAEggIAgPh0okQ6lyazpHvzQBjHvAocu6eWhc/OLiJOVpmx
# R9hOjthnZLMc4Qe5i3JFnIVTRXO9Nqxc7kLxEMSgHEUdhAhmquQzlCViRqEQ3DF4
# ZeCXG4eTCLV6yDMWE6G8FeWuYVKz9utel/W5HG66QkRm383pcjZH8uwNNHziU0cW
# zU06I8Lr6RXzCZRGct4s1FcAZMsMXYfSXggFf6gq3LgjYTKrmvx6jcJN9lwteLXx
# ZIcoZ0oj6DMLubYLY4+YiAibHjGCFD3C8vAaGWb4fwB8hDD3a5jv3+dKvlwkniuF
# QCGINJBACIfgFsDTDWK45yqBnAuzftHbH2G7Fkk6L5+y0iAgGks2fXAe+ZCuRufr
# uCT/EjRs8yAsQkCdatk/Mz9qWswYtfU6EFKw12HNFTfOBavsuKp6CDL4xwVsLTEc
# AAlcQn9J90b+Fr6Gei0BG6kgR97WbGqEQ6HG8ViDUmgu9O51SOo5tkJJRbTG3fAe
# JBHir91CoMyzwoYP9XOtSjTgIe6d/012O5aJbH10DkaaVmFI99efUtQo/+UJ3Olg
# hbfrKd0N7CKDnz/hZd500k+zmJo5us2b+UrHxoC6fnICKX4f/ZYQV5x+kGBVyTUL
# SBFYlTXfF2QuQ/o6Gve003wAhscXsgSydvyOfeSBRmKSFOeJQIpbXyUKUMiRR6HB
# UWA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2735.ps1
|
2735.ps1
|
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=0)]
[String]$LogName
)
Get-WinEvent -LogName $LogName
|
combined_dataset/train/non-malicious/sample_43_48.ps1
|
sample_43_48.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datacatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datacatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatacatalogCatalogLock',
'Add-OCIDatacatalogCatalogPrivateEndpointLock',
'Add-OCIDatacatalogDataSelectorPatterns',
'Add-OCIDatacatalogMetastoreLock',
'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern',
'DisMount-OCIDatacatalogCatalogPrivateEndpoint',
'Export-OCIDatacatalogGlossary',
'Get-OCIDatacatalogAggregatedPhysicalEntitiesList',
'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList',
'Get-OCIDatacatalogAttributeTag',
'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog',
'Get-OCIDatacatalogCatalogPrivateEndpoint',
'Get-OCIDatacatalogCatalogPrivateEndpointsList',
'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection',
'Get-OCIDatacatalogConnectionsList',
'Get-OCIDatacatalogCustomPropertiesList',
'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset',
'Get-OCIDatacatalogDataAssetsList',
'Get-OCIDatacatalogDataAssetTag',
'Get-OCIDatacatalogDataAssetTagsList',
'Get-OCIDatacatalogDerivedLogicalEntitiesList',
'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity',
'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList',
'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList',
'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList',
'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary',
'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition',
'Get-OCIDatacatalogJobDefinitionsList',
'Get-OCIDatacatalogJobExecution',
'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog',
'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics',
'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList',
'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList',
'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList',
'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList',
'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList',
'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship',
'Get-OCIDatacatalogTermRelationshipsList',
'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType',
'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest',
'Get-OCIDatacatalogWorkRequestErrorsList',
'Get-OCIDatacatalogWorkRequestLogsList',
'Get-OCIDatacatalogWorkRequestsList',
'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset',
'Import-OCIDatacatalogGlossary',
'Invoke-OCIDatacatalogAssociateCustomProperty',
'Invoke-OCIDatacatalogAsynchronousExportGlossary',
'Invoke-OCIDatacatalogDisassociateCustomProperty',
'Invoke-OCIDatacatalogExpandTreeForGlossary',
'Invoke-OCIDatacatalogFetchEntityLineage',
'Invoke-OCIDatacatalogObjectStats',
'Invoke-OCIDatacatalogParseConnection',
'Invoke-OCIDatacatalogProcessRecommendation',
'Invoke-OCIDatacatalogRecommendations',
'Invoke-OCIDatacatalogSearchCriteria',
'Invoke-OCIDatacatalogSuggestMatches',
'Invoke-OCIDatacatalogSynchronousExportDataAsset',
'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers',
'Mount-OCIDatacatalogCatalogPrivateEndpoint',
'Move-OCIDatacatalogCatalogCompartment',
'Move-OCIDatacatalogCatalogPrivateEndpointCompartment',
'Move-OCIDatacatalogMetastoreCompartment',
'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag',
'New-OCIDatacatalogCatalog',
'New-OCIDatacatalogCatalogPrivateEndpoint',
'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty',
'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag',
'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag',
'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag',
'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob',
'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution',
'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace',
'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm',
'New-OCIDatacatalogTermRelationship',
'Remove-OCIDatacatalogAttribute',
'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog',
'Remove-OCIDatacatalogCatalogLock',
'Remove-OCIDatacatalogCatalogPrivateEndpoint',
'Remove-OCIDatacatalogCatalogPrivateEndpointLock',
'Remove-OCIDatacatalogConnection',
'Remove-OCIDatacatalogCustomProperty',
'Remove-OCIDatacatalogDataAsset',
'Remove-OCIDatacatalogDataAssetTag',
'Remove-OCIDatacatalogDataSelectorPatterns',
'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag',
'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag',
'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob',
'Remove-OCIDatacatalogJobDefinition',
'Remove-OCIDatacatalogMetastore',
'Remove-OCIDatacatalogMetastoreLock',
'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern',
'Remove-OCIDatacatalogTerm',
'Remove-OCIDatacatalogTermRelationship',
'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog',
'Update-OCIDatacatalogCatalogPrivateEndpoint',
'Update-OCIDatacatalogConnection',
'Update-OCIDatacatalogCustomProperty',
'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity',
'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary',
'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition',
'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace',
'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm',
'Update-OCIDatacatalogTermRelationship',
'Write-OCIDatacatalogCredentials'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_43_5.ps1
|
sample_43_5.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
#####################################################################################################
#
# Registers the WinRM endpoint for this instance of PowerShell.
#
# If the parameters '-PowerShellHome' were specified, it means that the script will be registering
# an instance of PowerShell from another instance of PowerShell.
#
# If no parameter is specified, it means that this instance of PowerShell is registering itself.
#
# Assumptions:
# 1. The CoreCLR and the the PowerShell assemblies are side-by-side in $PSHOME
# 2. Plugins are registered by version number. Only one plugin can be automatically registered
# per PowerShell version. However, multiple endpoints may be manually registered for a given
# plugin.
#
#####################################################################################################
[CmdletBinding(DefaultParameterSetName = "NotByPath")]
param
(
[parameter(Mandatory = $true, ParameterSetName = "ByPath")]
[switch]$Force,
[string]
$PowerShellHome
)
Set-StrictMode -Version 3.0
if (! ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
Write-Error "WinRM registration requires Administrator rights. To run this cmdlet, start PowerShell with the `"Run as administrator`" option."
return
}
function Register-WinRmPlugin
{
param
(
#
# Expected Example:
# %windir%\\system32\\PowerShell\\6.0.0\\pwrshplugin.dll
#
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginAbsolutePath,
#
# Expected Example: powershell.6.0.0-beta.3
#
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginEndpointName
)
$regKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN\Plugin\$pluginEndpointName"
$pluginArchitecture = "64"
if ($env:PROCESSOR_ARCHITECTURE -match "x86" -or $env:PROCESSOR_ARCHITECTURE -eq "ARM")
{
$pluginArchitecture = "32"
}
$regKeyValueFormatString = @"
<PlugInConfiguration xmlns="http://schemas.microsoft.com/wbem/wsman/1/config/PluginConfiguration" Name="{0}" Filename="{1}"
SDKVersion="2" XmlRenderingType="text" Enabled="True" OutputBufferingMode="Block" ProcessIdleTimeoutSec="0" Architecture="{2}"
UseSharedProcess="false" RunAsUser="" RunAsPassword="" AutoRestart="false">
<InitializationParameters>
<Param Name="PSVersion" Value="7.0"/>
</InitializationParameters>
<Resources>
<Resource ResourceUri="http://schemas.microsoft.com/powershell/{0}" SupportsOptions="true" ExactMatch="true">
<Security Uri="http://schemas.microsoft.com/powershell/{0}" ExactMatch="true"
Sddl="O:NSG:BAD:P(A;;GA;;;BA)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)"/>
<Capability Type="Shell"/>
</Resource>
</Resources>
<Quotas IdleTimeoutms="7200000" MaxConcurrentUsers="5" MaxProcessesPerShell="15" MaxMemoryPerShellMB="1024" MaxShellsPerUser="25"
MaxConcurrentCommandsPerShell="1000" MaxShells="25" MaxIdleTimeoutms="43200000"/>
</PlugInConfiguration>
"@
$valueString = $regKeyValueFormatString -f $pluginEndpointName, $pluginAbsolutePath, $pluginArchitecture
New-Item $regKey -Force > $null
New-ItemProperty -Path $regKey -Name ConfigXML -Value $valueString > $null
}
function New-PluginConfigFile
{
[CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")]
param
(
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginFile,
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$targetPsHomeDir
)
# This always overwrites the file with a new version of it if the
# script is invoked multiple times.
Set-Content -Path $pluginFile -Value "PSHOMEDIR=$targetPsHomeDir" -ErrorAction Stop
Add-Content -Path $pluginFile -Value "CORECLRDIR=$targetPsHomeDir" -ErrorAction Stop
Write-Verbose "Created Plugin Config File: $pluginFile" -Verbose
}
function Install-PluginEndpoint {
[CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")]
param (
[Parameter()] [bool] $Force,
[switch]
$VersionIndependent
)
######################
# #
# Install the plugin #
# #
######################
if (-not [String]::IsNullOrEmpty($PowerShellHome))
{
$targetPsHome = $PowerShellHome
$targetPsVersion = & "$targetPsHome\pwsh" -NoProfile -Command '$PSVersionTable.PSVersion.ToString()'
}
else
{
## Get the PSHome and PSVersion using the current powershell instance
$targetPsHome = $PSHOME
$targetPsVersion = $PSVersionTable.PSVersion.ToString()
}
Write-Verbose "PowerShellHome: $targetPsHome" -Verbose
# For default, not tied to the specific version endpoint, we apply
# only first number in the PSVersion string to the endpoint name.
# Example name: 'PowerShell.6'.
if ($VersionIndependent) {
$dotPos = $targetPsVersion.IndexOf(".")
if ($dotPos -ne -1) {
$targetPsVersion = $targetPsVersion.Substring(0, $dotPos)
}
}
Write-Verbose "Using PowerShell Version: $targetPsVersion" -Verbose
$pluginEndpointName = "PowerShell.$targetPsVersion"
$endPoint = Get-PSSessionConfiguration $pluginEndpointName -Force:$Force -ErrorAction silentlycontinue 2>&1
# If endpoint exists and -Force parameter was not used, the endpoint would not be overwritten.
if ($endpoint -and !$Force)
{
Write-Error -Category ResourceExists -ErrorId "PSSessionConfigurationExists" -Message "Endpoint $pluginEndpointName already exists."
return
}
if (!$PSCmdlet.ShouldProcess($pluginEndpointName)) {
return
}
if ($PSVersionTable.PSVersion -lt "6.0")
{
# This script is primarily used from Windows PowerShell for Win10 IoT and NanoServer to setup PSCore6 remoting endpoint
# so it's ok to hardcode to 'C:\Windows' for those systems
$pluginBasePath = Join-Path "C:\Windows\System32\PowerShell" $targetPsVersion
}
else
{
$pluginBasePath = Join-Path ([System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::Windows) + "\System32\PowerShell") $targetPsVersion
}
$resolvedPluginAbsolutePath = ""
if (! (Test-Path $pluginBasePath))
{
Write-Verbose "Creating $pluginBasePath"
$resolvedPluginAbsolutePath = New-Item -Type Directory -Path $pluginBasePath
}
else
{
$resolvedPluginAbsolutePath = Resolve-Path $pluginBasePath
}
$pluginPath = Join-Path $resolvedPluginAbsolutePath "pwrshplugin.dll"
# This is forced to ensure the the file is placed correctly
Copy-Item $targetPsHome\pwrshplugin.dll $resolvedPluginAbsolutePath -Force -Verbose -ErrorAction Stop
$pluginFile = Join-Path $resolvedPluginAbsolutePath "RemotePowerShellConfig.txt"
New-PluginConfigFile $pluginFile (Resolve-Path $targetPsHome)
# Register the plugin
Register-WinRmPlugin $pluginPath $pluginEndpointName
####################################################################
# #
# Validations to confirm that everything was registered correctly. #
# #
####################################################################
if (! (Test-Path $pluginFile))
{
throw "WinRM Plugin configuration file not created. Expected = $pluginFile"
}
if (! (Test-Path $resolvedPluginAbsolutePath\pwrshplugin.dll))
{
throw "WinRM Plugin DLL missing. Expected = $resolvedPluginAbsolutePath\pwrshplugin.dll"
}
try
{
Write-Host "`nGet-PSSessionConfiguration $pluginEndpointName" -ForegroundColor "green"
Get-PSSessionConfiguration $pluginEndpointName -ErrorAction Stop
}
catch [Microsoft.PowerShell.Commands.WriteErrorException]
{
throw "No remoting session configuration matches the name $pluginEndpointName."
}
}
Install-PluginEndpoint -Force $Force
Install-PluginEndpoint -Force $Force -VersionIndependent
Write-Host "Restarting WinRM to ensure that the plugin configuration change takes effect.`nThis is required for WinRM running on Windows SKUs prior to Windows 10." -ForegroundColor Magenta
Restart-Service winrm
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCfOFoH3rP/kr2E
# 0Q4vJtNjsECNzfLCg+aNt7OyJJ4h56CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC31kIv83vnF6L5j9IMOo5zK
# LpBkr5/aZ0ovb5/+9Z+bMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAjMS5yIZzMfDtLc9BCK3HVW5TIIw+CEWMUDUlyBjxFef8v1nSXW8LdoVN
# ja27usqFa1JBV01jywlcPoR+fNjNrILB6PGoIS6NnXF1NlGgwKNnh7AQ4GCFRnPJ
# LjxScUM127K01SdAdbJHRSm5IPFBhGla29kQRmGBgLESLFun1HvUBEpa6ia22e+z
# D00UCaIDkw/6MNnbNDs2LP3lSq1DSLBStcJukOakrl9/xwn9k4lYfp5rU6gkOWlE
# jo6QZ/JoOM5sSDLi0mWN0adXPngUNXX5PEaTyy4mj0OCzv3U4K65eYssD6NszuV8
# evP0iO7SBTq9rnPiSERiY8e2zaOoKaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCiTFkxKhXyXMJotWHYNCUp/9qZZebWWvClXyuBUrmA4AIGZc5J2ESr
# GBIyMDI0MDIyMDE4MTgzOC43OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB7gXTAjCymp2nAAEAAAHuMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0
# NFoXDTI1MDMwNTE4NDU0NFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAL7xvKXXooSJrzEpLi9UvtEQ45HsvNgItcS1aB6rI5WW
# vO4TP4CgJri0EYRKNsdNcQJ4w7A/1M94popqV9NTldIaOkmGkbHn1/EwmhNhY/PM
# PQ7ZECXIGY4EGaIsNdENAkvVG24CO8KIu6VVB6I8jxXv4eFNHf3VNsLVt5LHBd90
# ompjWieMNrCoMkCa3CwD+CapeAfAX19lZzApK5eJkFNtTl9ybduGGVE3Dl3Tgt3X
# llbNWX9UOn+JF6sajYiz/RbCf9rd4Y50eu9/Aht+TqVWrBs1ATXU552fa69GMpYT
# B6tcvvQ64Nny8vPGvLTIR29DyTL5V+ryZ8RdL3Ttjus38dhfpwKwLayjJcbc7AK0
# sDujT/6Qolm46sPkdStLPeR+qAOWZbLrvPxlk+OSIMLV1hbWM3vu3mJKXlanUcoG
# nslTxGJEj69jaLVxvlfZESTDdas1b+Nuh9cSz23huB37JTyyAqf0y1WdDrmzpAbv
# Yz/JpRkbYcwjfW2b2aigfb288E72MMw4i7QvDNROQhZ+WB3+8RZ9M1w9YRCPt+xa
# 5KhW4ne4GrA2ZFKmZAPNJ8xojO7KzSm9XWMVaq2rDAJxpj9Zexv9rGTEH/MJN0dI
# FQnxObeLg8z2ySK6ddj5xKofnyNaSkdtssDc5+yzt74lsyMqZN1yOZKRvmg3ypTX
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUEIjNPxrZ3CCevfvF37a/X9x2pggwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAHdnIC9rYQo5ZJWkGdiTNfx/wZmNo6znvsX2
# jXgCeH2UrLq1LfjBeg9cTJCnW/WIjusnNlUbuulTOdrLaf1yx+fenrLuRiQeq1K6
# AIaZOKIGTCEV9IHIo8jTwySWC8m8pNlvrvfIZ+kXA+NDBl4joQ+P84C2liRPshRe
# oySLUJEwkqB5jjBREJxwi6N1ZGShW/gner/zsoTSo9CYBH1+ow3GMjdkKVXEDjCI
# ze01WVFsX1KCk6eNWjc/8jmnwl3jWE1JULH/yPeoztotIq0PM4RQ2z5m2OHOeZmB
# R3v8BYcOHAEd0vntMj2HueJmR85k5edxiwrEbiCvJOyFTobqwBilup0wT/7+DW56
# vtUYgdS0urdbQCebyUB9L0+q2GyRm3ngkXbwId2wWr/tdUG0WXEv8qBxDKUk2eJr
# 5qeLFQbrTJQO3cUwZIkjfjEb00ezPcGmpJa54a0mFDlk3QryO7S81WAX4O/TmyKs
# +DR+1Ip/0VUQKn3ejyiAXjyOHwJP8HfaXPUPpOu6TgTNzDsTU6G04x/sMeA8xZ/p
# Y51id/4dpInHtlNcImxbmg6QzSwuK3EGlKkZyPZiOc3OcKmwQ9lq3SH7p3u6VFpZ
# HlEcBTIUVD2NFrspZo0Z0QtOz6cdKViNh5CkrlBJeOKB0qUtA8GVf73M6gYAmGhl
# +umOridAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIij
# ptU29+UXFtRYINDdhgrLo76ToIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpf1/BMCIYDzIwMjQwMjIwMTcyODMz
# WhgPMjAyNDAyMjExNzI4MzNaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl/X8EC
# AQAwCgIBAAICDykCAf8wBwIBAAICE+QwCgIFAOmAsUECAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAP4MGy6jRs9gZgUhfL9bfFnh86TShav6+WtXKANlNJnwL
# v7KraLZuQGmxmHgQ2sPpg4IMfvc20ZAr0nJL6nFsaFUWmbDIVOX7iY1Ik6uHw9y7
# FR84WX1rZWKeRTswYjdqx6zWEycv4y31hSz0SUYzI51G/AipdEIxhcFR2c6nnGlk
# Yw2GPrS80E6AeXYUAlWJd/xn2scu+Wr6QtRbsatZhOYi36y5QKEfiTK3KFGYbMlU
# PKFH6VIlqdIrJ0xQtbngbEgQVhjDjXzQ+hJBErf/BxWokL5klC4G3SJZnjxzwmh6
# D2IBuckP32ZX75KoP1HY7m/d/zHXsbN2J/1fnukaMTGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7gXTAjCymp2nAAEAAAHu
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIBX20C6NOe9PKJzA0r7KkTYKbJ8omtbfWlmHAEbpYK9O
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgT1B3FJWF+r5V1/4M+z7kQiQH
# P2gJL85B+UeRVGF+MCEwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAiBCDsAt/A8mSZlBS8tGMxkoqq3BBt
# ygVOGucZYtyT5TcVEDANBgkqhkiG9w0BAQsFAASCAgCylMHfXzQHzDBgDFuj4SOy
# M0kCYkFTWskfBbXImF7mHgwWGQorZG4bQn5Iv6E1HnsxNYhBS/hGvr+d/J4sSr9x
# n/4Onr6JkN2VTThFLuu05VvAS5uljaH0OvbsnvuD2TbT/qcV2MUkERkWA8t34Z4Y
# BxnC51rWwfDj1JsbCjxskQ8LWo5x9gLUVfv9eUMv4bCbdc/UyY+y/Akb/n/Sq4rc
# CjbH0JTtoi33FjzkD2GEP22bEj/nfpYu22KCseN1tFPX3DPvhP2NQ37+CBjaow/m
# eAM8C1YcbZZckfRdyCWuZcdmzqC7FLmYTd06NimuHmbASQdg9sra6blclYVB32Va
# pEBj0wuA90PRtNQHStDDwrtoyDufhp+2XbT5KpVLqkKPal67+N0fr4vY2sjDsyYg
# Syh39d1i4/xbR8ENMY5YWslAZ51YRloOXkcFLUGTFbN3iQyYc+pm8tEv1tt0mM4S
# amJYy6EikYG39skzstTOov5KlPifAs0zMJAzO9mZLId/2nk9jhB7gLoY4Zv6ShMX
# JNT78t9RQJNCp6bx3I7dJHGexmBrdc813wpdXqHW75gcVDV77/GwjpYCw2D7qdVB
# H9S+Bk0NP8u91Ci3TLR87+Z7foZU/d03lU5o8TskVOy/GVItnuXjvLs0woiYcl9r
# nbQMd4l/cUa4Jkq/pEj0rw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_22_45.ps1
|
sample_22_45.ps1
|
#
# Module manifest for module 'OCI.PSModules.Operatoraccesscontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment',
'Get-OCIOperatoraccesscontrolAccessRequest',
'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList',
'Get-OCIOperatoraccesscontrolAccessRequestsList',
'Get-OCIOperatoraccesscontrolAssignmentValidationStatus',
'Get-OCIOperatoraccesscontrolAuditLogReport',
'Get-OCIOperatoraccesscontrolInteractionsList',
'Get-OCIOperatoraccesscontrolOperatorAction',
'Get-OCIOperatoraccesscontrolOperatorActionsList',
'Get-OCIOperatoraccesscontrolOperatorControl',
'Get-OCIOperatoraccesscontrolOperatorControlAssignment',
'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList',
'Get-OCIOperatoraccesscontrolOperatorControlsList',
'Invoke-OCIOperatoraccesscontrolApproveAccessRequest',
'Invoke-OCIOperatoraccesscontrolInteractionRequest',
'Invoke-OCIOperatoraccesscontrolRejectAccessRequest',
'Invoke-OCIOperatoraccesscontrolReviewAccessRequest',
'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest',
'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment',
'Move-OCIOperatoraccesscontrolOperatorControlCompartment',
'New-OCIOperatoraccesscontrolOperatorControl',
'New-OCIOperatoraccesscontrolOperatorControlAssignment',
'Remove-OCIOperatoraccesscontrolOperatorControl',
'Remove-OCIOperatoraccesscontrolOperatorControlAssignment',
'Update-OCIOperatoraccesscontrolOperatorControl',
'Update-OCIOperatoraccesscontrolOperatorControlAssignment'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1116.ps1
|
1116.ps1
|
$appPoolName = 'Carbon-Get-IisWebsite'
$siteName = 'Carbon-Get-IisWebsite'
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Start-Test
{
Install-IisAppPool -Name $appPoolName
$bindings = @( 'http/*:8401:', 'https/*:8401:', 'http/1.2.3.4:80:', "http/5.6.7.8:80:$siteName" )
Install-IisWebsite -Name $siteName -Bindings $bindings -Path $TestDir -AppPoolName $appPoolName
}
function Stop-Test
{
Remove-IisWebsite -Name $siteName
}
function Test-ShouldReturnNullForNonExistentWebsite
{
$website = Get-IisWebsite -SiteName 'ISureHopeIDoNotExist'
Assert-Null $website
}
function Test-ShouldGetWebsiteDetails
{
$website = Get-IisWebsite -SiteName $siteName
Assert-NotNull $website
Assert-Equal $siteName $website.Name 'site name not set'
Assert-True ($website.ID -gt 0) 'site ID not set'
Assert-Equal 4 $website.Bindings.Count 'site bindings not set'
Assert-Equal 'http' $website.Bindings[0].Protocol
Assert-Equal '0.0.0.0' $website.Bindings[0].Endpoint.Address
Assert-Equal 8401 $website.Bindings[0].Endpoint.Port
Assert-Empty $website.Bindings[0].Host
Assert-Equal 'https' $website.Bindings[1].Protocol
Assert-Equal '0.0.0.0' $website.Bindings[1].Endpoint.Address
Assert-Equal 8401 $website.Bindings[1].Endpoint.Port
Assert-Empty $website.Bindings[1].Host
Assert-Equal 'http' $website.Bindings[2].Protocol
Assert-Equal '1.2.3.4' $website.Bindings[2].Endpoint.Address
Assert-Equal 80 $website.Bindings[2].Endpoint.Port
Assert-Empty $website.Bindings[2].Host
Assert-Equal 'http' $website.Bindings[3].Protocol
Assert-Equal '5.6.7.8' $website.Bindings[3].Endpoint.Address
Assert-Equal 80 $website.Bindings[3].Endpoint.Port
Assert-Equal $siteName $website.Bindings[3].Host "bindings[3] host name"
$physicalPath = $website.Applications |
Where-Object { $_.Path -eq '/' } |
Select-Object -ExpandProperty VirtualDirectories |
Where-Object { $_.Path -eq '/' } |
Select-Object -ExpandProperty PhysicalPath
Assert-Equal $physicalPath $website.PhysicalPath
Assert-ServerManagerMember -Website $website
}
function Test-ShouldGetAllWebsites
{
$foundAtLeastOne = $false
$foundTestWebsite = $false
Get-IisWebsite | ForEach-Object {
$foundAtLeastOne = $true
Assert-ServerManagerMember -Website $_
if( $_.Name -eq $siteName )
{
$foundTestWebsite = $true
}
}
Assert-True $foundAtLeastOne
Assert-True $foundTestWebsite
}
function Assert-ServerManagerMember
{
param(
$Website
)
Assert-NotNull ($Website.ServerManager) 'no server manager property'
Assert-NotNull ($Website | Get-Member | Where-Object { $_.Name -eq 'CommitChanges' -and $_.MemberType -eq 'ScriptMethod' }) 'no CommitChanges method'
}
|
combined_dataset/train/non-malicious/Get-Parameter 2.2.ps1
|
Get-Parameter 2.2.ps1
|
#Requires -version 2.0
#.Synopsis
# Enumerates the parameters of one or more commands
#.Notes
# With many thanks to Hal Rottenberg, Oisin Grehan and Shay Levy
# Version 0.80 - April 2008 - By Hal Rottenberg http://poshcode.org/186
# Version 0.81 - May 2008 - By Hal Rottenberg http://poshcode.org/255
# Version 0.90 - June 2008 - By Hal Rottenberg http://poshcode.org/445
# Version 0.91 - June 2008 - By Oisin Grehan http://poshcode.org/446
# Version 0.92 - April 2008 - By Hal Rottenberg http://poshcode.org/549
# - Added resolving aliases and avoided empty output
# Version 0.93 - Sept 24, 2009 - By Hal Rottenberg http://poshcode.org/1344
# Version 1.0 - Jan 19, 2010 - By Joel Bennett http://poshcode.org/1592
# - Merged Oisin and Hal's code with my own implementation
# - Added calculation of dynamic paramters
# Version 2.0 - July 22, 2010 - By Joel Bennett http://poshcode.org/get/2005
# - Now uses FormatData so the output is objects
# - Added calculation of shortest names to the aliases (idea from Shay Levy http://poshcode.org/1982, but with a correct implementation)
# Version 2.1 - July 22, 2010 - By Joel Bennett http://poshcode.org/2007
# - Fixed Help for SCRIPT file (script help must be separated from #Requires by an emtpy line)
# - Fleshed out and added dates to this version history after Bergle's criticism ;)
# Version 2.2 - July 29, 2010 - By Joel Bennett (This Version)
# - Fixed a major bug which caused Get-Parameters to delete all the parameters from the CommandInfo
#
#.Description
# Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc.
#
# By default, formats the output to tables grouped by command and parameter set
#.Example
# Get-Command Select-Xml | Get-Parameter
#.Example
# Get-Parameter Select-Xml
#.Parameter Name
# The name of the command to get parameters for
#.Parameter ModuleName
# The name of the module which contains the command (this is for scoping)
#.Parameter Force
# Forces including the CommonParameters in the output
[CmdletBinding()]
##This is just script-file nesting stuff, so that you can call the SCRIPT, and after it defines the global function, it will call it.
param (
[Parameter(Position=1,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string[]]$Name
,
[Parameter(Position=2,ValueFromPipelineByPropertyName=$true,Mandatory=$false)]
$ModuleName
,
[switch]$Force
)
Function global:Get-Parameter {
#.Synopsis
# Enumerates the parameters of one or more commands
#.Description
# Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc.
#
# By default, formats the output to tables grouped by command and parameter set
#.Example
# Get-Command Select-Xml | Get-Parameter
#.Example
# Get-Parameter Select-Xml
#.Parameter Name
# The name of the command to get parameters for
#.Parameter ModuleName
# The name of the module which contains the command (this is for scoping)
#.Parameter Force
# Forces including the CommonParameters in the output
[CmdletBinding()]
param (
[Parameter(Position=1,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string[]]$Name
,
[Parameter(Position=2,ValueFromPipelineByPropertyName=$true,Mandatory=$false)]
$ModuleName
,
[switch]$Force
)
begin {
$PropertySet = @( "Name",
@{n="Position";e={if($_.Position -lt 0){"Named"}else{$_.Position}}},
"Aliases",
@{n="Short";e={$_.Name}},
@{n="Type";e={$_.ParameterType.Name}},
@{n="ParameterSet";e={$paramset}},
@{n="Command";e={$command}},
@{n="Mandatory";e={$_.IsMandatory}},
@{n="Provider";e={$_.DynamicProvider}},
@{n="ValueFromPipeline";e={$_.ValueFromPipeline}},
@{n="ValueFromPipelineByPropertyName";e={$_.ValueFromPipelineByPropertyName}}
)
function Join-Object {
Param(
[Parameter(Position=0)]
$First
,
[Parameter(ValueFromPipeline=$true,Position=1)]
$Second
)
begin {
[string[]] $p1 = $First | gm -type Properties | select -expand Name
}
process {
$Output = $First | Select $p1
foreach($p in $Second | gm -type Properties | Where { $p1 -notcontains $_.Name } | select -expand Name) {
Add-Member -in $Output -type NoteProperty -name $p -value $Second."$p"
}
$Output
}
}
}
process{
foreach($cmd in $Name) {
if($ModuleName) { $cmd = "$ModuleName\\$cmd" }
$commands = @(Get-Command $cmd)
foreach($command in $commands) {
# resolve aliases (an alias can point to another alias)
while ($command.CommandType -eq "Alias") {
$command = @(Get-Command ($command.definition))[0]
}
if (-not $command) { continue }
$Parameters = @{}
foreach($provider in Get-PSProvider) {
$drive = "{0}\\{1}::\\" -f $provider.ModuleName, $provider.Name
Write-Verbose ("Get-Command $command -Args $drive | Select -Expand Parameters")
[Array]$MoreParameters = (Get-Command $command -Args $drive).Parameters.Values
[Array]$Dynamic = $MoreParameters | Where { $_.IsDynamic }
foreach($p in $MoreParameters | Where { $Dynamic -notcontains $_ } ){
$Parameters.($p.Name) = $p
}
# Write-Verbose "Drive: $Drive | Parameters: $($Parameters.Count)"
if($dynamic) {
foreach($d in $dynamic) {
if(Get-Member -input $Parameters.($d.Name) -Name DynamicProvider) {
Write-Debug ("ADD:" + $d.Name + " " + $provider.Name)
$Parameters.($d.Name).DynamicProvider += $provider.Name
} else {
Write-Debug ("CREATE:" + $d.Name + " " + $provider.Name)
$Parameters.($d.Name) = $Parameters.($d.Name) | Add-Member NoteProperty DynamicProvider @($provider.Name) -Passthru
}
}
}
}
## Calculate the shortest distinct parameter name -- do this BEFORE removing the common parameters or else.
foreach($p in $($Parameters.Keys))
{
$shortest="^"
foreach($char in [char[]]$p)
{
$shortest += $char
$Matches = ($Parameters.Keys -match $Shortest).Count
Write-Debug "$($shortest.SubString(1)) $Matches"
if($Matches -eq 1)
{
$Parameters.$p = $Parameters.$p | Add-Member NoteProperty Aliases ($Parameters.$p.Aliases + @($shortest.SubString(1).ToLower($PSUICulture))) -Force -Passthru
break
}
}
}
Write-Verbose "Parameters: $($Parameters.Count)`n $($Parameters | ft | out-string)"
foreach ($paramset in @($command.ParameterSets | Select -Expand "Name")){
foreach($parameter in $Parameters.Keys | Sort) {
Write-Verbose "Parameter: $Parameter"
if(!$Force -and ($Parameters.$Parameter.aliases -match "vb|db|ea|wa|ev|wv|ov|ob|wi|cf")) { continue }
if($Parameters.$Parameter.ParameterSets.ContainsKey($paramset) -or $Parameters.$Parameter.ParameterSets.ContainsKey("__AllParameterSets")) {
if($Parameters.$Parameter.ParameterSets.ContainsKey($paramset)) {
$output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.$paramSet
} else {
$output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.__AllParameterSets
}
Write-Output $Output | Select-Object $PropertySet | ForEach {
$null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadata")
$null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadataEx")
Write-Verbose "$(($_.PSTypeNames.GetEnumerator()) -join ", ")"
$_
}
}
}
}
}
}
}
}
# Since you can't update format data without a file that has a ps1xml ending, let's make one up...
$tempFile = "$([IO.Path]::GetTempFileName()).ps1xml"
Set-Content $tempFile @'
<?xml version="1.0" encoding="utf-8" ?>
<Configuration>
<Controls>
<Control>
<Name>ParameterGroupingFormat</Name>
<CustomControl>
<CustomEntries>
<CustomEntry>
<CustomItem>
<Frame>
<LeftIndent>4</LeftIndent>
<CustomItem>
<Text>Command: </Text>
<ExpressionBinding>
<ScriptBlock>"{0}/{1}" -f $(if($_.command.ModuleName){$_.command.ModuleName}else{$_.Command.CommandType.ToString()+":"}),$_.command.Name</ScriptBlock>
</ExpressionBinding>
<NewLine/>
<Text>Set: </Text>
<ExpressionBinding>
<ScriptBlock>if($_.ParameterSet -eq "__AllParameterSets"){"Default"}else{$_.ParameterSet}</ScriptBlock>
</ExpressionBinding>
<NewLine/>
</CustomItem>
</Frame>
</CustomItem>
</CustomEntry>
</CustomEntries>
</CustomControl>
</Control>
</Controls>
<ViewDefinitions>
<View>
<Name>ParameterMetadataEx</Name>
<ViewSelectedBy>
<TypeName>System.Management.Automation.ParameterMetadataEx</TypeName>
</ViewSelectedBy>
<GroupBy>
<PropertyName>ParameterSet</PropertyName>
<CustomControlName>ParameterGroupingFormat</CustomControlName>
</GroupBy>
<TableControl>
<TableHeaders>
<TableColumnHeader>
<Label>Name</Label>
<Width>22</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Aliases</Label>
<Width>12</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Position</Label>
<Width>8</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Mandatory</Label>
<Width>9</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Pipeline</Label>
<Width>8</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>ByName</Label>
<Width>6</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Provider</Label>
<Width>15</Width>
</TableColumnHeader>
<TableColumnHeader>
<Label>Type</Label>
</TableColumnHeader>
</TableHeaders>
<TableRowEntries>
<TableRowEntry>
<TableColumnItems>
<TableColumnItem>
<PropertyName>Name</PropertyName>
</TableColumnItem>
<TableColumnItem>
<PropertyName>Aliases</PropertyName>
</TableColumnItem>
<TableColumnItem>
<!--PropertyName>Position</PropertyName-->
<ScriptBlock>if($_.Position -lt 0){"Named"}else{$_.Position}</ScriptBlock>
</TableColumnItem>
<TableColumnItem>
<PropertyName>Mandatory</PropertyName>
</TableColumnItem>
<TableColumnItem>
<PropertyName>ValueFromPipeline</PropertyName>
</TableColumnItem>
<TableColumnItem>
<PropertyName>ValueFromPipelineByPropertyName</PropertyName>
</TableColumnItem>
<TableColumnItem>
<!--PropertyName>Provider</PropertyName-->
<ScriptBlock>if($_.Provider){$_.Provider}else{"All"}</ScriptBlock>
</TableColumnItem>
<TableColumnItem>
<PropertyName>Type</PropertyName>
</TableColumnItem>
</TableColumnItems>
</TableRowEntry>
</TableRowEntries>
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
'@
Update-FormatData -Append $tempFile
# This is nested stuff, so that you can call the SCRIPT, and after it defines the global function, we will call that.
Get-Parameter @PSBoundParameters
|
combined_dataset/train/non-malicious/sample_3_57.ps1
|
sample_3_57.ps1
|
ConvertFrom-StringData @'
id_ctswinsock=Winsock Component
id_ctswinsockdescription=Collects information about the Winsock component.
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBDE8S8bKEeIzjh
# VOioyoakP/JSa7mnkeOIMMJeUzFwGaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkzO5UNSkQCqNtjfTSAW5L8
# uyNUPaFZrLgWfbWGWlPOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADBsA6ZaiTBwRGl9FIsxZqf2Mgoj1DwprH1YD9+OMdHaGW6JM77LuW2FN
# 8LuO89SezJ2bDFsC/gmDB83AB4Hw4wiOIdq/Um7kyCgEuDc8GL+nGNcbSi5CMMVO
# X+wB8FnG2uNIKiQTFs+yCc2vSF51LbQktXuIooECoWFIaH5jqXhwFYxfVLcmtuLv
# g8o4Gd9pmXmpfG4nmvteN4YJ7fxHcR6j91mdaA4LFbIcSpnBRF1Dr9s+nQHQ5hqu
# 1Q7LBdNJNpwqIoI8JqtdbFw7IvIPYyht97ppHBFTgE+BNTxGU3xlPQYBA/IKFRPz
# 1zsRW7mDxDTR7HZFuLmNly0rf+ovuKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDw0PGr7Jk1wSRiJFme2HrWyD1bc6MWXRMVDKOwWL9QTgIGZxp9zspx
# GBMyMDI0MTAyODExNDA0OC4xMzlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw
# N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP
# AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0
# ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA
# AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4
# fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6
# IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR
# AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB
# 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDv7wZ3wPtBtnDiYsV0l70Y9FSaSmQXyTecA4iVATwR
# cDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+
# RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a
# AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAlEW4lrfWFxdKMmb1KteH
# uQpe9luxEm33ErJO1eCMOpXM6YN2g8Q8i5gpzOUd2p4M7ucKzOLXJFqmBVDseRwo
# xs4ofBB7V6w/L5lQx/FUMRKJyP1YXTUnri/61fZIESOWEE1ym3M52E0Bp5cmWMs7
# 3tz4gtcrlWM3L2ehiaPy/jgAkErY6Epg/Abe4NUAYGXoyAD/PG7oIBxeDttPhsWe
# gvDbRbtTndAYvC4IosRBpsgUSmfWwuWVxr7LNZ5+emxkvanJ19xKnCnllfnbmt2s
# 8/K87tE+jrDtV3s3LhvTjKOP4GgjBN3kddsJgogf2zZU3yTTh3k31Q1PktSv0bAj
# clbWoXxNs3JGdTYCGzirDgJVyEwzQg/WVFgvcobZwFOGvDPEzA9TTd3o4zVQY4YZ
# Zm6DsFCUby6HpDOHdwu+s6RTccYBT9Y7XQj0FVknYPzIOIPDSyvY9SQSMatI8/gL
# sWEJKEID6CcjGf+e3srA9vdwdVAtRKtWozxf68aj/Ym3fzOEgGUKDgseigYmXi7I
# TeYozoczV0KyhLkJEyZYGnzQiRMlhRaObbmV01PtNPGwrpkNNYYfUrkO9ydQ8+TQ
# C2GnS+uA2wuR25+JP3JCvZ8v4mD5u5r6u+cikwMlMaepFBa+u0P9qI4pv2B0/fdn
# mZ+SHf/ZvCuj9ZrbaH/QFEU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_28_4.ps1
|
sample_28_4.ps1
|
# Localized 08/28/2023 11:37 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Fejlfinding
Troubleshoot_DetectNetworkCache=Kontrollerer netværkscache for Windows-medieafspiller ...
Resolution_Title=Løsning
Resolution_ResetConfiguration=Nulstiller alle konfigurationsindstillinger...
Resolution_ResetNetworkCache=Nulstiller konfigurationer af netværkscachen...
BinaryPath=Binær sti
Version=Version
Report_Name_WMPInformation=Analyseret version
Report_Description_WMPInformation=Oplysninger om Windows-medieafspiller
Report_Name_NetWorkCachedFile=Cachelagret konfiguration
Report_Description_NetWorkCachedFile=Oplysninger om konfiguration af netværkscache for Windows-medieafspiller
###PSLOC
'@
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.