full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_10_13.ps1
sample_10_13.ps1
########################################################################### # DC_Disk_Quota # Version 1.0 # Date: 09-26-2012 # Author: mifannin # Description: Collects Disk Quota Data ########################################################################### Import-LocalizedData -BindingVariable Quota -FileName DC_Disk_Quota -UICulture en-us Write-DiagProgress -Activity $Quota.ID_Quota $OutputFile = $ComputerName + "_Diskquota.txt" logstart $colItems = Get-CimInstance -class "Win32_DiskQuota" -namespace "root\CIMV2" foreach ($objItem in $colItems) { Add-Content $OutputFile ("Disk Space Used: " + $objItem.DiskSpaceUsed) Add-Content $OutputFile ("Limit: " + $objItem.Limit) Add-Content $OutputFile ("Quota Volume: " + $objItem.QuotaVolume) Add-Content $OutputFile ("Status: " + $objItem.Status) Add-Content $OutputFile ("User: " + $objItem.User) Add-Content $OutputFile ("Warning Limit: " + $objItem.WarningLimit) } CollectFiles -filesToCollect $OutputFile -fileDescription "Disk Quotas" -sectionDescription "System Information" logstop # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBeR+8qvVf+37In # ADqqDMFUaCXkrD7KwQC8w/HcsNxShKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM2zF3zPV6+NqdhV6ReOmCiK # PsDS6P199iLylFK4lqQXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAec+tsMhxs1ttvpk1CnwSVWLYwKFkJhXUFyugEXek1Dh2DezR4ULRxfdx # qoelFA3NibSLya5mt00teTRCAfpxpqP9X0/sGnsubrN5HgbVflX8QnF2OyecmtrQ # ZmEdGWHvnvcgaSR8kOFBMG1t6KQsLgQpC10oQhQTi0YPDSam0k01XbfWD8rqSJbB # RGsovumGVq2SFK2jQS/jOorUFMMyCCZSH18+8pENPT9n8QDEvAML9cvjyMD47Yy2 # Fcub5rhngiqV3Bb8FF7p5Bk1TtNkDuIo6MhkHQ9M58zMsCxy5EvExHQk3RQZgBqx # ACwJ/GD4XgqyaeAhXYlvv5QNjnWOFqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD+vA+p2pFjiD90Pq5xx4V1Sbu+wR04pbxd/zxYtcrnPgIGZusiCs72 # GBMyMDI0MTAyODExNDA0NC40OTVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91ggdQTK+8L0AAEAAAH3MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM2MDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0OdHTBNom6/uXKaEKP9r # PITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3k6EQlwqy6ROz42e0R5eD # W+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW2NcWUJW3Qo2AuJ0HOtbl # SpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8U6DRccQm1FdhmPKgDzgc # fDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFHTDkGLdpnDV5FXjVObAgb # SM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn1uA8hRhj09Hs33HRevt4 # oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE4feEkuz7TAwgkRBcUzLg # Q4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPXD9It2ez+mqEzgFRRsJGL # tcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pIvA5irlal7qFhkAeeeZqm # op8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJQAQkllKsI+UJqGq9rmRA # BJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9GqtDx3/aU+yqNRcB8w0tS # XUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTfRqQzP3m9 # PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAN0ajafILeL6S # QIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAbQxTrqnXvVWWeNst5YQD8 # saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXLzJXKhZM09ouPwNsrn8YO # LIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0G5lcQknAXqHa9nQdWp1Z # xXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWtqyLMl65TW6wRM7XlF7Y+ # PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9ba43UU6TgzVZaBm8VaA0w # SwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjBVXm8KVDn2cML9IvRK02s # 941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aMH5xa1Zjb/K8u9f9M05U0 # /bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2NiOcYTGV/DcLrLCBK2zG5 # 03FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG85anlhhGxxBQ5mFsJGkB # n0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5VVN36CO1kDU4ABkSYTXOM # 8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNBjmM7/nqw3bgrEOaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0MTAyOTA2NDM1MFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEAAgIPIDAHAgEAAgIT5zAK # AgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBaN24RfbEDYuiZ # zqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yduik5ad6IJA7n3eXZZvkf # ovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0GfRa6QSb/KpHS+RGIAeR # p0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578OFTecSrudpM+HrP9rwux # bsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI/x2UnsP+/eCeuyNqOYe6 # VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRNky50Lo7MnEMgN3LQB6Hb # 4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgI9LlKq47baOl # hJxZ4R5IR7tc9cIPzmHn3ajtqQfiWmwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5SoIH5Z4jCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB91ggdQTK+8L0AAEAAAH3 # MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/bgvEVMA0GCSqGSIb3DQEB # CwUABIICABB9QWm6WNLSiBYLNOJ7mUpc4eK5/JvAhLg5oopyyalC3xKwdNFqZsbz # A/kMauLAJdNl3ajU+WonRkjr959051wwT0h+LYUgdndAvvVFkBJr5sRmK4AYfXyJ # cIdhMByqIVfFoDvwmjJN9QM25q5VtuIEZr9YQqoMcEB0nJxGtOKGw9+MoiMJTCbT # yQUBd1YizH/maa9MGkXIGW/T+vh3iMvN+KPffaJ8eixai8ZUv5xG2gFprziO/ASb # xBrfly0rGoMelx0ykR66vo4CUkuidAtyyyyIeAjuKKLzk+QIiMu/VR4dRm+/cedv # l9TEdQkYwnldcoXDSEWYVM5/t9Oy8yeNcTXRm8w8v4jq1R8sTFFjXG4iYbExSbzf # hF79OJUUNbIMs9+tNRCj/YfDetoY/80lSLiRpXb+O3sBoekU7tVBzI/QEwezUguL # w1bmIrpqnsKQTOuDra0kF6RC6wgHPHRAktNbm5ru12DCRTSccEs2foCjzlh/J4ul # Y1tVDoSBWyo5NUXkUlkEwnSdJTMeg+N3fbUMU4ic658RioTshUfu/sRSir2PGP+N # TsEYUSIkP1FQPUW8qYk+NQ8qBXHMa4MVftm/ZEuZiaKlHGZPNHr5LkGs8VsmPQjV # dn22bIWJ5MIEdlEJvUhw+niFZF7TMX+EWxXmcnpVWS7/8c/GqZKf # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_28.ps1
sample_23_28.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Sets an EventHub Consumer Group .Description Sets an EventHub Consumer Group #> function Set-AzEventHubConsumerGroup{ [OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IConsumerGroup])] [CmdletBinding(DefaultParameterSetName = 'SetExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of the Consumer Group.")] [Alias('ConsumerGroupName')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of the Consumer Group. ${Name}, [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of EventHub namespace")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of EventHub namespace ${NamespaceName}, [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of EventHub")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of EventHub ${EventHubName}, [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName = 'SetExpanded', HelpMessage = "The ID of the target subscription.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName = 'SetViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, HelpMessage = "User Metadata is a placeholder to store user-defined string data with maximum length 1024. e.g. it can be used to store descriptive data, such as list of teams and their contact information also user-defined configuration settings can be stored.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] # User Metadata is a placeholder to store user-defined string data with maximum length 1024. e.g. it can be used to store descriptive data, such as list of teams and their contact information also user-defined configuration settings can be stored. ${UserMetadata}, [Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(HelpMessage = "Run the command asynchronously")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ try{ $hasUserMetadata = $PSBoundParameters.Remove('UserMetadata') $hasAsJob = $PSBoundParameters.Remove('AsJob') $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') $consumerGroup = Get-AzEventHubConsumerGroup @PSBoundParameters # 2. PUT $null = $PSBoundParameters.Remove('InputObject') $null = $PSBoundParameters.Remove('ResourceGroupName') $null = $PSBoundParameters.Remove('NamespaceName') $null = $PSBoundParameters.Remove('EventHubName') $null = $PSBoundParameters.Remove('Name') $null = $PSBoundParameters.Remove('SubscriptionId') if ($hasUserMetadata) { $consumerGroup.UserMetadata = $UserMetadata } if ($hasAsJob) { $PSBoundParameters.Add('AsJob', $true) } if ($PSCmdlet.ShouldProcess("EventHub Consumer Group $($consumerGroup.Name)", "Create or update")) { Az.EventHub.private\New-AzEventHubConsumerGroup_CreateViaIdentity -InputObject $consumerGroup -Parameter $consumerGroup @PSBoundParameters } } catch{ throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3BxJkSi4ecj5Z # dYjBehye9VoZo2gs5vnPgk4JLvzGeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGT0vOgF/9geN/IhoVvA/06T # DW2P9jGBi7rnJsRBb5qyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHppBLoXbGVaR+yS2nWzcP3MoXkdA3iBCitYb5tltPJ8AsHkHZjfq1Ta0 # SMEFKtoWmX3r/0fI6rQXZVL0ADJgFwKjfPvB9ff+9H/ZkNWDTdWLuzq+7ycRTep6 # pdwOIUFTCN6LUsyGpM7gqVWoQ2tJwLKvuzjZ74ZH/glzywdyZF4JW3+fpnKGV6Ch # VsTRqrPjRHUv0scQMm6i373qIs0MU+Y7OqF35sIQEB24qS/cwO0BR+k6BEhwT3ks # +6/v5M9DtD4qRsBAlr3kw+1CdirM9oXY+DNppWze8X0W7Inkgccvgl3UR7W1SDiy # DZLySPDEz8pK3WxNnf6nfQwHl9Otl6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDpH6mstZWfLx6Yrzb+EjssJkpfOG4y0ee+M77Z1uaTzgIGZjOp0H2F # GBMyMDI0MDUxNjA2NDIxNC4xNTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnv80cwIhgPMjAyNDA1MTYxMDUxNTFaGA8yMDI0MDUxNzEwNTE1MVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6e/zRwIBADAHAgEAAgIYFjAHAgEAAgIRgDAKAgUA # 6fFExwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAArYJu75laBFACHmVCdl # AkaTxkAzukDDgo/7GdN5eepjZtkjBi9c6nIPYIh/cAOZqsZ2CG6vzb8pWlfM1p3x # uHAUPHVB0fzXRSH8BqOJ3gHyNc4vIdmxYHxlWVC3C/n0QIp3Bac2Iw793pGaJQA2 # 6KXDsH2nGVwxWk/H0krk6h45MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgEqI5KaouHa+t4Sj6FoX6uqlEzcj5mOc0QNfpXl+E66EwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEIEuWfPppmlrjFhIBwZVulRhNbDX2wCYNSqFZft59LBvV # MA0GCSqGSIb3DQEBCwUABIICAHZ9qXFCbN4+4Hcltm+cGgvg/JVkKEdUVY2QbrHa # i79su+uea/C6pfIaXJcwNmGVQZvBaiRL051M1tNJRrRBWbb8ZnP94Wh2/deE83MG # vVGiWDHBJLxR3HgdORibMia+S38Q93jvHT5JwrvzcR0Ixhmx56rW+dtG/6ccut7X # Q0HvZk3RLxSUS2AbdHF1wNRnWIJ8Ex2vp9v2QwlXRKSzghIjvg/aoKwX0kQvNlxj # bI4yQqftyhunfQ6kXGubcu4TJho0ofst899KPgKCRvgtDMly3eTQQdRa4WaRe13+ # ndNUviJfcM1oawLNulsy+vOiTggeixd9TLXZydpYXj0RVuQsIITXMEy14pS+f++i # yvQq2rrYxE5Eus4EPHVf3h2bKUgMapqkYmrc5YZyO61LJn8bwTydKj+lk4dELAJp # 5JPAJh1Qm/r9JwSccUbfOB12JztBA7ULQoGCgd1K500zGe+LZ/3Zp0O8tNJxanfB # kwp5nh+vBggQcHAvh+HBckJs0k+UjuV8lxT2SllG3IEFXmHpxbU7cLFN6D+Acc3X # lEHzNX+uHnUHXmONjQ1bMSbfPz2+4B/YzVBmQsyVt2CRCz79wkj9eS6scPojXZYB # FisIPLXvWFunteGOKrXopS8PhlIZb6eAnjJDrnvr5fCUBrkggAtOnAZ/WJopWUa0 # /Kno # SIG # End signature block
combined_dataset/train/non-malicious/sample_19_23.ps1
sample_19_23.ps1
#************************************************ # DC_DSRegEntries.ps1 # Version 1.1 # Date: 2009-2019, 2022-10-14 # Author: + Walter Eder (waltere@microsoft.com) # Description: Collects Directory Services Registry Entries # Called from: TS_AutoAddCommands_DOM.ps1, TS_AutoAddCommands_NET.ps1 #******************************************************* function InsertRegHeader( [string] $RegHeader="", [string]$OutputFile) { if($RegHeader -ne "") { $RegHeader | Out-File -FilePath $OutputFile -Append -Encoding Default "=" * ($RegHeader.Length) | Out-File -FilePath $OutputFile -Append -Encoding Default } } Import-LocalizedData -BindingVariable InboxCommandStrings Write-DiagProgress -Activity $InboxCommandStrings.ID_DSRegentriesActivity -Status $InboxCommandStrings.ID_DSRegentriesStatus $OutputFile = $ComputerName + "_reg_DS_REGENTRIES.txt" $fileDescription = "Directory Services Registry Entries" InsertRegHeader -OutputFile $OutputFile -RegHeader "Authentication registry Key - Credential Providers and Filters, LogonUI (Vista/2008 only)" RegQuery -RegistryKeys "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "LSA registry key and subkeys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Winlogon registry key and subkeys" RegQuery -RegistryKeys "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Winlogon registry key in the user's profile" RegQuery -RegistryKeys "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "LanManServer and LanManWorkstation Parameters Registry Keys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters","HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters","HKLM\Software\Microsoft\Windows\Windows Error Reporting\FullLiveKernelReports" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Netlogon\Parameters registry Key" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\parameters" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "NTDS\Parameters registry Key" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Services\NTDS\parameters" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Product Options registry key and subkeys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "SOFTWARE\Microsoft\RPC registry key and subkeys" RegQuery -RegistryKeys "HKLM\SOFTWARE\Microsoft\Rpc" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "SOFTWARE\Policies\Microsoft\Windows NT\RPC registry key and subkeys" RegQuery -RegistryKeys "HKLM\Software\Policies\Microsoft\Windows NT\Rpc" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "System's and user's NetCache registry key where Offline Files settings are stored" RegQuery -RegistryKeys "HKLM\Software\Microsoft\Windows\CurrentVersion\NetCache","HKCU\Software\Microsoft\Windows\CurrentVersion\NetCache" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Registry keys showing scripts assigned to the user via Group Policy" RegQuery -RegistryKeys "HKCU\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Group Policy assigned 'Run at user logon' programs - programs assigned to run at user logon" RegQuery -RegistryKeys "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "RUN registry keys for the current user" RegQuery -RegistryKeys "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run","HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "RUN registry keys for the local machine" RegQuery -RegistryKeys "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run","HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce","HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "TCPIP\Parameters registry key" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" -OutputFile $OutputFile -fileDescription $fileDescription -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "W32Time registry key and subkeys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Services\w32time" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "Winreg registry key and subkeys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false InsertRegHeader -OutputFile $OutputFile -RegHeader "ProfileList registry key listing local profiles" RegQuery -RegistryKeys "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $true InsertRegHeader -OutputFile $OutputFile -RegHeader "SecurityProviders\SCHANNEL registry key and subkeys" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue} # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCXYMqdRmrlzD9y # KfGGHqTXZLdrCRsVPjsiGak8TyrgIaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKrF # AZsqxE+N0RE3etLEalCQWEWxvG2pj1LT9scY9I2pMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAhsySzb4cC8f+FjzqDt1dNhwPqYDyl4uiIWbz # kvY+fz14yyqPb/0kzsKa1J5frKWMOyCiLN96EnexvQu/tHqJHjFTuxEIMwsU9x4L # spNWv8BcPnWTrck/sDsJveT3cYhBZdplBSmxeBEQpA2eqsBe20ZX5inDBlovIzkR # i5cLFMXKENvmJEqOmz7yz4Em6XJq+6ue9pdWu+7fFSxWqH5be49NX9B7XrsjmFwo # /DNLO3sfARtxsznvaujQDcdQxlBsfbOwWDPvWxxRU2sBi2fdB8foGuxUadoiUay1 # 3NHdg2mAlE+c7Hb3ZXRi4czE2cz4xbeeexI+lGoA/04pZgKCEaGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDZXXVcA/PBQuFoPXMx4esPZxwqLNf8swVW # WYfpG8wXiAIGZxqDjw+IGBMyMDI0MTAyODExNDA0My4zOTZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQAB # AAAB8DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnry # mlJNCaGWommPy0eINf+4EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcn # Z/xg0AKoDYpBQOWrL9ObFShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikME # P/CtZHi8xW5XtAKp95cs3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1K # rG9mQ+ITgnRR/X2xTDMCz+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/g # QC9Rv4szLNGDaoePeK6IU0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgO # azUgUGs1aqpnLjz0YKfUqn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2 # FwAIHUeMfotXNQiytYfRBUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2e # pGtUjaluA2osOvQHZzGOoKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7Aq # Lm2+tAT26yI5veccDmNZsg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX # 3BhGT8TMU/GiUy3h7ClXOxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mg # f6YTppAaeP0ophx345ohtwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/M # mjZGVTAvx7YFWpslMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo # 5W4xj3/+0dCGwsz863QGZ2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLT # wQ5M+PRdy92DGftyEOGMHfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3h # zj3rX2wvoBZm2ythwcLeZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/ # t+vrQEIqlmebCeEi+VQVxc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4 # eHGFRpaKeiSQ0GXtlbGIbP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16 # AmqefDsfjBCWwf3qheIMfgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfX # dZjYRlscBDyr8zGMlprFC7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4X # WCVV/2Kn0AXtvWxvIfyOFm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHj # OVGXlrJT7X4hicF1o23x5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBM # YJhnktakWHpo9uIeSnYT6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310L # Op+0DaOXs8xjZvhpn+WuZij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDCKAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAi # GA8yMDI0MTAyODA1MjYzOVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqyZ8PAgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCP # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQ # Ldf34GsB8soqvapDL1eRrPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54 # lVtv7R+ycSEZGir7KV1CTjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+ # 80FYKXx5iFqcvs69kQXmxZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwE # h/jYgYnNOS/PJdyHj/FyfhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQF # ig7Ouj24B3wbU2l1uyvo5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4Gzqtlwfwx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfAqfB1ZO+YfrQABAAAB8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBPsqy8tg91yyuoASBuoI+1 # AhJWRchG0qkbfSPkdtX1MzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwB # mqOlcv3kU7mAB5sWR74QFAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3Sp # cmzGLGE6OkDlhx79aiWySoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIA # f7ehM52qXrX6j05PTGqTDLjo4ICnF+CW9vQJb4ZlBohtnR2PgoXg4vjg0+NARCGA # iojbv9tHz1V7Iy8uR93Hl/yWNjQicRkMocXjLIPviOUnO2eMzxy04JIiKhA5zUj5 # BYCNTg13UWGvkBTZi66EWorrK0UM1XPMBfG3wX6UTu65TBSGFID0nsCYuiZOrGBu # 82RbCeG7loEc2Jrrsrs1CMKysjonPdmbOMVKbvezBhC8Rdoenn5kNI4zka9Xh5c8 # t4seuDqGWUireTrbdnew0XOB7cTToNPE4nz0Gxw+KjvgsCg2MjAvQLYZZqzpWqZd # vyFW2wd6x5s1EZ31oxaH3I6hL3UY5NaVnFB9l3HsnV3/bBtfIr4WRaQ70vZ5y8qJ # P0uLXNHmbuq+5V9u9eaXOXxQIrRDYDIvyzxdm/YjhBk8zqEGpON7V4vWT+a5Is1u # XWEgyryuX7K03SM5Gi5GfymQHkKgqCfeE2+rsVicl4nZnYlmU0ZEULXos+Zj5g3n # rmYA/IDe4ZATKJ8+/y5eOm34PPsqM2klx2GMYf9nFaEg8D55kPo+MP9Rc8Dk9WGF # wlqzTI50vCEb6BVgML5Ocl0/lGHKwDMEsbUv09XWR7AxMB+sW65F64jx1TCGaROx # KkUF7/X+6oNJvYAAaSiXEgqBGhcofdlJv2bsa64sXBM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_91.ps1
sample_48_91.ps1
export function setControlAttribute(id, attrName, value) { const fieldElement = document.querySelector("#" + id)?.shadowRoot?.querySelector(".selected-value"); if (!!fieldElement) { fieldElement?.setAttribute(attrName, value); } } // SIG // Begin signature block // SIG // MIIoJwYJKoZIhvcNAQcCoIIoGDCCKBQCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // Y5S/X6cI3AbisNAcBDKoyUV8bccKyuJe1Kx1L8nn+P+g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghoJMIIaBQIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCCHNO1h8Atp3APErtIvD0JapNWcrSkktbvr // SIG // MkpMU/YnEjBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBACNpVQ9s // SIG // 9Lg5hpmW73zrtIWABhHJefw4xmpQXcUxBLfnIIP/VbOv // SIG // 5ICpwyN41PyMOfD616pfc1GSF0yR7IMw76Bmpc22SkNO // SIG // 6B74Y+mh4uadPKboLoJCeiCOfqOg72SC/NtHEuIdBkJa // SIG // jJLaffSzB7CJPIqr5BxyKeFqcvy1fXwweIz+pArjnR1U // SIG // hN5dtlNdBbzQRbc/QacZ8DrfbIHMA1BAcs5YP/urJtAJ // SIG // roT0tLn7QosbcdyfizjD9Caoo6hXVZXCzm2xud0z9kce // SIG // PbWJH52YvMDb/4PKmj2CqyoLRWkXXWGuPdfO5X2rPC3s // SIG // +XqrSFXAyQAJOQouN2KrB4VBHAGhgheTMIIXjwYKKwYB // SIG // BAGCNwMDATGCF38wghd7BgkqhkiG9w0BBwKgghdsMIIX // SIG // aAIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN // SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQg70kYnBivGEB1jycKhDr3 // SIG // Go+tBaoJVgYOXUgyuw3bVusCBmYyvpLZcBgTMjAyNDA1 // SIG // MDIwMDQyMzAuMjkxWjAEgAIB9KCB0aSBzjCByzELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0 // SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo // SIG // aWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYD // SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl // SIG // oIIR6TCCByAwggUIoAMCAQICEzMAAAHnLo8vkwtPG+kA // SIG // AQAAAecwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTE5WhcN // SIG // MjUwMzA1MTg0NTE5WjCByzELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl // SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO // SIG // OjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG // SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAwlefL+CLkOufVzzN // SIG // Q7WljL/fx0VAuZHYhBfPWAT+v0Z+5I6jJGeREnpn+RJY // SIG // uAi7UFUnn0aRdY+0uSyyorDFjhkWi3GlWxk33JiNbzES // SIG // dbczMAjSKAqv78vFh/EHVdQfwG+bCvkPciL8xsOO031z // SIG // xPEZa2rsCv3vp1p8DLdOtGpBGYiSc9VYdS4UmCmoj/Wd // SIG // txGZhhEwlooJCm3LgJ4b4d8qzGvPbgX2nh0GRBxkKnbJ // SIG // DOPBAXFklnaYkkgYgMcoR1JG5J5fTz87Qf0lMc0WY1M1 // SIG // h4PW39ZqmdHCIgFgtBIyuzjYZUHykkR1SyizT6Zd//lC // SIG // +F43NGL3anPPIDi1K//OE/f8Sua/Nrpb0adgPP2q/XBu // SIG // Fu+udLimgMUQJoC+ISoCF+f9GiALG8qiTmujiBkhfWvg // SIG // 315dS6UDzSke/drHBe7Yw+VqsCLon0vWFIhzL0S44ypN // SIG // Ekglf5qVwtAaD5JOWrH8a6yWwrCXjx0jhG5aSc0Zs2j+ // SIG // jjF8EXK2+01xUDrE5CrqpFr72CD71cwuvFDPjLJCz5Xd // SIG // XqnTjjCu0m239rRkmX9/ojsFkDHFlwfYMOYCtwCGCtPF // SIG // pCSbssz6n4rYLm3UQpmK/QlbDTrlvsBw2BoXIiQxdi5K // SIG // 45BVI1HF0iCXfX9rLGIrWfQrqxle+AUHH68Y75NS/I77 // SIG // Te5rpSMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTP/uCY // SIG // gJ82OHaRH/2Za4dSu96PWDAfBgNVHSMEGDAWgBSfpxVd // SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ // SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz // SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB // SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG // SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt // SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB // SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G // SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // dKHw25PpZVotXAup7H4nuSbadPaOm+gEQqb7Qz6tihT/ // SIG // oYvlDTT+yxnIirnJKlwpgUxSIXwXhksb5OsnKJHUK9/N // SIG // eaRDmmFk5x70NPvISsvOq9ReK3wbuKBweXE8tPE+KIax // SIG // vzmBvwf4DZ89Dper+7v6hI8+PM12emZcShsmcCpimVmg // SIG // Xdg2BMMyqXS5AcbOgOnp1mUdI2PquRXW1eOYIRkyoEq+ // SIG // RAgDpyw+J4ycH4yKtJkWVsA2UKF7SUmlR0rtpR0C92Bx // SIG // BYpLp21EyXzXwQyy+xr/rE5kYg2ZMuTgMaCxtoGk37oh // SIG // W36Zknz3IJeQjlM3zEJ86Sn1+vhZCNEEDb7j6VrA1PLE // SIG // frp4tlZg6O65qia6JuIoYFTXS2jHzVKrwS+WYkitc5mh // SIG // CwSfWvmDoxOaZkmq1ubBm5+4lZBdlvSUCDh+rRlixSUu // SIG // R7N+s2oZKB4fIg/ety3ho2apBbrCmlFu9sjI/8sU3hhA // SIG // zqCK9+ZMF8a9VLvs5Lq9svhbjWNKGY6ac6feQFtZXoT9 // SIG // MWjvqAVdV372grq/weT1QKdsc66LDBFHAMKSaYqPlWHy // SIG // Lnxo+5nl3BkGFgPFJq/CugLqPiZY/CHhUupUryoakKZn // SIG // QcwDBqjzkCrdTsN2V8XoSu7wIopt2YgC5TNCueOpNLGa // SIG // 8XWT4KZs+zvMPYBy7smQEHswggdxMIIFWaADAgECAhMz // SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA // SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN // SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp // SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx // SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA // SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 // SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF // SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc // SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus // SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130 // SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI // SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes // SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp // SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ // SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz // SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO // SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi // SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 // SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q // SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H // SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG // SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE // SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf // SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG // SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw // SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv // SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH // SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f // SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK // SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu // SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w // SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq // SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 // SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT // SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL // SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l // SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ // SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz // SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7 // SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY // SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX // SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU // SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz // SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/ // SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1 // SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 // SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG // SIG // ahC0HVUzWLOhcGbyoYIDTDCCAjQCAQEwgfmhgdGkgc4w // SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p // SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV // SIG // BAsTHm5TaGllbGQgVFNTIEVTTjo5MjAwLTA1RTAtRDk0 // SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAs3IE5xmrEsHv // SIG // 3a7vnD3tTRf78EOggYMwgYCkfjB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnd // SIG // PRQwIhgPMjAyNDA1MDEyMjEzNDBaGA8yMDI0MDUwMjIy // SIG // MTM0MFowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6d09 // SIG // FAIBADAGAgEAAgFQMAcCAQACAhMUMAoCBQDp3o6UAgEA // SIG // MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKg // SIG // CjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN // SIG // AQELBQADggEBAHu6LIvOEvIr8OnA7DXD1Kqm8vxgOHBu // SIG // wU1vCIxQ4gkIyXY9YwQ970NYzmooj8NyKozjWpBrjCVq // SIG // YQxPTKzqNlARsNdlOGilLini+ENJqtEYOrUbS2a1MgKt // SIG // SyceDqDXBWXRFvNkF5yTEh62gtypspnKZjdo0Oxjkf1k // SIG // CE8KWuRJf+9K7OpG4CxSaGJwlDKUz3qSgJOQ7nx/3Gq6 // SIG // 3ZC87GPw7hggUXKQLR9d5/ysYtfKZpezXZwIHn44Ona0 // SIG // vCMcst0FkH70GrUakRSSzlIX7ON5RaSLxQKkL/3FR2LX // SIG // 0I/1wvZE3AXiN+2vkcAKm++bmnj/M8I1JFHCEbXtQcnK // SIG // qx0xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET // SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk // SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 // SIG // aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt // SIG // cCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAN // SIG // BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G // SIG // CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBjo0iW // SIG // hCvrTJoggvH7HqXlByy+Y3M7ypK0rnORerXoczCB+gYL // SIG // KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9 // SIG // DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4w // SIG // fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 // SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p // SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj // SIG // cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHn // SIG // Lo8vkwtPG+kAAQAAAecwIgQgmE7bhzahaXZpQolCECnF // SIG // 16E2r1wbVVR82mb3VbSssrcwDQYJKoZIhvcNAQELBQAE // SIG // ggIAqgtZGoZzA17lw42bZw9260OiVykUabpm0mFV9yAw // SIG // TZ0wQPhLIysJgD9lPGbp4rxSKyveEV1IZjn/HLCGDNTy // SIG // IMNsLeADwcRm+DgakCx0wJvnkcZp4Q+bSNCBhxJX+MuN // SIG // yvvmBwHh/Fkn4c2rHiVtjERn/OUY7N9GWpKdDGyzHgY7 // SIG // 3hqrL2K+ZRqjwyYs1/vIYKakJF9DSn7nPfNuw4B+NX0T // SIG // 1QVGc/+8N/q1bv3MHRvGXgCvgBX/xW1mjg/+1p8urcrS // SIG // 3R3XGbv8FQ5D3IMbNMTU14Ov5qjWoErEvilcOQmDlmLF // SIG // riIDx4kDnAjqDXELZ6mFddGCFomFxXnLZ4nzzFuglaFo // SIG // xjZY+CuitVxzO5N3o78vAXvjhk9GfuWA72m3AgGNus4b // SIG // MUG29xOe58tvOb0E9LmuT58EcLjocIV4GTEXF4VeiCRN // SIG // 6qqVXLbfziwzn/wWlqSZipIG2puxWE84xnOMxlVeLhj/ // SIG // 59ttUZ+LK7AOPDEiroTXw2VUo7oflFZVDpvJ+yIqRFyF // SIG // 4ftoHxAgHBDX54wZSuCsf1TxhvHUb6vsdKvCulGvpNLt // SIG // 3QiuE8abYHHa3iKCSDm/jcZdwZy7Hfw8iF4TzenwXgCm // SIG // 49xUvdC8umyBFtpQeTMlk1wtr5n8IoHLss/IFj836qxP // SIG // k09wGEnQztcpaZH+z19ob45Pmu8= // SIG // End signature block
combined_dataset/train/non-malicious/sample_16_38.ps1
sample_16_38.ps1
# # Module manifest for module 'OCI.PSModules.Bastion' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Bastion.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2e2ff643-43d5-47ff-a4d4-2f965b778f45' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Bastion Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Bastion.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIBastion', 'Get-OCIBastionSession', 'Get-OCIBastionSessionsList', 'Get-OCIBastionsList', 'Get-OCIBastionWorkRequest', 'Get-OCIBastionWorkRequestErrorsList', 'Get-OCIBastionWorkRequestLogsList', 'Get-OCIBastionWorkRequestsList', 'Move-OCIBastionCompartment', 'New-OCIBastion', 'New-OCIBastionSession', 'Remove-OCIBastion', 'Remove-OCIBastionSession', 'Update-OCIBastion', 'Update-OCIBastionSession' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Bastion' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_98.ps1
sample_27_98.ps1
#Requires -RunAsAdministrator ##------------------------------------------------------------------ ## <copyright file="Install-ObservabilityExtension.ps1" company="Microsoft"> ## Copyright (C) Microsoft. All rights reserved. ## </copyright> ##------------------------------------------------------------------ <# .SYNOPSIS Installs Observability Arc Extension. .DESCRIPTION The script installs Observability Arc Extension on HCI environment. 1. It retrieves information from Arc for Server Agent, including subscriptionId, tenantId, resourceGroupName, and cloudName. 2. All Telemetry data will be sent to the EastUS database. 3. It installs Az.Accounts and Az.ConnectedMachine modules (if not present already) which are needed as a pre-requisite step. 4. It authenticates the user using 2FA and will continue after user confirms their identity by following the instructions (i.e. "WARNING: To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code ****** to authenticate.."). 5. It installs the extension on all cluster nodes or local node only (if the node is not a part of cluster). .EXAMPLE .\Install-ObservabilityExtension.ps1 -Verbose .\Install-ObservabilityExtension.ps1 -Canary .NOTES If Arc for Server agent is not running on the nodes or if cluster is not registered, the script would fail as it cannot fetch the required details to install the extension. #> [CmdletBinding()] Param( [Parameter(Mandatory=$false)] [System.Management.Automation.SwitchParameter] $Canary ) $ErrorActionPreference = "Stop" $functionName = $MyInvocation.MyCommand.Name #region Constants $gcsRegionName = 'eastus' ## For telemetry, all data goes to the same DB irrespective of the region, so defaulting to EastUS region. $extPublisherName = 'Microsoft.AzureStack.Observability' $extTypeName = 'TelemetryAndDiagnostics' $customExtName = 'TelemetryAndDiagnostics' $azureCanaryCloudName = 'AzureCanary' #endregion Constants #region Helper Functions Function Get-ExceptionDetails { [CmdLetBinding()] Param ( [Parameter(Mandatory, ValueFromPipeline)] [System.Management.Automation.ErrorRecord] $ErrorObject ) return @{ Errormsg = $ErrorObject.ToString() Exception = $ErrorObject.Exception.ToString() Stacktrace = $ErrorObject.ScriptStackTrace Failingline = $ErrorObject.InvocationInfo.Line Positionmsg = $ErrorObject.InvocationInfo.PositionMessage PScommandpath = $ErrorObject.InvocationInfo.PSCommandPath Failinglinenumber = $ErrorObject.InvocationInfo.ScriptLineNumber Scriptname = $ErrorObject.InvocationInfo.ScriptName } | ConvertTo-Json # The ConvertTo-Json will return the entire hashtable as string. } Function Write-Log { [CmdletBinding()] Param ( [Parameter(Mandatory, ValueFromPipeline)] [System.String] $Message, [Parameter(Mandatory=$False)] [ValidateSet("INFO","VERBOSE","WARN","ERROR")] [System.String] $Level = "INFO" ) $dateTimeStamp = $(Get-Date).ToString('u') $formattedMessage = "$dateTimeStamp : $Level : $Message" switch($Level.toUpper()) { "INFO" { Write-Host $formattedMessage break; } "VERBOSE" { Write-Verbose $formattedMessage break; } "WARN" { Write-Warning $formattedMessage break; } "ERROR" { Write-Error $formattedMessage break; } } } Function Get-ClusterNodesLocal { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name Write-Log "$functionName : Fetching cluster node(s)." $clusterNodes = @() if (Get-Command Get-ClusterNode -ErrorAction SilentlyContinue) { $clusterNodes = (Get-ClusterNode).Name } else { $clusterNodes += $env:COMPUTERNAME } Write-Log "$functionName : Cluster node(s) = $($clusterNodes -join ',')." return $clusterNodes } Function Get-ArcAgentInfo { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name try { Write-Log "$functionName : Fetching required details from Arc agent." $arcShow = & "$($env:ProgramW6432)\AzureConnectedMachineAgent\azcmagent.exe" show -j | ConvertFrom-Json $requiredArcAgentInfo = [Ordered] @{ ResourceGroupName = $arcShow.resourceGroup SubscriptionId = $arcShow.subscriptionId TenantId = $arcShow.tenantId CloudName = $arcShow.cloud Location = $arcShow.location } $missingDetails = @() foreach ($key in $requiredArcAgentInfo.Keys) { if ([System.String]::IsNullOrEmpty($requiredArcAgentInfo[$key])) { $missingDetails += $key } } if ($missingDetails.Count -gt 0) { Write-Log "$functionName : The script cannot proceed as the required registration detail(s) are missing (i.e. $($missingDetails -join ',')) from the Arc agent." -Level ERROR } Write-Log "$functionName : Arc agent info = $($requiredArcAgentInfo | ConvertTo-Json -Compress)" return $requiredArcAgentInfo } catch { $exceptionDetails = Get-ExceptionDetails $_ Write-Log "$functionName : Exception occurred while fetching required details from Arc agent. Exception : $exceptionDetails." -Level ERROR } } Function Install-RequiredPackagesAndModules { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name Write-Log "$functionName : Installing NuGet package provider." Install-PackageProvider -Name NuGet -Force -Confirm:$false Write-Log "$functionName : Installing PowershellGet." Install-Module -Name PowershellGet -Force -Confirm:$false -SkipPublisherCheck $modulesToInstall = @( @{ Name = 'Az.Accounts' Version = '2.10.4' }, @{ Name = 'Az.ConnectedMachine' Version = '0.4.1' } ) foreach ($module in $modulesToInstall) { $mName = $module.Name $mVersion = $module.Version $isModuleInstalled = $false Write-Log "$functionName : Checking whether module ($mName) with version ($mVersion) is already present. If not then install or update to the respective version." $existingModule = Get-Module -Name $mName -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ([System.String]::IsNullOrEmpty($existingModule) -or ($existingModule.Version -lt $mVersion)) { Write-Log "$functionName : Installing or updating module ($mName) with version ($mVersion)." Write-Log "$functionName : $(Install-Module $mName -RequiredVersion $mVersion -Force -AllowClobber -Verbose)" -Level VERBOSE Write-Log "$functionName : Importing module ($mName) with version ($mVersion)." Write-Log "$functionName : $(Import-Module $mName -RequiredVersion $mVersion -Force -Verbose)" -Level VERBOSE $isModuleInstalled = $true } else { Write-Log "$functionName : Module ($mName) with version ($mVersion) already exists." } if ($isModuleInstalled) { Write-Log "$functionName : Validating whether module ($mName) is installed with correct version ($mVersion) or not." $installedModule = Get-Module -Name $mName -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ([System.String]::IsNullOrEmpty($installedModule) -or ($installedModule.Version -lt $mVersion)) { Write-Log "$functionName : Failed to install or update module ($mName) with version ($mVersion)." ` -Level ERROR } else { Write-Log "$functionName : Successfully installed and imported module ($mName) with version ($mVersion)." } } } } #endregion Helper Functions #region Main Write-Log "$functionName : The data from Observability extension will be uploaded to the database present in `"$gcsRegionName`" region." -Level WARN Write-Log "$functionName : Starting installation of Observability extension." try { $arcAgentInfo = Get-ArcAgentInfo Install-RequiredPackagesAndModules Write-Log "$functionName : Authenticate user's identity." Connect-AzAccount ` -SubscriptionId $arcAgentInfo.SubscriptionId ` -TenantId $arcAgentInfo.TenantId ` -DeviceCode ` -ErrorAction Stop ` | Out-Null Write-Log "$functionName : User authenticated successfully." $clusterNodes = Get-ClusterNodesLocal if ($Canary) { Write-Log "$functionName : Canary switch was used." $cloudName = $azureCanaryCloudName } else { $cloudName = $arcAgentInfo.CloudName } Write-Log "$functionName : CloudName value is set to = $cloudName." $exceptionMessage = [System.String]::Empty $extPublicSettings = @{ region = $gcsRegionName cloudName = $CloudName } foreach ($clusterNode in $clusterNodes) { Write-Log "$functionName : Checking whether extension already exists on $clusterNode or not." $extensionExistsResult = Get-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -MachineName $clusterNode ` -ErrorAction SilentlyContinue if ($null -ne $extensionExistsResult) { $exceptionMessage += "ExtensionExistsResult = $extensionExistsResult`n" Write-Log "$functionName : Extension exists already on node $clusterNode. Skipping installation." continue } else { Write-Log "$functionName : Extension not found on node $clusterNode." } Write-Log "$functionName : Installing extension on node $clusterNode. This might take a while..." New-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -Location $arcAgentInfo.Location ` -MachineName $clusterNode ` -Publisher $extPublisherName ` -ExtensionType $extTypeName ` -Settings $extPublicSettings ` -ErrorAction Stop ` | Out-Null Write-Log "$functionName : Checking whether extension is installed on node $clusterNode or not." $installationCheckResult = Get-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -MachineName $clusterNode ` -ErrorAction SilentlyContinue if ($null -eq $installationCheckResult -or ` $installationCheckResult.ProvisioningState -ne "Succeeded" -or ` $installationCheckResult.MachineExtensionType -ne $extTypeName) { $exceptionMessage += "InstallationCheckResult = $installationCheckResult`n" Write-Log "$functionName : Observability extension installation failed on node $clusterNode with exception $installationCheckResult." ` -Level ERROR continue } else { Write-Log "$functionName : Observability extension installation succeeded on node $clusterNode with version $($installationCheckResult.TypeHandlerVersion)." } } if ([System.String]::IsNullOrEmpty($exceptionMessage) -and ` [System.String]::IsNullOrWhiteSpace($exceptionMessage)) { Write-Log "$functionName : Successfully installed Observability extension on all the cluster nodes." } } catch { $exceptionDetails = Get-ExceptionDetails -ErrorObject $_ Write-Log "$functionName : Observability extension installation failed due to unhandled exception: $exceptionDetails" -Level ERROR } #endregion Main # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB0E+rc7QFEohKP # wmQJM09P9VCM0SxQ87Lf4OcejzHOfaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIyG1nYXaacxt4L4aCuVpR2d # nNLkvRSGXp7IQMcPPAgHMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEABhWycvAkPXZI/oKGCNRav4pIpYQpOOsCtby+c0n78+LOf30g65UjCn31 # eORlXEQlce9O5N744pZ0phz9eU8G0s9k5NmW2fDJCw4+wEGC/ob2FWJkusf2l/zc # zcfc0SBlKjw0cyurLxP3FNr6Cjqgtrh4vqFJjiw4zGOT9TzZtOcLybtye/AMeuCS # n1MbM4vZXOYD7beMvJ5iJiW/0NwCoKCnd4SnFMsimA5KEEb+K00sk/LqBNhTT1wP # SjC8u/e9mBD6izYARkaGWqBypR11bqEF+8WWbQMLnDEfpPBQ0rcV2KDl67sjfjby # mZngGvSywUqj/nFSqTutCHKlTLetRqGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA/qORZJ2WRMzSDLKHH5bPYcb+tjDVM7mv0yECB1vWtuAIGZbwTqN6E # GBIyMDI0MDIxMjE0MDg0Ni4zNVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB6+AYbLW27zjtAAEAAAHrMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz # NFoXDTI1MDMwNTE4NDUzNFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAMEVaCHaVuBXd4mnTWiqJoUG5hs1zuFIqaS28nXk2sH8 # MFuhSjDxY85M/FufuByYg4abAmR35PIXHso6fOvGegHeG6+/3V9m5S6AiwpOcC+D # YFT+d83tnOf0qTWam4nbtLrFQMfih0WJfnUgJwqXoQbhzEqBwMCKeKFPzGuglZUB # Mvunxtt+fCxzWmKFmZy8i5gadvVNj22el0KFav0QBG4KjdOJEaMzYunimJPaUPmG # d3dVoZN6k2rJqSmQIZXT5wrxW78eQhl2/L7PkQveiNN0Usvm8n0gCiBZ/dcC7d3t # KkVpqh6LHR7WrnkAP3hnAM/6LOotp2wFHe3OOrZF+sI0v5OaL+NqVG2j8npuHh8+ # EcROcMLvxPXJ9dRB0a2Yn+60j8A3GLsdXyAA/OJ31NiMw9tiobzLnHP6Aj9IXKP5 # oq0cdaYrMRc+21fMBx7EnUQfvBu6JWTewSs8r0wuDVdvqEzkchYDSMQBmEoTJ3mE # fZcyJvNqRunazYQlBZqxBzgMxoXUSxDULOAKUNghgbqtSG518juTwv0ooIS59Fsr # mV1Fg0Cp12v/JIl+5m/c9Lf6+0PpfqrUfhQ6aMMp2OhbeqzslExmYf1+QWQzNvph # LOvp5fUuhibc+s7Ul5rjdJjOUHdPPzg6+5VJXs1yJ1W02qJl5ZalWN9q9H4mP8k5 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUdJ4FrNZVzG7ipP07mNPYH6oB6uEwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAIN03y+g93wL5VZk/f5bztz9Bt1tYrSw631n # iQQ5aeDsqaH5YPYuc8lMkogRrGeI5y33AyAnzJDLBHxYeAM69vCp2qwtRozg2t6u # 0joUj2uGOF5orE02cFnMdksPCWQv28IQN71FzR0ZJV3kGDcJaSdXe69Vq7XgXnkR # JNYgE1pBL0KmjY6nPdxGABhV9osUZsCs1xG9Ja9JRt4jYgOpHELjEFtGI1D7Wodc # MI+fSEaxd8v7KcNmdwJ+zM2uWBlPbheCG9PNgwdxeKgtVij/YeTKjDp0ju5Qslsr # EtfzAeGyLCuJcgMKeMtWwbQTltHzZCByx4SHFtTZ3VFUdxC2RQTtb3PFmpnr+M+Z # qiNmBdA7fdePE4dhhVr8Fdwi67xIzM+OMABu6PBNrClrMsG/33stEHRk5s1yQljJ # BCkRNJ+U3fqNb7PtH+cbImpFnce1nWVdbV/rMQIB4/713LqeZwKtVw6ptAdftmvx # Y9yCEckAAOWbkTE+HnGLW01GT6LoXZr1KlN5Cdlc/nTD4mhPEhJCru8GKPaeK0Cx # ItpV4yqg+L41eVNQ1nY121sWvoiKv1kr259rPcXF+8Nmjfrm8s6jOZA579n6m7i9 # jnM+a02JUhxCcXLslk6JlUMjlsh3BBFqLaq4conqW1R2yLceM2eJ64TvZ9Ph5aHG # 2ac3kdgIMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIAG # iXW7XDDBiBS1SjAyepi9u6XeoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdGiYMCIYDzIwMjQwMjEyMDk1MTIw # WhgPMjAyNDAyMTMwOTUxMjBaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl0aJgC # AQAwCgIBAAICCzICAf8wBwIBAAICEzAwCgIFAOl1uhgCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAj9Rsvl+zpsTJsTBcC4lwGQmGH7yJnaNKZHEdZ2dYIo9B # 7GO9iNqxjs7cvAjrB10HjfwIQrjmMpFVRwhJYbLhjCHXhkzrJDrQ60nV4FMO1B0D # bNZW2A2rAJIBcIDNZjH5Vvq6VFUwbp46jbww99go3h5ybTsYSU2LN0axQRutiFbo # n7MzQIkz6448BrOnfoO6Gf6wVac30nb8KO42bYKeVmVjJnZuWvluboGSuOiBuPEd # X8b2Xhv9htlnm+61EgRxnML5FVWRh8Ypn3lwBra9ZWAXP/A7NW7XM2fNbNZI35/6 # z9m0BCuKLqZDJyAoIe/6npHz5vtSmwpRqcaap6CFJzGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHr # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIOH6tEkxVaNz8WaNqyT6tHfUIADTatknTWE3oZXb0Rzk # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgzrdrvl9pA+F/xIENO2TYNJSA # ht2LNezPvqHUl2EsLPgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAevgGGy1tu847QABAAAB6zAiBCBJn52jJYP5GalWSxQdRAxn6TOm # hum4GwFc7I9KsrNAuzANBgkqhkiG9w0BAQsFAASCAgCpNyt0OYVbI9du1QeA5v4p # yYrBZ5FEDlnEBz0PYDj3hBJVB0ZWbvSL39rJ2jGUeTSeR+5eKSzhjlMzS9KMfZt8 # ZY7iYwBVDJBLQswfOgBdXIQbxXJnYPy/Vx/LINdvtiD+7hJ4Pa198mGIc4bxdahA # wLptHxuQXMbAeIWjGtbwg39b0VLnEi5XaBXhn5SuD7bIrQMEBnxNVYVvBFmTNZcZ # 1IMcI72o69FKy9itv60s9XQ5uqCcFEcXPP4Hoi09Uog915QufNwZX99V1F1Bl0Yr # O5E9IwwKAIpEjbw/+AwY901P3qYxhRJ6BJuII9lUXm+9tT5BvSjfJQ/PIhCoCgzC # Pyyv0fxk0tJLBXRr7XLibt3J3CHxnstyria37aVPqKuNTzaXiLYuK82qqlV79DUE # xz+Clqe3pa7z40aQ2SF3iEDYqQlTIjDW/ZPowLWhxfW92FuqCaoRjRrdxZSRfIwl # pxbdloh5/1EV08StNLL5S0zXnHWoWp/hBjz0pFL29m3EqmlBcEPZ0yja+pCtwpEm # uHzq1NAENZ/AlkkraxQkYTe1rVUJtvX7H+iphQGiE+reRA1hCyjgUjvwJBVy5iiM # 2NYCUmFSYnh4i5CkhzGOjyplNru2EJkg6kirH2drvqYvuEyWqzlG+2TX8QntAXrQ # eQMaXuxAv2uZ5IUlGyv9KQ== # SIG # End signature block
combined_dataset/train/non-malicious/4200.ps1
4200.ps1
Set-Variable -Name Errors -Value $null -Scope Global -Force Set-Variable -Name LogFile -Value "c:\windows\waller\Logs\BuildLogs\AdobeFlashPlayer.log" -Scope Global -Force Set-Variable -Name RelativePath -Scope Global -Force Function ConsoleTitle ($Title){ $host.ui.RawUI.WindowTitle = $Title } Function GetRelativePath { $Global:RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" } Function DisableIEActiveXControl ($AppName,$GUID,$Flag) { $Key = "HKLM:\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\"+$GUID If ((Test-Path $Key) -eq $true) { Write-Host $AppName"....." -NoNewline Set-ItemProperty -Path $Key -Name "Compatibility Flags" -Value $Flag -Force $Var = Get-ItemProperty -Path $Key -Name "Compatibility Flags" If ($Var."Compatibility Flags" -eq 1024) { Write-Host "Disabled" -ForegroundColor Yellow } else { Write-Host "Enabled" -ForegroundColor Red } } } Function EnableIEActiveXControl ($AppName,$GUID,$Flag) { $Key = "HKLM:\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\"+$GUID If ((Test-Path $Key) -eq $true) { Write-Host $AppName"....." -NoNewline Set-ItemProperty -Path $Key -Name "Compatibility Flags" -Value $Flag -Force $Var = Get-ItemProperty -Path $Key -Name "Compatibility Flags" If ($Var."Compatibility Flags" -eq 0) { Write-Host "Enabled" -ForegroundColor Yellow } else { Write-Host "Disabled" -ForegroundColor Red } } } cls EnableIEActiveXControl "Flash for IE" "{D27CDB6E-AE6D-11CF-96B8-444553540000}" "0x00000000" Start-Sleep -Seconds 5
combined_dataset/train/non-malicious/sample_57_69.ps1
sample_57_69.ps1
# # Module manifest for module 'OCI.PSModules.Dts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dts.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage', 'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList', 'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance', 'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate', 'Get-OCIDtsTransferApplianceEncryptionPassphrase', 'Get-OCIDtsTransferApplianceEntitlement', 'Get-OCIDtsTransferApplianceEntitlementList', 'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice', 'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob', 'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage', 'Get-OCIDtsTransferPackagesList', 'Mount-OCIDtsDevicesToTransferPackage', 'Move-OCIDtsApplianceExportJobCompartment', 'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob', 'New-OCIDtsTransferAppliance', 'New-OCIDtsTransferApplianceAdminCredentials', 'New-OCIDtsTransferApplianceEntitlement', 'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob', 'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob', 'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice', 'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage', 'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance', 'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob', 'Update-OCIDtsTransferPackage' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Add CounterPaths 2 Mongo.ps1
Add CounterPaths 2 Mongo.ps1
<# .NOTES AUTHOR: Sunny Chakraborty(sunnyc7@gmail.com) WEBSITE: http://tekout.wordpress.com CREATED: 8/20/2012 Requires: a) PowerShell v2 or better b) Requires Mongo Official C# driver https://github.com/mongodb/mongo-csharp-driver/downloads Tested using 1.5.0.X .DESCRIPTION Similar in vein to Add-EventLogs to MongoDB. http://poshcode.org/3586 The script takes about 100 counter paths, and pushes the raw value to a mongo database. Script can be modified to add CookedValue instead of Raw Value. TimeStamps are in UTC -4 (EDT) You can watch the events using MongoVue http://www.mongovue.com/ Script needs some clean-up to accept input from pipeline for computername, counter names etc. .STATUS Alpha - FASTPUBLISH .TODO a) Check if script can accept -continious #> $mongoDriverPath = 'C:\\Program Files (x86)\\MongoDB\\CSharpDriver 1.5' Add-Type -Path "$($mongoDriverPath)\\MongoDB.Bson.dll"; Add-Type -Path "$($mongoDriverPath)\\MongoDB.Driver.dll"; $db = [MongoDB.Driver.MongoDatabase]::Create('mongodb://localhost/eventsX'); $collection = $db['counters']; $counters= "memory", "processor", "logicaldisk", "physicaldisk" $paths = (get-counter -List $counters).paths #About 100 counter paths covering all memory, processor, logicaldisk and physical disk $samples = (get-counter -Counter $paths).CounterSamples foreach ($i in $samples) { [MongoDB.Bson.BsonDocument] $doc = @{ "_id"= [MongoDB.Bson.ObjectId]::GenerateNewId(); "Time"= $i.TimeBase; "Counters"= [MongoDB.Bson.BsonDocument] [ordered] @{ "Path"= $i.Path; "RawValue"= $i.RawValue; #EDT compensate UTC -4 hrs in minutes (-240) "TimeStamp"= ($i.Timestamp).AddMinutes(-240); "TimeStamp100nsec"= $i.Timestamp100NSec; }; #End of Counters }; #End of $doc $collection.Insert($doc); } #End of ForEach
combined_dataset/train/non-malicious/sample_14_5.ps1
sample_14_5.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Kusto.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBHxg6O8oknsdpf # HuRRC3pdJCtpMLOqJEOQyhaLE+Fo9qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILcNJTGddaN6CgrEsBgBcDAn # zWdP3LQEEP3JLx5/PwLDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAf8uzOLqUBdZnxPezz7Zh37NTz84iyhaXEJuzRlqnH40AzQmG48DSJOD0 # fQhnF/E3v4g8ISRq7M8XCXwJUYsapa8gXIh/jat/W3yR9a+Scuw03sByL8Qow73q # yF/ufSO9fr0ijDDlTH8hnINM2SiJGXNxiR6Z6847HpOntZ6vQ3kNNtc4G5ficefu # 5alnDCEvB4c6iMNhGrjkWTCfzBFfxAL/LN9sKXwIF4cxrSNa0gFv862fvaTElJHh # yduqrSmFVnBUlSMnFHexFCUZJs01cY4ACwIBC9wh+6TuAoCgZQJXilMwnDKolmEj # PSzIBUKoWnosFnWZgSql6WUpdADUq6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCXJJqaWl3tf0ajevcNXXAQEo7sXcgQmPGMg4nA1YcaugIGZiAgthQD # GBMyMDI0MDQyMzEzMTUxNi45MDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgjQA/oWxLUtjKzAjqZR3LZIHO5Qjxr8Hcs4xh2FSwgpswgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICAGtk8UknBQzT7NogEdCGHYeVFsDxsOzma6OT # kqIx01NYkyIJYFL6Zn3qxo3hz6ZpMMz0t+dDUhUsa5whIGiaIYWdTCWpAFCARScN # W7N9MEjgUJMBwRa+akKbfrdg3z4LvejLBAjq30MdyLm58qeyd1pboCTDIFQ52XzS # GsFcjWitqvWQxQU+daetN/uf/zvJLSnxT8/u+kFzt8Oa55pi8/Gn1CUAX40W05zO # 1mieGfym3VXUoEw0HJJ1g5AWFugnsh9ecxhmjVD1Ce4j+xDqbmpfBgWIch3WsEpk # ZUCOqQy9tXFcNRcw2iWj+5SnePLWmW8vUiWJVYWhaRrL6RO0dwDbZ21LDAgqHteg # R4iLbv5lcIyt2heGKBa34eAPRn1b3EhDd3wo68q3fgJdyVlnBOMkpnB8xq7YfjoD # BkRFcHpHZlUWeWuRStRRBcyT9Vs2p8F54UMBmFeJacXgPJ112xG5RcSmPQg0OJSO # st6oORACnwi+mAEVBJBFT/hcvplFL2rvIYWVC7gkPD+78PDSnRAI1IWdsqfn7ct5 # QEKiZFZjWrXeg0Lk2BxCBkjJnE8tUHN58g/AJATDGBcGAeX89PkoUXdCGGhTt9Q9 # j3AJNdZVNpn5yVlsqrPVf64Kq+WYeNnJJ1Bp5iVsnYuoxsePQ+JDSkIBvWI20SM5 # 62RqTpcI # SIG # End signature block
combined_dataset/train/non-malicious/sample_67_89.ps1
sample_67_89.ps1
# Queries EDP WNFs to get current configuration state. # param($scriptOutputPath, $scriptmode) $logpath = $scriptOutputPath + "\\" + $scriptmode + "EdpState.log" Add-Content -Path $logpath -Value ($scriptmode + ": Log EDP config info") # WNF (and other) p/invoke types. Add-Type -Path ($PSScriptRoot + "\\edputil.cs") $edpEnforcementLevelCachedWnf = new-object WnfStateName([uint32]"0xa3bd5c75", [uint32]"0x13920028") $change = 0; $buffer = new-object byte[] 4 $buffersize = $buffer.length $typeid = [IntPtr]::Zero $scope = [IntPtr]::Zero $return = [WnfUtil]::QueryWnfStateData([ref] $edpEnforcementLevelCachedWnf, $typeid, $scope, [ref] $change, $buffer, [ref] $buffersize) Add-Content -Path $logpath -Value "WNF_ENTR_EDPENFORCEMENTLEVEL_CACHED_POLICY_VALUE_CHANGED:" Add-Content -Path $logpath -Value ("change stamp: " + $change) Add-Content -Path $logpath -Value ("EDPEnforcementLevel value: " + $buffer[0].ToString()) $typeid = [IntPtr]::Zero $scope = [IntPtr]::Zero $change = 0; $protectedDomainNamesCachedWnf = new-object WnfStateName([uint32]"0xa3bd6475", [uint32]"0x13920028") $bufferForEpdns = new-object byte[] 1024 $bufferSizeForEpds = $bufferForEpdns.length $return = [WnfUtil]::QueryWnfStateData([ref] $protectedDomainNamesCachedWnf, $typeid, $scope, [ref] $change, $bufferForEpdns, [ref] $bufferSizeForEpds) Add-Content -Path $logpath -Value ("") Add-Content -Path $logpath -Value "WNF_ENTR_PROTECTEDDOMAINNAMES_CACHED_POLICY_VALUE_CHANGED:" Add-Content -Path $logpath -Value ("change stamp: " + $change) Add-Content -Path $logpath -Value ("EnterpriseIds value: " + [System.Text.Encoding]::Unicode.GetString($bufferForEpdns)) # Other examples... #[WnfUtil]::DmWnfPublish($wnf, $buffer, $buffer.Length) #[WnfUtil]::PublishWnfStateData($wnf, [IntPtr]::Zero, $buffer, $buffer.length, [IntPtr]::Zero) # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCwDmPtvhC9Pc9Y # k7h8Bw7AG/+R8aKefxRlg4enrAhnLqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICrq # XFL2XjKoeDurI3kl8o+TyMHJJaFL003mtqrT+WXoMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEALKE/epj7ckYgDFBVdxWNfNCTS/c9a1+ZmW4c # FOnbyLy1J8+2PIF0h43MfkY1sRsv1MCxZ/Uz7XRH5voiwnak7Y27tM+WKZB1PoAa # g9qtfrv030A2TRd2pxEMyV0CosO+oOaRZyfnRTs+nvlnN+2HstaofGa2X4Uz3syY # 8PJFkuwh9sx+drV9t/+9ZSCkLnkyd3wcRTwUwWRNgcTunEgkLTSJu47oAPI/Zwor # 0JqWNHGHFreVKvcJjKzWt63qZuT5DdazaEjVQ3/xGTEt+QKGcJcvav4qtU7eot4J # KwKJKY9X7wwPrC37JpspiNnGkM5XpxoVhkglc+lEWWJ6wqWf76GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCJVWYDvppXbc08GcNlNYfdF0OhR9FIxXtx # goT0PutdaAIGZkY8ejTCGBMyMDI0MDYxMjE1MDA0MC4wNDlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gAB # AAAB7zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17o # E4BIBKsm5kX4DUmCBWI0lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9 # Nob4VGVE6aoMo5hZ9NytXR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvy # M10jLjmLyKEegMHfvIwPmM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y7 # 0c+Twt04/RLqruv1fGP8LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+z # DqJYQNZP8O1Yo4kSckHT43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp5 # 0xI9ITpJXi0vEek8AejT4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4ga # VR4Sy/IoDv1vDWpe+I28/Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgB # TCCAKvEoYOTg7r2lF0Iubt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqS # rLyXAQIlXGhZ4gNcv4dv1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXp # T/+yc7hS/FolcmrGFJTBYlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk # 4ldR0HlsbT4heLlWlOElJQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCb # trw9P8A63bAVSJzLMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9 # EVdkP8xcQGZuIAIPRx9K1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHE # N8hhaBDb9NRaGnFWdtHxmJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4r # RWOVvpiDBGJARKiXWB9u2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXr # JnvvQGXAfNJGETJZGpR41nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2 # WNJSXkPGlNhrO27pPxgT111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLe # fN81F1C9p/cAKkE6u9V6ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieO # dwClYpcw0CjZe5KBx2xLa4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJs # i0fbUgdzsVMJYvqVw52WqQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg # +zRD9iwbc9uZrn+89odpInbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kE # GeikKJWHdto7eVJoJhkrUcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcj # x0iBiv90Mn0JiGfnA2/hLj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBLcI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hOoxTAi # GA8yMDI0MDYxMjA0NTUzM1oYDzIwMjQwNjEzMDQ1NTMzWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqE6jFAgEAMAoCAQACAgIDAgH/MAcCAQACAhPSMAoCBQDqFPpF # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHUuCQUD8TXFKl9WwVxXyAkJ # yiyIONkUT3JATw6qNEGxrJr80icsrPuZWu8nTofm5eu2FJoIPc++3GIYhGDxK3d4 # Cxf4O4RrDpEJxCqQZdKbBPLjgtUkDRDfHWUPAHCDjhE91yWgi6jAJWfFrr9qfkCg # 75AUWPgAPgVzSx0tJYeQX58W4aUErBaF0ig3dzCGqdEtkHulylgud3OtK5NxLysn # d5nU4nQQoIxMlNq5NEeW64DW93WANb/A90uCwwnHyD4YvpV2pDvO3NZAP8b1trbX # fny0Nw62rY/cUjxRCbKR45yV93NPcUN5Y0sSwTRaPwyQPTEY1pEYMCNe92LDCYox # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # Ae+JP1ahWMyo2gABAAAB7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCfqNfUrOVhWJFRVQ47/Ml7 # rBDT41FDCRxEWPLMy7pfbjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBh # KEW4Fo3wUz09NQx2a0DbcdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg+21K # 0Dc4PI1S++8CjPcLMPuEuO4begtbwfN457oxWzswDQYJKoZIhvcNAQELBQAEggIA # j64Fw6CCekLZFskHr/NFKkwsDpZUQBs8Ic/zDkJs+dBArDK34MPPuEY9jjfgVNL6 # G6mjqKyOF0PRHHvjn5HiB5RJS672o9U8XiV+uFOIrghLUvJ3gvvMexXThR0PhZu/ # myCiAbbnwl3xqL9N/nXy5NmW/l7n2zmsbikTTgaiQC8SxTxEoD+Og62Oh1cec7Sd # 2xA3lJuhyIFy4XcA2ZCCgzA937ZheYVv7t7FBTU24uhRJHQ8xxm/V2dCdrBJIwbM # SXRIjLHBmJQJt2ZhSF0rkADuFWovyyziG+SNSaofRt1FnGFKeKqMf9Dm/erp7IAi # G2P811L89zjzxrI0TryhULEbvBC3PlNu/PidjYvjmEYPMyUiYBdtgUtti7tFzQIv # P9bFa8ZJgUZBPBfy/3iCml3mG9M0PQ769sxqLRUv20FDxmMUVv1pAsoggxtHQICk # BtR4yJKh/WAg678bMZyWmg+rZm/wnzCCMYB29moz4gUs1SZ4EPnz8q+3hzfHk/HA # 8FT9z8dc4QeUW9S6zn3qvyKd9u+icd9EtVhiu6H/NiIx6Qy2BaCxS12LvFkq0vwY # MaPslOfQVN9PLYuUWpFceplwm3NIEzZ9WQFGGFer+DwfRe7QE3NCz1tZz478ur54 # Q+Dl61xfMqRHidR1i4pMXjkAf6Sf4F6t/ggrYU7lkBU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_38_15.ps1
sample_38_15.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # $resourceModuleRoot = Split-Path -Path (Split-Path -Path $PSScriptRoot -Parent) -Parent # Import localization helper functions. $helperName = 'PowerShellGet.LocalizationHelper' $dscResourcesFolderFilePath = Join-Path -Path $resourceModuleRoot -ChildPath "Modules\$helperName\$helperName.psm1" Import-Module -Name $dscResourcesFolderFilePath $script:localizedData = Get-LocalizedData -ResourceName 'MSFT_PSModule' -ScriptRoot $PSScriptRoot # Import resource helper functions. $helperName = 'PowerShellGet.ResourceHelper' $dscResourcesFolderFilePath = Join-Path -Path $resourceModuleRoot -ChildPath "Modules\$helperName\$helperName.psm1" Import-Module -Name $dscResourcesFolderFilePath <# .SYNOPSIS This DSC resource provides a mechanism to download PowerShell modules from the PowerShell Gallery and install it on your computer. Get-TargetResource returns the current state of the resource. .PARAMETER Name Specifies the name of the PowerShell module to be installed or uninstalled. .PARAMETER Repository Specifies the name of the module source repository where the module can be found. .PARAMETER RequiredVersion Provides the version of the module you want to install or uninstall. .PARAMETER MaximumVersion Provides the maximum version of the module you want to install or uninstall. .PARAMETER MinimumVersion Provides the minimum version of the module you want to install or uninstall. .PARAMETER Force Forces the installation of modules. If a module of the same name and version already exists on the computer, this parameter overwrites the existing module with one of the same name that was found by the command. .PARAMETER AllowClobber Allows the installation of modules regardless of if other existing module on the computer have cmdlets of the same name. .PARAMETER SkipPublisherCheck Allows the installation of modules that have not been catalog signed. #> function Get-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-ForEachStatement', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $Repository = 'PSGallery', [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.Boolean] $Force, [Parameter()] [System.Boolean] $AllowClobber, [Parameter()] [System.Boolean] $SkipPublisherCheck ) $returnValue = @{ Ensure = 'Absent' Name = $Name Repository = $Repository Description = $null Guid = $null ModuleBase = $null ModuleType = $null Author = $null InstalledVersion = $null RequiredVersion = $RequiredVersion MinimumVersion = $MinimumVersion MaximumVersion = $MaximumVersion Force = $Force AllowClobber = $AllowClobber SkipPublisherCheck = $SkipPublisherCheck InstallationPolicy = $null } Write-Verbose -Message ($localizedData.GetTargetResourceMessage -f $Name) $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('Name', 'Repository', 'MinimumVersion', 'MaximumVersion', 'RequiredVersion') # Get the module with the right version and repository properties. $modules = Get-RightModule @extractedArguments -ErrorAction SilentlyContinue -WarningAction SilentlyContinue # If the module is found, the count > 0 if ($modules.Count -gt 0) { Write-Verbose -Message ($localizedData.ModuleFound -f $Name) # Find a module with the latest version and return its properties. $latestModule = $modules[0] foreach ($module in $modules) { if ($module.Version -gt $latestModule.Version) { $latestModule = $module } } # Check if the repository matches. $repositoryName = Get-ModuleRepositoryName -Module $latestModule -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if ($repositoryName) { $installationPolicy = Get-InstallationPolicy -RepositoryName $repositoryName -ErrorAction SilentlyContinue -WarningAction SilentlyContinue } if ($installationPolicy) { $installationPolicyReturnValue = 'Trusted' } else { $installationPolicyReturnValue = 'Untrusted' } $returnValue.Ensure = 'Present' $returnValue.Repository = $repositoryName $returnValue.Description = $latestModule.Description $returnValue.Guid = $latestModule.Guid $returnValue.ModuleBase = $latestModule.ModuleBase $returnValue.ModuleType = $latestModule.ModuleType $returnValue.Author = $latestModule.Author $returnValue.InstalledVersion = $latestModule.Version $returnValue.InstallationPolicy = $installationPolicyReturnValue } else { Write-Verbose -Message ($localizedData.ModuleNotFound -f $Name) } return $returnValue } <# .SYNOPSIS This DSC resource provides a mechanism to download PowerShell modules from the PowerShell Gallery and install it on your computer. Test-TargetResource validates whether the resource is currently in the desired state. .PARAMETER Ensure Determines whether the module to be installed or uninstalled. .PARAMETER Name Specifies the name of the PowerShell module to be installed or uninstalled. .PARAMETER Repository Specifies the name of the module source repository where the module can be found. .PARAMETER InstallationPolicy Determines whether you trust the source repository where the module resides. .PARAMETER RequiredVersion Provides the version of the module you want to install or uninstall. .PARAMETER MaximumVersion Provides the maximum version of the module you want to install or uninstall. .PARAMETER MinimumVersion Provides the minimum version of the module you want to install or uninstall. .PARAMETER Force Forces the installation of modules. If a module of the same name and version already exists on the computer, this parameter overwrites the existing module with one of the same name that was found by the command. .PARAMETER AllowClobber Allows the installation of modules regardless of if other existing module on the computer have cmdlets of the same name. .PARAMETER SkipPublisherCheck Allows the installation of modules that have not been catalog signed. #> function Test-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $Repository = 'PSGallery', [Parameter()] [ValidateSet('Trusted', 'Untrusted')] [System.String] $InstallationPolicy = 'Untrusted', [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.Boolean] $Force, [Parameter()] [System.Boolean] $AllowClobber, [Parameter()] [System.Boolean] $SkipPublisherCheck ) Write-Verbose -Message ($localizedData.TestTargetResourceMessage -f $Name) $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('Name', 'Repository', 'MinimumVersion', 'MaximumVersion', 'RequiredVersion') $status = Get-TargetResource @extractedArguments # The ensure returned from Get-TargetResource is not equal to the desired $Ensure. if ($status.Ensure -ieq $Ensure) { Write-Verbose -Message ($localizedData.InDesiredState -f $Name) return $true } else { Write-Verbose -Message ($localizedData.NotInDesiredState -f $Name) return $false } } <# .SYNOPSIS This DSC resource provides a mechanism to download PowerShell modules from the PowerShell Gallery and install it on your computer. Set-TargetResource sets the resource to the desired state. "Make it so". .PARAMETER Ensure Determines whether the module to be installed or uninstalled. .PARAMETER Name Specifies the name of the PowerShell module to be installed or uninstalled. .PARAMETER Repository Specifies the name of the module source repository where the module can be found. .PARAMETER InstallationPolicy Determines whether you trust the source repository where the module resides. .PARAMETER RequiredVersion Provides the version of the module you want to install or uninstall. .PARAMETER MaximumVersion Provides the maximum version of the module you want to install or uninstall. .PARAMETER MinimumVersion Provides the minimum version of the module you want to install or uninstall. .PARAMETER Force Forces the installation of modules. If a module of the same name and version already exists on the computer, this parameter overwrites the existing module with one of the same name that was found by the command. .PARAMETER AllowClobber Allows the installation of modules regardless of if other existing module on the computer have cmdlets of the same name. .PARAMETER SkipPublisherCheck Allows the installation of modules that have not been catalog signed. #> function Set-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-ForEachStatement', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-TryStatement', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-CatchClause', '')] [CmdletBinding()] param ( [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $Repository = 'PSGallery', [Parameter()] [ValidateSet('Trusted', 'Untrusted')] [System.String] $InstallationPolicy = 'Untrusted', [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.Boolean] $Force, [Parameter()] [System.Boolean] $AllowClobber, [Parameter()] [System.Boolean] $SkipPublisherCheck ) # Validate the repository argument if ($PSBoundParameters.ContainsKey('Repository')) { Test-ParameterValue -Value $Repository -Type 'PackageSource' -ProviderName 'PowerShellGet' -Verbose } if ($Ensure -ieq 'Present') { # Version check $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('MinimumVersion', 'MaximumVersion', 'RequiredVersion') $null = Test-VersionParameter @extractedArguments try { $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('Name', 'Repository', 'MinimumVersion', 'MaximumVersion', 'RequiredVersion') Write-Verbose -Message ($localizedData.StartFindModule -f $Name) $modules = Find-Module @extractedArguments -ErrorVariable ev } catch { $errorMessage = $script:localizedData.ModuleNotFoundInRepository -f $Name New-InvalidOperationException -Message $errorMessage -ErrorRecord $_ } $trusted = $null $moduleFound = $null foreach ($m in $modules) { # Check for the installation policy. $trusted = Get-InstallationPolicy -RepositoryName $m.Repository -ErrorAction SilentlyContinue -WarningAction SilentlyContinue # Stop the loop if found a trusted repository. if ($trusted) { $moduleFound = $m break; } } try { # The repository is trusted, so we install it. if ($trusted) { Write-Verbose -Message ($localizedData.StartInstallModule -f $Name, $moduleFound.Version.toString(), $moduleFound.Repository) # Extract the installation options. $extractedSwitches = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters -ArgumentNames ('Force', 'AllowClobber', 'SkipPublisherCheck') $moduleFound | Install-Module @extractedSwitches 2>&1 | out-string | Write-Verbose } # The repository is untrusted but user's installation policy is trusted, so we install it with a warning. elseif ($InstallationPolicy -ieq 'Trusted') { Write-Warning -Message ($localizedData.InstallationPolicyWarning -f $Name, $modules[0].Repository, $InstallationPolicy) # Extract installation options (Force implied by InstallationPolicy). $extractedSwitches = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters -ArgumentNames ('AllowClobber', 'SkipPublisherCheck') # If all the repositories are untrusted, we choose the first one. $modules[0] | Install-Module @extractedSwitches -Force 2>&1 | out-string | Write-Verbose } # Both user and repository is untrusted else { $errorMessage = $script:localizedData.InstallationPolicyFailed -f $InstallationPolicy, 'Untrusted' New-InvalidOperationException -Message $errorMessage } Write-Verbose -Message ($localizedData.InstalledSuccess -f $Name) } catch { $errorMessage = $script:localizedData.FailToInstall -f $Name New-InvalidOperationException -Message $errorMessage -ErrorRecord $_ } } # Ensure=Absent else { $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('Name', 'Repository', 'MinimumVersion', 'MaximumVersion', 'RequiredVersion') # Get the module with the right version and repository properties. $modules = Get-RightModule @extractedArguments if (-not $modules) { $errorMessage = $script:localizedData.ModuleWithRightPropertyNotFound -f $Name New-InvalidOperationException -Message $errorMessage } foreach ($module in $modules) { # Get the path where the module is installed. $path = $module.ModuleBase Write-Verbose -Message ($localizedData.StartUnInstallModule -f $Name) try { <# There is no Uninstall-Module cmdlet for Windows PowerShell 4.0, so we will remove the ModuleBase folder as an uninstall operation. #> Microsoft.PowerShell.Management\Remove-Item -Path $path -Force -Recurse Write-Verbose -Message ($localizedData.UnInstalledSuccess -f $module.Name) } catch { $errorMessage = $script:localizedData.FailToUninstall -f $module.Name New-InvalidOperationException -Message $errorMessage -ErrorRecord $_ } } # foreach } # Ensure=Absent } <# .SYNOPSIS This is a helper function. It returns the modules that meet the specified versions and the repository requirements. .PARAMETER Name Specifies the name of the PowerShell module. .PARAMETER RequiredVersion Provides the version of the module you want to install or uninstall. .PARAMETER MaximumVersion Provides the maximum version of the module you want to install or uninstall. .PARAMETER MinimumVersion Provides the minimum version of the module you want to install or uninstall. .PARAMETER Repository Specifies the name of the module source repository where the module can be found. #> function Get-RightModule { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-ForEachStatement', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name, [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.String] $MaximumVersion, [Parameter()] [System.String] $Repository ) Write-Verbose -Message ($localizedData.StartGetModule -f $($Name)) $modules = Microsoft.PowerShell.Core\Get-Module -Name $Name -ListAvailable -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if (-not $modules) { return $null } <# As Get-Module does not take RequiredVersion, MinimumVersion, MaximumVersion, or Repository, below we need to check whether the modules are containing the right version and repository location. #> $extractedArguments = New-SplatParameterHashTable -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames ('MaximumVersion', 'MinimumVersion', 'RequiredVersion') $returnVal = @() foreach ($m in $modules) { $versionMatch = $false $installedVersion = $m.Version # Case 1 - a user provides none of RequiredVersion, MinimumVersion, MaximumVersion if ($extractedArguments.Count -eq 0) { $versionMatch = $true } # Case 2 - a user provides RequiredVersion elseif ($extractedArguments.ContainsKey('RequiredVersion')) { # Check if it matches with the installed version $versionMatch = ($installedVersion -eq [System.Version] $RequiredVersion) } else { # Case 3 - a user provides MinimumVersion if ($extractedArguments.ContainsKey('MinimumVersion')) { $versionMatch = ($installedVersion -ge [System.Version] $extractedArguments['MinimumVersion']) } # Case 4 - a user provides MaximumVersion if ($extractedArguments.ContainsKey('MaximumVersion')) { $isLessThanMax = ($installedVersion -le [System.Version] $extractedArguments['MaximumVersion']) if ($extractedArguments.ContainsKey('MinimumVersion')) { $versionMatch = $versionMatch -and $isLessThanMax } else { $versionMatch = $isLessThanMax } } # Case 5 - Both MinimumVersion and MaximumVersion are provided. It's covered by the above. # Do not return $false yet to allow the foreach to continue if (-not $versionMatch) { Write-Verbose -Message ($localizedData.VersionMismatch -f $Name, $installedVersion) $versionMatch = $false } } # Case 6 - Version matches but need to check if the module is from the right repository. if ($versionMatch) { # A user does not provide Repository, we are good if (-not $PSBoundParameters.ContainsKey('Repository')) { Write-Verbose -Message ($localizedData.ModuleFound -f "$Name $installedVersion") $returnVal += $m } else { # Check if the Repository matches $sourceName = Get-ModuleRepositoryName -Module $m if ($Repository -ieq $sourceName) { Write-Verbose -Message ($localizedData.ModuleFound -f "$Name $installedVersion") $returnVal += $m } else { Write-Verbose -Message ($localizedData.RepositoryMismatch -f $($Name), $($sourceName)) } } } } # foreach return $returnVal } <# .SYNOPSIS This is a helper function that returns the module's repository name. .PARAMETER Module Specifies the name of the PowerShell module. #> function Get-ModuleRepositoryName { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.Object] $Module ) <# RepositorySourceLocation property is supported in PS V5 only. To work with the earlier PowerShell version, we need to do a different way. PSGetModuleInfo.xml exists for any PowerShell modules downloaded through PSModule provider. #> $psGetModuleInfoFileName = 'PSGetModuleInfo.xml' $psGetModuleInfoPath = Microsoft.PowerShell.Management\Join-Path -Path $Module.ModuleBase -ChildPath $psGetModuleInfoFileName Write-Verbose -Message ($localizedData.FoundModulePath -f $psGetModuleInfoPath) if (Microsoft.PowerShell.Management\Test-path -Path $psGetModuleInfoPath) { $psGetModuleInfo = Microsoft.PowerShell.Utility\Import-Clixml -Path $psGetModuleInfoPath return $psGetModuleInfo.Repository } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCig4H1kVMWxA7U # uX1JaRBJmDsHSZHmuBUTkDBwWHafCqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINrf # opKTttFnQxH/yUSrBBDlhc9jughJyplsD267zxbiMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAKrZQHHLE0oHXMdXUbjm1SuZdxzLwshSeMHpb # q0djV21UIdhci3KS5Sz23vGhTDeJy8lTiYgruY6WbMPPqzlfbsN14c79Y+GF6QuN # O1U30qQw3qXu7WwZ3rZQuOISLRCwaXIC0QDY3qezO8NQ8rf7UxOZUQIHWB5aQKnG # Z5+NlXL6utCASiXWpXD2myqw6eXReKFoNJ2C23k0JlfdW5LMiLseuU2KZFa7KkqD # UZYkOJAh/hwELy+k0f1auArFDM60jFc3Mc53aXoqrZSqF2NsFr9gVMJGNVHjiicu # O6jJ2Z/Y2HhVMKbpowORW/Tr78enj0LQmaIcbuEuAVqaAAnk36GCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCSxSrpMi/Fbq6jSBJORINhVLxVCZj64e/K # W6JqGvUqDQIGZh/eShuJGBMyMDI0MDQyMzAyMjQxMi4zNTJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnQ89QwIhgPMjAyNDA0MjIyMjMzNTZaGA8yMDI0MDQy # MzIyMzM1NlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dDz1AIBADAHAgEAAgIZ # YzAHAgEAAgIRSDAKAgUA6dJFVAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # ACsGLidMNB923amrtoh7lUPC4gpqI+CV8/oQTRRek7rwT239tWnxfVFJ8A/RT1gx # wfSePbPnl6yZbm6K0sxBuUMal2vxFUV3WiV17hsD/8fX/6WCUQCo5QIb2yxZ/fcB # TgybqLLHqc8FBajGYlI2HWCWmU9qTWDZxTQSB7NSm3nwMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAA # AeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQggw1ofZRoOEOYgFhoP+nZT3dr92/v3ot13NOc7dyP # 7t0wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCS # b4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIEl2HwXPrxzy2naBahdo1gBd # OA86ZZQjibPRobE9iK5pMA0GCSqGSIb3DQEBCwUABIICAJyPu9w1xWxfxiurumXt # qCy93s8oQnY+d/cI7NgHRKfEApwSnZASZkCFuI5t44JB5p+AEw8eaO6Cu+h3WCql # Bln56Q//j/PSW7JnLaZ0gGIXYW4tPwTkK3vvQA1uLXAQpUTNFdpUyue+itpjuX4n # nU3qGz53VyCIzneP4yNy4JdDsG8hK+jffXAn7VddZiK873aCPjDp/lQUuOMCN0y1 # eZZb6qHPXmUuDRhGam5jZtzUvylBtvITjHGZkjIZDhVopgxcbGAZvs5D/pYKNPT4 # EmEEIk2GVDVc8UFfz3jYYY8Ql3UXAU7f3Y0AZiWGenYtOssiafCjSeRda/W1pNzH # IleaDX60Q5iXFW+yTlWg4/jE0Moj5GqkFobCy3qQ2Ymz8CWJb99f5BnKgrZpIvH0 # wn3l+k4rSkWN09OIh74R8R+XpP182ll9e9BqqvgCiyS3sT0SaIZ0Bm/CrAlpjfOn # cZIaufS5E2l7dHKh04kG2qS73dXvAZridSuomNlwaATV5e9KjfD9kQSbceskmmD8 # tr90liMCrCHooknNMZstCOBmbHmtex+Tc7EH3BV3zFfQTBUAr39qaHEY/Cd+lgd6 # QpWH8Dp+jKdP4l+9ZSYHTlRbnuUptTu0jTsxoxMyFaycc6Q5wS1HrXK7ESPIkfIU # bRrme0V9bpK/rSXmVQfXkVOQ # SIG # End signature block
combined_dataset/train/non-malicious/chkhash_32.ps1
chkhash_32.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } function noequal ( $first, $second) { if (!($second) -or $second -eq "") {return $true} $first=join-path $first "\\" foreach($s in $second) { if ($first.tolower().startswith($s.tolower())) {return $false} } return $true } # functions to print overwriting multi-line messages. Test script will accept a file/filespec/dir and iterate through all files in all subdirs printing a test message + file name to demostrate. # e.g. PS>.\\writefilename.ps1 c:\\ # call WriteFileName [string] # after done writing series of overwriting messages, call WriteFileNameEnd function WriteFileName ( [string]$writestr ) # this function prints multiline messages on top of each other, good for iterating through filenames without filling { # the console with a huge wall of text. Call this function to print each of the filename messages, then call WriteFileNameEnd when done # before printing anything else, so that you are not printing into a long file name with extra characters from it visible. if ($Host.Name -match 'ise') { write-host $writestr; return } if ($global:wfnlastlen -eq $null) {$global:wfnlastlen=0} $ctop=[console]::cursortop $cleft=[console]::cursorleft $oldwritestrlen=$writestr.length $rem=$null $writelines = [math]::divrem($writestr.length+$cleft, [console]::bufferwidth, [ref]$rem) #if ($rem -ne 0) {$writelines+=1} $cwe = ($writelines-(([console]::bufferheight-1)-$ctop)) # calculate where text has scroll back to. if ($cwe -gt 0) {$ctop-=($cwe)} write-host "$writestr" -nonewline $global:wfnoldctop=[console]::cursortop $global:wfnoldcleft=[console]::cursorleft if ($global:wfnlastlen -gt $writestr.length) { write-host (" " * ($global:wfnlastlen-$writestr.length)) -nonewline # this only overwrites previously written text if needed, so no need to compute buffer movement on this } $global:wfnlastlen = $oldwritestrlen if ($ctop -lt 0) {$ctop=$cleft=0} [console]::cursortop=$ctop [console]::cursorleft=$cleft } function WriteFileNameEnd ( $switch=$true) # call this function when you are done overwriting messages on top of each other { # and before printing something else. Default switch=$true, which prints a newline, $false restores cursor position same line. if ($Host.Name -match 'ise') { return } if ($global:wfnoldctop -ne $null -and $global:wfnoldcleft -ne $null) { [console]::cursortop=$global:wfnoldctop [console]::cursorleft=$wfnoldcleft if ($global:wfnoldcleft -ne 0 -and $switch) { write-host "" } } $global:wfnoldctop=$null $global:wfnlastlen=$null $global:wfnoldcleft=$null } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 del variable:\\exclude -ea 0 $args3=@() $args2=@($args) $nu = 0 $errs = 0 $fc = 0 $fm = 0 $upd = $false $create = $false $n = $null "ChkHash.ps1 - ChkHash.ps1 can create a .XML database of files and their SHA-512 hashes and check files against the database, " "in order to detect corrupt or hacked files." "" ".\\chkhash.ps1 -h for usage." "" for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" " -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)." "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " [hash all files on c:\\ and d:\\ and subdirs, create and store hashes in c:\\users\\bob\\hashes\\hashes.xml]" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml]" " [hash c:\\users\\alice\\pictures\\sunset.jpg and add or update the hash to c:\\users\\alice\\hashes\\picturehashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" " [hash all files in c:\\users\\eve\\documents and d:\\media\\movies, check against hashes stored in c:\\users\\eve\\hashes\\private.xml" " or create it and store hashes there if not present]" " PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes" " [hash all files in c:\\users\\eve and subdirs, check hashes against c:\\users\\eve\\hashes\\private.xml or store if not present, exclude " " c:\\users\\eve\\hashes directory and subdirs]" " PS>.\\chkhash.p1s c:\\users\\ted\\documents\\f* d:\\data -x d:\\hashes.xml -e d:\\data\\test d:\\data\\favorites -u" " [hash all files starting with 'f' in c:\\users\\ted\\documents, and all files in d:\\data, add or update hashes to" " existing d:\\hashes.xml, exclude d:\\data\\test and d:\\data\\favorites and subdirs]" " PS>.\\chkhash -x c:\\users\\alice\\hashes\\hashes.xml" " [Load hashes.xml and check hashes of all files contained within.]" "" "Note: files in subdirectories of any specified directory are automatically processed." " if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") { $i++ # Get hashes xml database path if ($i -ge $args2.count) { write-host "-X specified but no file path of .xml database specified. Exiting." exit } $hashespath=$args2[$i] continue } if ($args2[$i] -like "-e*") # Exclude files, dirs { while (($i+1) -lt $args2.count) { $i++ if ($args2[$i] -like "-*") {break} $exclude+=@(join-path $args2[$i] "\\") # collect array of excluded directories. } continue } $args3+=@($args2[$i]) # Add files/dirs } if ($args3.count -ne 0) { # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files, minus directories and minus files in excluded paths if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database if ($files.count -eq 0) {"No files found. Exiting."; exit} $files = $files | %{WriteFileName "SHA-512 Hashing: `"$($_.fullname)`" ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} WriteFileNameEnd $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hash(es) saved. Exiting." exit } write-host "Loading file hashes from $hashespath..." -nonewline $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database if (($xfiles.count -eq 0) -or ($files.count -eq 0)) {"No files in Database or no files specified. Exiting.";Exit} } else { if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit} write-host "Loading file hashes from $hashespath..." -nonewline $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database and check it if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit} $files=$xfiles | %{get-item -ea 0 -literalpath $_.fullname} } "Loaded $($xfiles.count) file hash(es)." $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { if ((get-item -ea 0 -literalpath $f.fullname) -eq $null) {continue} # skip if file no longer exists. $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {WriteFileName "Needs to be added: `"$($f.fullname)`"";WriteFileNameEnd;continue} # if not updating, then continue WriteFileName "SHA-512 Hashing `"$($f.fullname)`" ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} $xfiles+=@($f) # then add file + hash to list continue } WriteFileName "SHA-512 Hashing and checking: `"$($f.fullname)`" ..." $fc++ # File checked increment. if (($upd -eq $false) -and ($f.length -ne $xfiles[$n].length)) { $errs++ WriteFileName "Size mixmatch: `"$($f.fullname)`""; WriteFileNameEnd continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} # Check SHA512 and size for mixmatch. if ($xfiles[$n].length -eq $f.length) { if ($xfiles[$n].SHA512 -eq $f.SHA512) { $fm++;continue # if matched, increment file matches and continue loop } } $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; WriteFileName "Updated `"$($f.fullname)`""; WriteFileNameEnd;continue} WriteFileName "SHA-512 and/or size mixmatch found: `"$($f.fullname)`""; WriteFileNameEnd } WriteFileNameEnd # restore cursor position after last write string if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated Database: $hashespath" "$nu file hash(es) added to Database." "$errs file hash(es) updated in Database." exit } "$errs SHA-512 or size mixmatch(es) found." "$fm file(s) SHA512 and size matched." "$fc file(s) checked total." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
combined_dataset/train/non-malicious/1426.ps1
1426.ps1
function Get-CPrincipal { [CmdletBinding()] param( [Parameter(Mandatory)] [DirectoryServices.AccountManagement.Principal]$Principal, [Parameter(Mandatory)] [scriptblock]$Filter ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -SessionState $ExecutionContext.SessionState $principalTypeName = 'principal' if( $Principal -is [DirectoryServices.AccountManagement.UserPrincipal] ) { $principalTypeName = 'user' } elseif( $Principal -is [DirectoryServices.AccountManagement.GroupPrincipal] ) { $principalTypeName = 'group' } Write-Timing 'Get-CPrincipal' Write-Timing (' {0}' -f $principalTypeName) $searcher = New-Object 'DirectoryServices.AccountManagement.PrincipalSearcher' $Principal try { $principals = @() $maxTries = 100 $tryNum = 0 while( $tryNum++ -lt $maxTries ) { $numErrorsBefore = $Global:Error.Count try { Write-Timing (' [{0,3} of {1}] FindAll() Begin' -f $tryNum,$maxTries) $principals = $searcher.FindAll() | Where-Object -FilterScript $Filter Write-Timing (' FindAll() End') break } catch { Write-Timing (' FindAll() Failed') $_ | Out-String | Write-Debug $lastTry = $tryNum -ge $maxTries if( $lastTry ) { Write-Error -Message ('We tried {0} times to read {1} information, but kept getting exceptions. We''ve given up. Here''s the last error we got: {2}.' -f $maxTries,$principalTypeName,$_) -ErrorAction $ErrorActionPreference return } $numErrors = $Global:Error.Count - $numErrorsBefore for( $idx = 0; $idx -lt $numErrors; ++$idx ) { $Global:Error.RemoveAt(0) } Start-Sleep -Milliseconds 100 } } return $principals } finally { $searcher.Dispose() Write-Timing ('Get-CPrincipal') } }
combined_dataset/train/non-malicious/Add-SVNFile.ps1
Add-SVNFile.ps1
None
combined_dataset/train/non-malicious/sample_50_62.ps1
sample_50_62.ps1
using namespace System.Management.Automation using namespace System.Management.Automation.Language # This is an example profile for PSReadLine. # # This is roughly what I use so there is some emphasis on emacs bindings, # but most of these bindings make sense in Windows mode as well. Import-Module PSReadLine Set-PSReadLineOption -EditMode Emacs # Searching for commands with up/down arrow is really handy. The # option "moves to end" is useful if you want the cursor at the end # of the line while cycling through history like it does w/o searching, # without that option, the cursor will remain at the position it was # when you used up arrow, which can be useful if you forget the exact # string you started the search on. Set-PSReadLineOption -HistorySearchCursorMovesToEnd Set-PSReadLineKeyHandler -Key UpArrow -Function HistorySearchBackward Set-PSReadLineKeyHandler -Key DownArrow -Function HistorySearchForward # This key handler shows the entire or filtered history using Out-GridView. The # typed text is used as the substring pattern for filtering. A selected command # is inserted to the command line without invoking. Multiple command selection # is supported, e.g. selected by Ctrl + Click. # As another example, the module 'F7History' does something similar but uses the # console GUI instead of Out-GridView. Details about this module can be found at # PowerShell Gallery: https://www.powershellgallery.com/packages/F7History. Set-PSReadLineKeyHandler -Key F7 ` -BriefDescription History ` -LongDescription 'Show command history' ` -ScriptBlock { $pattern = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$pattern, [ref]$null) if ($pattern) { $pattern = [regex]::Escape($pattern) } $history = [System.Collections.ArrayList]@( $last = '' $lines = '' foreach ($line in [System.IO.File]::ReadLines((Get-PSReadLineOption).HistorySavePath)) { if ($line.EndsWith('`')) { $line = $line.Substring(0, $line.Length - 1) $lines = if ($lines) { "$lines`n$line" } else { $line } continue } if ($lines) { $line = "$lines`n$line" $lines = '' } if (($line -cne $last) -and (!$pattern -or ($line -match $pattern))) { $last = $line $line } } ) $history.Reverse() $command = $history | Out-GridView -Title History -PassThru if ($command) { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert(($command -join "`n")) } } # This is an example of a macro that you might use to execute a command. # This will add the command to history. Set-PSReadLineKeyHandler -Key Ctrl+b ` -BriefDescription BuildCurrentDirectory ` -LongDescription "Build the current directory" ` -ScriptBlock { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("msbuild") [Microsoft.PowerShell.PSConsoleReadLine]::AcceptLine() } # In Emacs mode - Tab acts like in bash, but the Windows style completion # is still useful sometimes, so bind some keys so we can do both Set-PSReadLineKeyHandler -Key Ctrl+q -Function TabCompleteNext Set-PSReadLineKeyHandler -Key Ctrl+Q -Function TabCompletePrevious # Clipboard interaction is bound by default in Windows mode, but not Emacs mode. Set-PSReadLineKeyHandler -Key Ctrl+C -Function Copy Set-PSReadLineKeyHandler -Key Ctrl+v -Function Paste # CaptureScreen is good for blog posts or email showing a transaction # of what you did when asking for help or demonstrating a technique. Set-PSReadLineKeyHandler -Chord 'Ctrl+d,Ctrl+c' -Function CaptureScreen # The built-in word movement uses character delimiters, but token based word # movement is also very useful - these are the bindings you'd use if you # prefer the token based movements bound to the normal emacs word movement # key bindings. Set-PSReadLineKeyHandler -Key Alt+d -Function ShellKillWord Set-PSReadLineKeyHandler -Key Alt+Backspace -Function ShellBackwardKillWord Set-PSReadLineKeyHandler -Key Alt+b -Function ShellBackwardWord Set-PSReadLineKeyHandler -Key Alt+f -Function ShellForwardWord Set-PSReadLineKeyHandler -Key Alt+B -Function SelectShellBackwardWord Set-PSReadLineKeyHandler -Key Alt+F -Function SelectShellForwardWord #region Smart Insert/Delete # The next four key handlers are designed to make entering matched quotes # parens, and braces a nicer experience. I'd like to include functions # in the module that do this, but this implementation still isn't as smart # as ReSharper, so I'm just providing it as a sample. Set-PSReadLineKeyHandler -Key '"',"'" ` -BriefDescription SmartInsertQuote ` -LongDescription "Insert paired quotes if not already on a quote" ` -ScriptBlock { param($key, $arg) $quote = $key.KeyChar $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) # If text is selected, just quote it without any smarts if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $quote + $line.SubString($selectionStart, $selectionLength) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) return } $ast = $null $tokens = $null $parseErrors = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$parseErrors, [ref]$null) function FindToken { param($tokens, $cursor) foreach ($token in $tokens) { if ($cursor -lt $token.Extent.StartOffset) { continue } if ($cursor -lt $token.Extent.EndOffset) { $result = $token $token = $token -as [StringExpandableToken] if ($token) { $nested = FindToken $token.NestedTokens $cursor if ($nested) { $result = $nested } } return $result } } return $null } $token = FindToken $tokens $cursor # If we're on or inside a **quoted** string token (so not generic), we need to be smarter if ($token -is [StringToken] -and $token.Kind -ne [TokenKind]::Generic) { # If we're at the start of the string, assume we're inserting a new string if ($token.Extent.StartOffset -eq $cursor) { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote ") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } # If we're at the end of the string, move over the closing quote if present. if ($token.Extent.EndOffset -eq ($cursor + 1) -and $line[$cursor] -eq $quote) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } } if ($null -eq $token -or $token.Kind -eq [TokenKind]::RParen -or $token.Kind -eq [TokenKind]::RCurly -or $token.Kind -eq [TokenKind]::RBracket) { if ($line[0..$cursor].Where{$_ -eq $quote}.Count % 2 -eq 1) { # Odd number of quotes before the cursor, insert a single quote [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } else { # Insert matching quotes, move cursor to be in between the quotes [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } return } # If cursor is at the start of a token, enclose it in quotes. if ($token.Extent.StartOffset -eq $cursor) { if ($token.Kind -eq [TokenKind]::Generic -or $token.Kind -eq [TokenKind]::Identifier -or $token.Kind -eq [TokenKind]::Variable -or $token.TokenFlags.hasFlag([TokenFlags]::Keyword)) { $end = $token.Extent.EndOffset $len = $end - $cursor [Microsoft.PowerShell.PSConsoleReadLine]::Replace($cursor, $len, $quote + $line.SubString($cursor, $len) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($end + 2) return } } # We failed to be smart, so just insert a single quote [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } Set-PSReadLineKeyHandler -Key '(','{','[' ` -BriefDescription InsertPairedBraces ` -LongDescription "Insert matching braces" ` -ScriptBlock { param($key, $arg) $closeChar = switch ($key.KeyChar) { <#case#> '(' { [char]')'; break } <#case#> '{' { [char]'}'; break } <#case#> '[' { [char]']'; break } } $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { # Text is selected, wrap it in brackets [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $key.KeyChar + $line.SubString($selectionStart, $selectionLength) + $closeChar) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) } else { # No text is selected, insert a pair [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)$closeChar") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } } Set-PSReadLineKeyHandler -Key ')',']','}' ` -BriefDescription SmartCloseBraces ` -LongDescription "Insert closing brace or skip" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($line[$cursor] -eq $key.KeyChar) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)") } } Set-PSReadLineKeyHandler -Key Backspace ` -BriefDescription SmartBackspace ` -LongDescription "Delete previous character or matching quotes/parens/braces" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($cursor -gt 0) { $toMatch = $null if ($cursor -lt $line.Length) { switch ($line[$cursor]) { <#case#> '"' { $toMatch = '"'; break } <#case#> "'" { $toMatch = "'"; break } <#case#> ')' { $toMatch = '('; break } <#case#> ']' { $toMatch = '['; break } <#case#> '}' { $toMatch = '{'; break } } } if ($toMatch -ne $null -and $line[$cursor-1] -eq $toMatch) { [Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 1, 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::BackwardDeleteChar($key, $arg) } } } #endregion Smart Insert/Delete # Sometimes you enter a command but realize you forgot to do something else first. # This binding will let you save that command in the history so you can recall it, # but it doesn't actually execute. It also clears the line with RevertLine so the # undo stack is reset - though redo will still reconstruct the command line. Set-PSReadLineKeyHandler -Key Alt+w ` -BriefDescription SaveInHistory ` -LongDescription "Save current line in history but do not execute" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) [Microsoft.PowerShell.PSConsoleReadLine]::AddToHistory($line) [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() } # Insert text from the clipboard as a here string Set-PSReadLineKeyHandler -Key Ctrl+V ` -BriefDescription PasteAsHereString ` -LongDescription "Paste the clipboard text as a here string" ` -ScriptBlock { param($key, $arg) Add-Type -Assembly PresentationCore if ([System.Windows.Clipboard]::ContainsText()) { # Get clipboard text - remove trailing spaces, convert \r\n to \n, and remove the final \n. $text = ([System.Windows.Clipboard]::GetText() -replace "\p{Zs}*`r?`n","`n").TrimEnd() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("@'`n$text`n'@") } else { [Microsoft.PowerShell.PSConsoleReadLine]::Ding() } } # Sometimes you want to get a property of invoke a member on what you've entered so far # but you need parens to do that. This binding will help by putting parens around the current selection, # or if nothing is selected, the whole line. Set-PSReadLineKeyHandler -Key 'Alt+(' ` -BriefDescription ParenthesizeSelection ` -LongDescription "Put parenthesis around the selection or entire line and move the cursor to after the closing parenthesis" ` -ScriptBlock { param($key, $arg) $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, '(' + $line.SubString($selectionStart, $selectionLength) + ')') [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Replace(0, $line.Length, '(' + $line + ')') [Microsoft.PowerShell.PSConsoleReadLine]::EndOfLine() } } # Each time you press Alt+', this key handler will change the token # under or before the cursor. It will cycle through single quotes, double quotes, or # no quotes each time it is invoked. Set-PSReadLineKeyHandler -Key "Alt+'" ` -BriefDescription ToggleQuoteArgument ` -LongDescription "Toggle quotes on the argument under the cursor" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $tokenToChange = $null foreach ($token in $tokens) { $extent = $token.Extent if ($extent.StartOffset -le $cursor -and $extent.EndOffset -ge $cursor) { $tokenToChange = $token # If the cursor is at the end (it's really 1 past the end) of the previous token, # we only want to change the previous token if there is no token under the cursor if ($extent.EndOffset -eq $cursor -and $foreach.MoveNext()) { $nextToken = $foreach.Current if ($nextToken.Extent.StartOffset -eq $cursor) { $tokenToChange = $nextToken } } break } } if ($tokenToChange -ne $null) { $extent = $tokenToChange.Extent $tokenText = $extent.Text if ($tokenText[0] -eq '"' -and $tokenText[-1] -eq '"') { # Switch to no quotes $replacement = $tokenText.Substring(1, $tokenText.Length - 2) } elseif ($tokenText[0] -eq "'" -and $tokenText[-1] -eq "'") { # Switch to double quotes $replacement = '"' + $tokenText.Substring(1, $tokenText.Length - 2) + '"' } else { # Add single quotes $replacement = "'" + $tokenText + "'" } [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset, $tokenText.Length, $replacement) } } # This example will replace any aliases on the command line with the resolved commands. Set-PSReadLineKeyHandler -Key "Alt+%" ` -BriefDescription ExpandAliases ` -LongDescription "Replace all aliases with the full command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $startAdjustment = 0 foreach ($token in $tokens) { if ($token.TokenFlags -band [TokenFlags]::CommandName) { $alias = $ExecutionContext.InvokeCommand.GetCommand($token.Extent.Text, 'Alias') if ($alias -ne $null) { $resolvedCommand = $alias.ResolvedCommandName if ($resolvedCommand -ne $null) { $extent = $token.Extent $length = $extent.EndOffset - $extent.StartOffset [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset + $startAdjustment, $length, $resolvedCommand) # Our copy of the tokens won't have been updated, so we need to # adjust by the difference in length $startAdjustment += ($resolvedCommand.Length - $length) } } } } } # F1 for help on the command line - naturally Set-PSReadLineKeyHandler -Key F1 ` -BriefDescription CommandHelp ` -LongDescription "Open the help window for the current command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $commandAst = $ast.FindAll( { $node = $args[0] $node -is [CommandAst] -and $node.Extent.StartOffset -le $cursor -and $node.Extent.EndOffset -ge $cursor }, $true) | Select-Object -Last 1 if ($commandAst -ne $null) { $commandName = $commandAst.GetCommandName() if ($commandName -ne $null) { $command = $ExecutionContext.InvokeCommand.GetCommand($commandName, 'All') if ($command -is [AliasInfo]) { $commandName = $command.ResolvedCommandName } if ($commandName -ne $null) { Get-Help $commandName -ShowWindow } } } } # # Ctrl+Shift+j then type a key to mark the current directory. # Ctrj+j then the same key will change back to that directory without # needing to type cd and won't change the command line. # $global:PSReadLineMarks = @{} Set-PSReadLineKeyHandler -Key Ctrl+J ` -BriefDescription MarkDirectory ` -LongDescription "Mark the current directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey($true) $global:PSReadLineMarks[$key.KeyChar] = $pwd } Set-PSReadLineKeyHandler -Key Ctrl+j ` -BriefDescription JumpDirectory ` -LongDescription "Goto the marked directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey() $dir = $global:PSReadLineMarks[$key.KeyChar] if ($dir) { cd $dir [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } } Set-PSReadLineKeyHandler -Key Alt+j ` -BriefDescription ShowDirectoryMarks ` -LongDescription "Show the currently marked directories" ` -ScriptBlock { param($key, $arg) $global:PSReadLineMarks.GetEnumerator() | % { [PSCustomObject]@{Key = $_.Key; Dir = $_.Value} } | Format-Table -AutoSize | Out-Host [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } # Auto correct 'git cmt' to 'git commit' Set-PSReadLineOption -CommandValidationHandler { param([CommandAst]$CommandAst) switch ($CommandAst.GetCommandName()) { 'git' { $gitCmd = $CommandAst.CommandElements[1].Extent switch ($gitCmd.Text) { 'cmt' { [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $gitCmd.StartOffset, $gitCmd.EndOffset - $gitCmd.StartOffset, 'commit') } } } } } # `ForwardChar` accepts the entire suggestion text when the cursor is at the end of the line. # This custom binding makes `RightArrow` behave similarly - accepting the next word instead of the entire suggestion text. Set-PSReadLineKeyHandler -Key RightArrow ` -BriefDescription ForwardCharAndAcceptNextSuggestionWord ` -LongDescription "Move cursor one character to the right in the current editing line and accept the next word in suggestion when it's at the end of current editing line" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($cursor -lt $line.Length) { [Microsoft.PowerShell.PSConsoleReadLine]::ForwardChar($key, $arg) } else { [Microsoft.PowerShell.PSConsoleReadLine]::AcceptNextSuggestionWord($key, $arg) } } # Cycle through arguments on current line and select the text. This makes it easier to quickly change the argument if re-running a previously run command from the history # or if using a psreadline predictor. You can also use a digit argument to specify which argument you want to select, i.e. Alt+1, Alt+a selects the first argument # on the command line. Set-PSReadLineKeyHandler -Key Alt+a ` -BriefDescription SelectCommandArguments ` -LongDescription "Set current selection to next command argument in the command line. Use of digit argument selects argument by position" ` -ScriptBlock { param($key, $arg) $ast = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$null, [ref]$null, [ref]$cursor) $asts = $ast.FindAll( { $args[0] -is [System.Management.Automation.Language.ExpressionAst] -and $args[0].Parent -is [System.Management.Automation.Language.CommandAst] -and $args[0].Extent.StartOffset -ne $args[0].Parent.Extent.StartOffset }, $true) if ($asts.Count -eq 0) { [Microsoft.PowerShell.PSConsoleReadLine]::Ding() return } $nextAst = $null if ($null -ne $arg) { $nextAst = $asts[$arg - 1] } else { foreach ($ast in $asts) { if ($ast.Extent.StartOffset -ge $cursor) { $nextAst = $ast break } } if ($null -eq $nextAst) { $nextAst = $asts[0] } } $startOffsetAdjustment = 0 $endOffsetAdjustment = 0 if ($nextAst -is [System.Management.Automation.Language.StringConstantExpressionAst] -and $nextAst.StringConstantType -ne [System.Management.Automation.Language.StringConstantType]::BareWord) { $startOffsetAdjustment = 1 $endOffsetAdjustment = 2 } [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($nextAst.Extent.StartOffset + $startOffsetAdjustment) [Microsoft.PowerShell.PSConsoleReadLine]::SetMark($null, $null) [Microsoft.PowerShell.PSConsoleReadLine]::SelectForwardChar($null, ($nextAst.Extent.EndOffset - $nextAst.Extent.StartOffset) - $endOffsetAdjustment) } # Allow you to type a Unicode code point, then pressing `Alt+x` to transform it into a Unicode char. Set-PSReadLineKeyHandler -Chord 'Alt+x' ` -BriefDescription ToUnicodeChar ` -LongDescription "Transform Unicode code point into a UTF-16 encoded string" ` -ScriptBlock { $buffer = $null $cursor = 0 [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref] $buffer, [ref] $cursor) if ($cursor -lt 4) { return } $number = 0 $isNumber = [int]::TryParse( $buffer.Substring($cursor - 4, 4), [System.Globalization.NumberStyles]::AllowHexSpecifier, $null, [ref] $number) if (-not $isNumber) { return } try { $unicode = [char]::ConvertFromUtf32($number) } catch { return } [Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 4, 4) [Microsoft.PowerShell.PSConsoleReadLine]::Insert($unicode) } # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/mLdabV+7XZgm # mrYn8AAdqkXN6TLai6zJSbrzk1wHn6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICazxFrPsF4exXFcFtywFigB # B4oxmjwvi7XZnlwWiQh8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbWyut9b50iBjzJpjbteMpK4BOMFkU+4Q72EQqWFwtOqx5s2DjJmtQins # Y0Hu8BK9V7qpqDBXG81P/85whNX05EKjtIInLGwVdNf7vIwKbvRtOAeSeEleso+c # o837IdbhKPrZZe/HwZUqhcJKEe5+ISl4Rr9XH2d3o8HTvprT3Ov6uZfUembnrXxi # DCnQG8CZFgNddiDYTZ5c/cG7kSrx350nJS3myyh78A36/sQ0ILOI5l4+nNnh/zvY # G1H+YkoDEuQIR7X/sV8vmnnLXzGnfiyyHsEehaG1Cq03MmyJsDupvTLMwtrN21rs # oxKIgms7wmGy/rrkt8sIX1ePZjO+YqGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAgEoNWuCLEWO5JvwE4ak71pyqQc28smE8Bjx0l4cV9ZQIGZjK719mN # GBIyMDI0MDUwMzIzMzAxOS42NFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBOTM1LTAz # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EeowggcgMIIFCKADAgECAhMzAAAB6Q9xMH5d8RI2AAEAAAHpMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy # NloXDTI1MDMwNTE4NDUyNlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBOTM1LTAzRTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAKyajDFBFWCnhNJzedNrrKsA8mdXoDtplidPD/LH3S7U # NIfz2e99A3Nv7l+YErymkfvpOYnOMdRwiZ3zjkD+m9ljk7w8IG7sar7Hld7qmVC3 # jHBVRRxAhPGSU5nVGb18nmeHyCfE7Fp7MUwzjWwMjssykrAgpAzBcNy1gq8LJDLq # Q7axUsHraQXz3ZnBximIhXHctPUs90y3Uh5LfkpjkzHKVF1NLsTUmhyXfQ2BwGIl # +qcxx7Tl4SKkixM7gMif/9O0/VHHntVd+8I7w1IKH13GzK+eDSVRVj66ur8bxBEW # g6X/ug4jRF/xCD7eHJhrIewj3C28McadPfQ2vjXHNOnDYjplZoiE/Ay7kO92QQbN # Xu9hPe1v21O+Jjemy6XVPkP3fz8B80upqdUIm0/jLPRUkFIZX6HrplxpQk7GltIi # MiZo4sXXw06OZ/WfANq2wGi5dZcUrsTlLRUtHKhOoMLEcbiZbeak1Cikz9TVYmeO # yxZCW4rx5v4wMqWT0T+E4FgqzYp95Dgcbt05wr7Aw5qYZ/C+Qh7t2TKXObwF4BRA # LwvGsBDKSFIfL4VpD3cMCV9BijBgO3MZeoTrA4BN4oUjfS71iXENPMC4sMrTvdyd # 0xXipoPd65cDrFQ0KjODuuKGIdRozjcCZv0Qa5GXTbb7I/ByWbKSyyTfRrhGne/1 # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUkX4zicUIdiO4iPRa6/6NyO0H7E4wHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAFaxKn6uazEUt7rUAT3Qp6fZc+BAckOJLhJs # uG/N9WMM8OY51ETvm5CiFiEUx0bAcptWYsrSUdXUCnP8dyJmijJ6gC+QdBoeYuHA # EaSjIABXFxppScc0hRL0u94vTQ/CZxIMuA3RX8XKTbRCkcMS6TApHyR9oERfzcDK # 9DOV/9ugM2hYoSCl0CwvxLMLNcUucOjPMIkarRHPBCB4QGvwTgrbBDZZcj9knFlL # /53cV3AbgSsEXPNSJJtXabfGww/dyoJEUO0nULf8meNcwKGeb1ssMPXBontM+nnB # h2/Q6X35o3S3UGY7MKPwOaoq5TDOAIr1OO3DkpSNo7pCN6AfOd1f+1mtjv3Z19EB # evl0asqSmywgerqutY7g+Uvc5L7hyIv+Xymb6g0ldYZdgkvkfos2crJclUTD/UVs # 7j4bP5Th8UXGzZLxTC+sFthxxVD074WWPvFMB4hMmwem0C9ESoJz79jHOEgqQDzx # DxCEkpQO1rNq0kftk52LQsIrCCpA7gfzUpkYNIuS0W81GGHxkEB6efWlb7lQEZjP # YamBzFVcpPUK5Rh2UdH0Po2tWEap2EZODs6D93/ygyU8bdiO6oXGJ2IiygDDb4yE # jXNesiLnq3omQnvknr0X6WSH2bIkmk2THjWxIHVcraMlaCrtWUG4/UG5eNneqDKb # 2vXC/Qy1MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w # ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAKtp # h/XEOTasydT9UmjYYYrWfGjxoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp390hMCIYDzIwMjQwNTAzMjIwMTA1 # WhgPMjAyNDA1MDQyMjAxMDVaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOnf3SEC # AQAwBwIBAAICElkwBwIBAAICFH4wCgIFAOnhLqECAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEASYvg9KIh+I7IAxVCMd076Cqzr75HJqmi6EZf1mGAhR9TaBhN # 1Qy4bbawKwW2do/4ZTIrg/SO0x7CRyAWHy7LDSMF1yPiROAWNDRvaB4ymdipf1+/ # FzBDxg2rjR8uTcZBRBDnHFjr8lFmVY/W6UAXxNauE3S2CUeKykyU/FbdRAxUamzn # M7rLLkQ/nVZSzHmWX36ELgxZL8IvwHrCIgBVlnbd/3XPD7XxYPnCQJgOmTQxI7uj # 6Rk+5zL2GOg/J4KmWYkvQB+Vqy+DtPUXytFpPPeOiOiN7cmUVqdwcgol1hf/nU+Y # LDI7Q7evMRlS/8I7YuPx2xQgHbuJFxxjXSUgGjGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6Q9xMH5d8RI2AAEAAAHpMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIMdodDLuW+o1IoL6IFuRYlvh+lsoPu+n5wj54b7GeywWMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgpJCSeJdpNyaPVMpBYX7HZTiuJWis # YPxPCaBVs32qxCUwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAekPcTB+XfESNgABAAAB6TAiBCC6JWQjzZ+GsFu+q2QRjmTeeP9uxPQA # jSjWqV8IDMpc4zANBgkqhkiG9w0BAQsFAASCAgAEDD6/9aYeKqUSn6Tfa+EThSQX # nAk91ucUbYJLp2rHchkNWKLWijSlwy4jllA6a+A7+l/vTYezY+f/p9s85SvPvEIS # tHoXUtP+XCuhQ2OuPpMlS8VrbcZroeZg2xfnNr+NMGbbartgZzSMMSUYk9sypArN # 9RqY+2es15dL/8xf4lWQYOeYxpTx1sTu2K14c/GFkXeFQfninWYBynphx6eilXGj # KJCVCG0WPRYqHy0UV7o6cuzNLYtg7lbNfPMpiVIrGeXOei+Q01Ypt4wwUqQYhAxV # 7mxEnmtQ/rHZQqqm+GqWN040yko9b2RMlY9z2nZtqAMKi0bX1Q9hOm+qHgHREYLU # AT6HFNn2A2WMuxEIQXHNIlUFaDqTNh1UOKE277V85anhEWIdFcCKoXzzqgRzfYTY # Ty+E3mUk29HHkUNkpz04J4Eo4+zED9z4kMUGIm9HsD7cIu0zd+5ewpWkYHQZQqi/ # PnV2ajdZrmihKPBpTIXv41DTcWbqadU6sc2OvwMj5EPM3MbwvR4vZVUpvgtBFLGS # hGM9GooE5UZfEpnZrT+UmY67M8QMECgJg1HDcfAoEXX18dPzmEWI3mzbij2UhIOL # 3JJnws6gb3TuqZujAt+xpVMAWhBiKeuf5hXeQTt9IBKlX9tGuyIiTEtKzVa3DamR # zIHGtFKuaZYFJDbaRA== # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_28.ps1
sample_9_28.ps1
#************************************************ # DC_RDSSH.ps1 # Version 1.0.1 # Date: 21-01-2012 # Author: Daniel Grund - dgrund@microsoft.com # Description: # This script gets the RDSSH config and # checks vital signs to inform user. # 1.0.0 Beta release #************************************************ PARAM( $TargetHost, $RDSobject, $OutputFileName , $OS, $bIsRDSSH ) # globals and function definitions for RDS $OutputFolder = $PWD.Path Import-LocalizedData -BindingVariable RDSSDPStrings # get all the RDP-Tcp settings $Query = "Select * from Win32_TSGeneralSetting where TerminalName='RDP-Tcp'" [array]$RDPSettings = Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $Query = "Select * from Win32_TSLogonSetting where TerminalName='RDP-Tcp'" $RDPSettings += Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $Query = "Select * from Win32_TSSessionSetting where TerminalName='RDP-Tcp'" $RDPSettings += Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $Query = "Select * from Win32_TSEnvironmentSetting where TerminalName='RDP-Tcp'" $RDPSettings += Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $Query = "Select * from Win32_TSRemoteControlSetting where TerminalName='RDP-Tcp'" $RDPSettings += Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $Query = "Select * from Win32_TSClientSetting where TerminalName='RDP-Tcp'" $RDPSettings += Get-CimInstance -Query $Query -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate $RDPSettings = FilterWMIObject $RDPSettings $OutputFileName = SaveAsXml $RDPSettings ($TargetHost + "_RDPSettings.xml") $OutputFileName # See if RDS is enabled otherwise exit $RDSEnabled = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server" -Property fDenyTSConnections $RDSEnabledPol = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\Software\Policies\Microsoft\Windows NT\Terminal Services" -Property fDenyTSConnections UpdateAndMessage -Id "RC_RDSENABLED" -Detected (($RDSEnabled.fDenyTSConnections-eq 1) -or ($RDSEnabledPol.fDenyTSConnections -eq 1) ) $OOBEInProgress = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\SYSTEM\Setup" -Property OOBEInProgress UpdateAndMessage -Id "RC_RDSOOBE" -Detected ($OOBEInProgress.OOBEInProgress -eq 1) if ( ($RDSEnabled.fDenyTSConnections-eq 1) -or ($RDSEnabledPol.fDenyTSConnections -eq 1) -or ($OOBEInProgress.OOBEInProgress -eq 1) ) { # RDS disabled, no sense to continue return } # RULE 524 : see what port is configured Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSGetPort $RDPPort = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Property PortNumber UpdateAndMessage -Id "RC_RDSPort" -Detected ($null -eq $RDPPort) # test if there is something listening on that port Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSListenPort UpdateAndMessage -Id "RC_RDSListenPortDefault" -Detected (($null -ne $RDPPort) -and ($RDPPort.PortNumber -ne "3389")) if (($null -ne $RDPPort) -and ([RDSHelper]::RDPTestPort($TargetHost,$RDPPort.PortNumber) -eq $false)) { Update-DiagRootCause -Id "RC_RDSListenPort" -Detected $true -Parameter @{"Error" = $RDSSDPStrings.ID_RDSListenPortError + " " + $RDPPort.PortNumber; "Solution" = ""} Add-GenericMessage -Id "RC_RDSListenPort" }else{ Update-DiagRootCause -Id "RC_RDSListenPort" -Detected $false -Parameter @{"Error" = $RDSSDPStrings.ID_RDSListenPortError + " " + $RDPPort.PortNumber; "Solution" = ""} } # END RULE 524 # See if server default listener is up Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSQWinSta $DefaultListener = (qwinsta "/Server:$($TargetHost)") if ($null -ne $DefaultListener) { $savepath = $OutputFolder + "\"+ $TargetHost+"_QWinSta.txt" [array]$OutputFileName += $savepath $DefaultListener | Out-File $savepath $IsListening =(!$DefaultListener[$DefaultListener.Length-1].ToString().Contains("65536")) -and (!$DefaultListener[$DefaultListener.Length-1].ToString().Contains("rdp-tcp")) UpdateAndMessage -Id "RC_RDSIsListening" -Detected $IsListening } $CertNotValid = $false #open TCP connection on target port and get cert Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSRDPCert $certfile = $OutputFolder + "\"+ $TargetHost + "_RDPCert.cer" $RemoteCertificate = [RDSHelper]::RDPGetCert($TargetHost, $RDPPort.PortNumber, $certfile) if ($null -eq $RemoteCertificate) { UpdateAndMessage -Id "RC_RDSCert" -Detected $true }else{ UpdateAndMessage -Id "RC_RDSCert" -Detected $false [array]$OutputFileName += $certfile UpdateAndMessage -Id "RC_RDSCertMatch" -Detected ($RDPSettings[0].SSLCertificateSHA1Hash -ne $RemoteCertificate.GetCertHashString()) } #$ipadress = [RDSHelper]::DNSLookup($node) # check to see if hardware acceleration is set for rdpdd UpdateAndMessage -Id "RC_RDSH_RDPDD" -Detected (IsRDPDDAccelerated) # check for reg permisions on the LICENSE keys UpdateAndMessage -Id "RC_RDSH_DEVLIC" -Detected (IsRegPermIssue) if ($bIsRDSSH -eq $true) { # try to verify the license type with the available licenses on the LServer $RDSobject = Get-CimInstance -Class Win32_TerminalServiceSetting -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSLicenseServer [array]$LicenseServerReport = "Specified RDS License Servers:" [array]$SpecifiedLicenseServer = $RDSObject.GetSpecifiedLicenseServerList().SpecifiedLSList $LicenseServerReport+= $SpecifiedLicenseServer #$LicenseServerReport+= "" #$LicenseServerReport+= "Discovered RDS License servers:" #$LicenseServerReport+=$LicenseServer.Length,$RDSObject.GetRegisteredLicenseServerList().RegisteredLSList.Split(" ") if ($null -ne $SpecifiedLicenseServer ) { # RULE 525 get RDS RCM 509 certificate only if we got a specified license server UpdateAndMessage -Id "RC_RDSLicenseServer" -Detected $false Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status $RDSSDPStrings.ID_RDSx509Cert #[System.Security.Cryptography.X509Certificates.X509CertificateCollection] $ByteArray = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" -Property "X509 Certificate" $RDSCertificates = $ByteArray.'X509 Certificate' #$ByteArray = Get-RemoteRegistryKeyProperty -ComputerName $TargetHost -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM" -Property "X509 Certificate2" #$RDSCertificates2 = [RDSHelper]::GetCertCollFromReg($ByteArray."X509 Certificate2") UpdateAndMessage -Id "RC_RDSx509Cert" -Detected ($null -eq $RDSCertificates) # -or ($RDSCertificates2 -eq $null)) #END RULE 525 $LicenseServerReport+= "" $LicenseServerReport +="Connectivity to Specified License Servers:" $CanConnectToLicenseServer = $false $SpecifiedLicenseServer|foreach-object{ Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status ($RDSSDPStrings.ID_RDSLicenseServerConnect + " " + $_) $TStoLSConnectivityStatus = $RDSObject.GetTStoLSConnectivityStatus($_).TStoLSConnectivityStatus $string = GetLSConnectDesc $TStoLSConnectivityStatus $LicenseServerReport+= "License Server " + $_ + " status: "+ $string #note dgrund, not enough need more failure status check http://msdn.microsoft.com/en-us/library/windows/desktop/ff955669(v=vs.85).aspx unsure why we need -and here if (($TStoLSConnectivityStatus -ne 1) -and ($TStoLSConnectivityStatus -ne 2) -and ($TStoLSConnectivityStatus -ne 11)) { UpdateAndMessage -Id "RC_RDSLicenseServerConnect" -RootCause $RDSSDPStrings.ID_RDSLicenseServerConnectError -Solution ($RDSSDPStrings.ID_RDSLicenseServerConnectSolution + " " + $_) -Detected $true }else{ $CanConnectToLicenseServer = $true Update-DiagRootCause -Id "RC_RDSLicenseServerConnect" -Detected $false } } #end foreach-object }else{ #$SpecifiedLicenseServer UpdateAndMessage -Id "RC_RDSLicenseServer" -Detected $true } # get the licenses from the server where the licensetype is the RDS requested licensetype $LicenseServerReport+= "The server is configured for: " + (TSLicensingType -Type $RDSobject.LicensingType) if ($RDSobject.LicensingType -eq 2) #per device { $LicenseType= 0 }else # assume per user { $LicenseType = 1 } # Ask to connect to the remote license server if ($null -ne $SpecifiedLicenseServer) { $Connect = Get-DiagInput -id "QuestionYesNo" -Parameter @{"Question" = $RDSSDPStrings.ID_RDSLSConnectInteract; "QuestionDescription" = $RDSSDPStrings.ID_RDSLSConnectInteractDescription} if ($Connect -eq "Yes") { foreach ($LicenseServer in $SpecifiedLicenseServer) { $RDSLServerLicenses = FilterWMIObject (Get-CimInstance -Class Win32_TSLicenseKeyPack -Namespace root\cimv2 -ComputerName $LicenseServer -Authentication PacketPrivacy -Impersonation Impersonate) if ($null -ne $RDSLServerLicenses) { $OutputFileName = SaveAsXml $RDSLServerLicenses ($LicenseServer + "_RDS_Licenses.xml") $OutputFileName $relevantLicenses += $RDSLServerLicenses| where-object { ($_.TotalLicenses -gt 0) -and ($_.TotalLicenses -lt 4294967295) -and ($_.ProductType -eq $LicenseType) -and ($_.ProductVersionID -ge [System.Convert]::ToInt32($OS.Version[2].ToString())) } $relevantLicenses| foreach-object { $availablelicenses += $_.AvailableLicenses } } } # end foreach ($LicenseServer in $SpecifiedLicenseServer) if ($null -ne $relevantLicenses) { UpdateAndMessage -Id "RC_RDSLSValidLicense" -Detected $false $LicenseServerReport+= "" $LicenseServerReport+= "Checking for valid licenses in specified license servers:" $LicensingName = $RDSObject.LicensingName $ProductVersion = $relevantLicenses[0].ProductVersion $LicenseServerReport += "Found valid $LicensingName licenses with $availablelicenses available licenses." }else{ UpdateAndMessage -Id "RC_RDSLSValidLicense" -Detected $true } } } $savepath = $TargetHost + "_LicenseServerReport.txt" $LicenseServerReport | Out-File $savepath [array]$OutputFileName += $savepath # RemotePublishing section $remoteAppList = $null if( ( (([int]$OS.Version[0] -48) -eq 6 ) -and (([int]$OS.Version[2]- 48) -lt 2) ) -or (([int]$OS.Version[0] -48) -lt 6 ) ) { $remoteAppList = FilterWMIObject (Get-CimInstance -Class Win32_TSPublishedApplication -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveRDPFileContents -Object $remoteAppList -ObjectName "PublishedApplication" -OutputFileName $OutputFileName } else { $remoteAppList = FilterWMIObject (Get-CimInstance -Class Win32_RDCentralPublishedRemoteApplication -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveRDPFileContents -Object $remoteAppList -ObjectName "PublishedRemoteApplication" -OutputFileName $OutputFileName $PublishedRemoteDesktop = FilterWMIObject (Get-CimInstance -Class Win32_RDCentralPublishedRemoteDesktop -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveRDPFileContents -Object $remoteAppList -ObjectName "PublishedRemoteDesktop" -OutputFileName $OutputFileName $workspace = FilterWMIObject (Get-CimInstance -Class Win32_Workspace -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveAsXml $workspace ($TargetHost +"_Workspace.xml") $OutputFileName $PublishedFarm = FilterWMIObject (Get-CimInstance -Class Win32_RDCentralPublishedFarm -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveAsXml $PublishedFarm ($TargetHost +"_PublishedFarm.xml") $OutputFileName $PublishedDeploymentSettings = FilterWMIObject (Get-CimInstance -Class Win32_RDCentralPublishedDeploymentSettings -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveAsXml $PublishedDeploymentSettings ($TargetHost +"_PublishedDeploymentSettings.xml") $OutputFileName $PublishedFileAssociation = FilterWMIObject (Get-CimInstance -Class Win32_RDCentralPublishedFileAssociation -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveAsXml $PublishedFileAssociation ($TargetHost +"_PublishedFileAssociation.xml") $OutputFileName $PersonalDesktopAssignment = FilterWMIObject (Get-CimInstance -Class Win32_RDPersonalDesktopAssignment -Namespace root\cimv2\TerminalServices -ComputerName $TargetHost -Authentication PacketPrivacy -Impersonation Impersonate) $OutputFileName = SaveAsXml $PersonalDesktopAssignment ($TargetHost +"_PersonalDesktopAssignment.xml") $OutputFileName } # end RemotePublishing } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCClCimcPvOYFodS # /bw7OSKXxjqefUy47JzSKHY2uN5TR6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDz0 # H9k0EfC0/dYTVLu1zUCdZQlESyBr3QKbeYYBK2OKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfQn6ygsd4sJyDR/SUnRcn+CoJwBdnh01yaRy # zM+yeZoDvXkE9jIgUF7GXoua1qMSKxpkirphXxw3Qaac4RkGFWWduk0OEjMrv8UE # EH94c6gtHOgHsxFLzQU2HB7ueFmRlvW0ZSueIfjlUpOu5u0NIPhGWmW1TAYpTM+Q # dmHUKpOA/KhAksqIomyLG08nQRS22dwC/Kb7VLdDI4eXrx4QGUcMkxQ0su1JgBZQ # Z/MO29rL1hYL2XE7blJHTeq6DokKCOZvIe7sCw/oewpoA+18jM5JMEn3Li0I1KGD # E6jMq9nNIRm+3e2YS3QpuXYgX92Y2K53ZVdN2+1XOLbovvdWQ6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCArkBLMVaq7gy3nz9gf+2M2UWusrxHUe2jQ # s4viLQEfkAIGZutC6/TKGBMyMDI0MTAyODExNDA0Mi42ODhaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCo # wns0IQsBAAEAAAH+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # vLwhFxWlqA43olsE4PCegZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62 # YHUieIQXw+0u4qlay4AN3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv0 # 7O18i2HjDyLuywYyKA9FmWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9 # BCGVRdHW9lmPMrrUlPWiYV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnT # dcfP6T8Mir0HrwTTtV2h2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT # 81ZC2aHN7exEDmmbiWssjGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX # /uDVtY9pvL4j8aEWS49hKUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B # 454eGJhL0fwUTRbgyCbpLgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQya # hGZDL/vWAVjX5b8Jzhly9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xb # eOETAOn7OT9D3UGt0q+KiWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOn # F7Dgj8a60KQT9QgfJfwXnr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRvznuJ9SU2g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAiT4NUvO2lw+0dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8Lq # xsH4GWCPTztc3tr8AgBvsYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPk # MA3DAxVq4SSR8y+TRC2GcOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze # +sbqSn8cekduMZdLyHJk3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtT # lNkq3bx1iyWg7N7jGZABRWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIR # VkWsMyEAdoP9dqfaZzwXGmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTR # zZZEw82FupF3viXNR3DVOlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ # 2e+sBUh62KVTlhEsQRHZRwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz # 9SvCjIKSxCZFCNv/zpKIlsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObD # fU4h/O/0vmbF3BMR+45rAZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7F # RnHEAAr06sflqZ8eeV3FuDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQ # LWVG9JuGxgLRXseggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0 # MTAyOTA5MDQwOFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEA # AgIIsAIB/zAHAgEAAgISxjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAzScy1wBbpcAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG # 0qSOBjk7VgyCvjFMirT11HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpe # E+oE9viQRHMLsU/3b8huzWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSj # n3XQ0nllmNeGCeUkdIsNTpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/a # N3CjM0gf25XwDETanz7KLbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9 # FVUpwZNtKUwYSNiOSsA9S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgZL0Ok/dNKbidBE/Gpyi7zO1k3Rx9KdSYrTipRB5jonQwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0W # tkCstyh0eTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/tCowns0IQsBAAEAAAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH6 # 5KUaSnvoMA0GCSqGSIb3DQEBCwUABIICAFAm+au35JpJArx+iOru6WhXd08wGZpt # rhynY/pLAIqsVKA/rhbQ1R1GtpGMntq0DHNb2We2efd+Zrg6yifMrzVerxKmi6XY # qVmefmuBFSGdUxThj+wyPARfBhKleYpgRTsl6C/+gJkeRYmAeq+AOnBywOd8o6dW # 0+KozmqDLp5os3/4o85tMII9worLVNocGt+ejvCroLsyiL08/ByOKmDFooQlEU2J # tsBOb+SrNTHxdWuPOENHZhGH3UlrxDzVUSu9j0zdC186aQtMKxtiz4Ngh9gg74Ab # VGwpMj851HDZtpIRfuTPnIVkvb15gb/WaRrfCnlIV+N9avCTkRX/eI6g7yGj5/Ep # IvTckZG64+kgMhCIxFol7cFm9Q4LKi71HAH1FdqC8fzOFg/1+hvQ8l4j3tHtWE5e # Df85aNBD1xxVB09nna63IKP4rx3HPtLCtiMgMwlz5AYH1PWQVU4gt+sLxEZET1ZK # cViXBRBLMJkboc7sGRSvniGz+LkLFFkG21lLKCC7roy3OkuC9Cj0fsDKAPSfsbXl # /v1WPTLTf3DljXWVeKbvRzT5GNHtrV5f9ubw06qccmqH3bJB2ywSxhjDqfmWWxC6 # ie1+69po2QmDz+kP3qbyJhlM7QP35RSjRG15cHot4I2wbJSPiIE8cb5r2gLGfbWl # K7W+sfZMQ3FQ # SIG # End signature block
combined_dataset/train/non-malicious/Invoke-SqlCmdExe.ps1
Invoke-SqlCmdExe.ps1
<# .SYNOPSIS Runs a T-SQL Query and optional outputs results to a file. .DESCRIPTION Invoke-SqlCmdExes.ps1 script is a wrapper around sqlcmd.exe to run a T-SQL query or stored procedure and optionally outputs to a file. .EXAMPLE PowerShell.exe -File "C:\\Scripts\\Invoke-SqlCmdExe.ps1" -ServerInstance "Z001\\sql1" -Database accounting -Query "EXEC usp_accounts '12445678'" This example connects to Z001\\sql1.accounting and executes a stored procedure which does not return a result set .EXAMPLE PowerShell.exe -File "C:\\Scripts\\Invoke-SqlCmdExe.ps1" -ServerInstance "Z001\\sql1" -Database accounting -Query "SET NOCOUNT ON; SELECT * FROM dbo.vw_accounts" -FilePath "C:\\Scripts\\accounts.txt" -SqlCmdOptions '-h-1 -s"|" -w 8000' This example connects to Z001\\sql1.accounting and selects the records from the vw_accounts view, the data is outputed to a pipe delimited file with additional options .EXAMPLE PowerShell.exe -File "C:\\Scripts\\Invoke-SqlCmdExe.ps1" -ServerInstance "Z001\\sql1" -Database accounting -Query "EXEC usp_accounts '12445678'" -FilePath "C:\\Scripts\\accounts.txt" -SqlCmdOptions '-h-1 -s","' This example connects to Z001\\sql1.accounting and selects the records from the vw_accounts view, the data is outputed to a CSV file .NOTES Version History v1.0 - Chad Miller - 5/3/2012 - Initial release #> param( [Parameter(Position=0, Mandatory=$true)] [string] $ServerInstance, [Parameter(Position=1, Mandatory=$true)] [string] $Database, [Parameter(Position=2, Mandatory=$true)] [string] $Query, [Parameter(Position=3, Mandatory=$false)] [ValidateNotNullOrEmpty()] [string] $Application="Invoke-SqlCmdExe.ps1", [Parameter(Position=4, Mandatory=$false)] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Path $([system.io.path]::GetDirectoryName("$_"))})] [string] $FilePath, [Parameter(Position=5, Mandatory=$false)] [ValidateNotNullOrEmpty()] [string] #Additional Command-line Options for sqlcmd $SqlCmdOptions ) #This must be run as administrator on Windows 2008 and higher! New-EventLog -LogName Application -Source $Application -EA SilentlyContinue $Error.Clear() $events = @{"ApplicationStartEvent" = "31101"; "ApplicationStopEvent" = "31104"; "DatabaseException" = "31725"; "ConfigurationException" = "31705";"BadDataException" = "31760"} $msg =$null $MaxErrorMsgLen = 3000 ####################### function Write-Message{ Param([string]$Severity,[string]$Category,[string]$Eventid,[string]$ShortMessage=$null,[string]$Context=$null) $msg = @" Severity: $Severity Category: $Category EventID: $Eventid Short Message: $ShortMessage Context: $Context "@ $msg = $msg -replace "'" Write-EventLog -LogName Application -Source $Application -EntryType $Severity -EventId $Eventid -Category $Category -Message $msg } #Write-Message ####################### # MAIN # ####################### $Options = @" -S"$ServerInstance" -d "$Database" -Q "$Query" "@ if ($FilePath) { $Options += @" -o "$FilePath" "@ } if ($SqlCmdOptions) { $Options += " $SqlCmdOptions" } Write-Verbose "sqlcmd.exe $Options" $Context = "ServerInstance\\Database = $ServerInstance\\$Database`nQuery = $Query" $msg = "ApplicationStartEvent" Write-Message -Severity Information -Category $events.ApplicationStartEvent -Eventid 1 -ShortMessage $msg -Context $Context try { if ($FilePath) { $exitCode = (Start-Process -FilePath "sqlcmd.exe" -ArgumentList @" $Options "@ -Wait -NoNewWindow -Passthru).ExitCode } else { $tempFile = [io.path]::GetTempFileName() $exitCode = (Start-Process -FilePath "sqlcmd.exe" -ArgumentList @" $Options "@ -Wait -NoNewWindow -RedirectStandardOutput $tempFile -Passthru).ExitCode } if ($ExitCode -eq 0) { $msg = "ApplicationStopEvent" Write-Message -Severity Information -Category $events.ApplicationStopEvent -Eventid 99 -ShortMessage $msg -Context $Context } else { throw } } #Start-Process Exception catch [InvalidOperationException] { $Exception = "{0}, {1}" -f $_.Exception.GetType().FullName,$( $_.Exception.Message -replace "'" ) Write-Verbose "InvalidOperationException" Write-Message -Severity Error -Category $events.ConfigurationException -Eventid 99 -ShortMessage "ConfigurationException: $Exception" -Context $Context throw $_ } #SqlcmdException catch { if ($FilePath) { $Exception = [System.IO.File]::ReadAllText("$FilePath") } elseif ($tempFile) { $Exception = [System.IO.File]::ReadAllText("$tempfile") } if ($Exception -and $Exception.Length -gt $MaxErrorMsgLen) { $Exception = $Exception.SubString($Exception.Length - $MaxErrorMsgLen) } Write-Verbose "SqlcmdException" Write-Message -Severity Error -Category $events.DatabaseException -Eventid 99 -ShortMessage "DatabaseException: $Exception" -Context $Context throw $Exception } finally { if ($tempFile) { remove-item $tempFile } }
combined_dataset/train/non-malicious/1436.ps1
1436.ps1
function Get-CPowerShellModuleInstallPath { [CmdletBinding()] [OutputType([string])] param( ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $modulePaths = $env:PSModulePath -split ';' $programFileModulePath = Join-Path -Path $env:ProgramFiles -ChildPath 'WindowsPowerShell\Modules' if( (Test-Path -Path 'Env:\ProgramW6432') ) { $programFileModulePath = Join-Path -Path $env:ProgramW6432 -ChildPath 'WindowsPowerShell\Modules' } $installRoot = $modulePaths | Where-Object { $_.TrimEnd('\') -eq $programFileModulePath } | Select-Object -First 1 if( $installRoot ) { return $programFileModulePath } $psHomeModulePath = Join-Path -Path $env:SystemRoot -ChildPath 'system32\WindowsPowerShell\v1.0\Modules' $installRoot = $modulePaths | Where-Object { $_.TrimEnd('\') -eq $psHomeModulePath } | Select-Object -First 1 if( $installRoot ) { return $psHomeModulePath } Write-Error -Message ('PSModulePaths ''{0}'' and ''{1}'' not found in the PSModulePath environment variable.' -f $programFileModulePath,$psHomeModulePath) }
combined_dataset/train/non-malicious/sample_66_14.ps1
sample_66_14.ps1
@{ GUID="eb74e8da-9ae2-482a-a648-e96550fb8733" Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="© Microsoft Corporation. All rights reserved." Description='PowerShell module for working with ZIP archives.' ModuleVersion="1.2.5" PowerShellVersion="3.0" FunctionsToExport = @('Compress-Archive', 'Expand-Archive') DotNetFrameworkVersion = 4.5 CmdletsToExport = @() AliasesToExport = @() NestedModules="Microsoft.PowerShell.Archive.psm1" HelpInfoURI = 'https://go.microsoft.com/fwlink/?LinkId=2113631' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAgseQYNytK1g1h # 9FUbgEFrpyXsmaTUaHw3dw1AixKKnKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKKS # PNdOG9BJ1RGJnxRzOOllq/tUtoNT6PVdCCM/RNHyMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA5tc1WsQ6DcTLOkUGpIkW93iMn/J3l6HAYuXf # pSoEaVpkyXSxIN1qrkcm0rmBzMky6JnGKeqOiBTNdzp7TBw0VPi97OpU5sDXqYqE # xsgOFEHHN4gbLyFJlA3VX7gdVn8lmOEl8mDbEGzoRu2tkDOqXGXW3H1sunHq7A3M # Ll19xFcFk0Vm/wCX92R35hm3W+e/F2eSCrXVFTCwuuWrlbpX3NO9nv5mSjZItOrP # ZnrtjIvCF8bLxno5aLI06tEtwHzLe7td4o1fnBXI1e/mSccBUHE/U6ZXaUnu3Z/+ # OyAwl62KdKbDkYlOpo/EvZGt3phskA11hyIr+gVvi8HDs18f7aGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAH11wWfzN7tpYI0iOjQ8Cko6LIZiBZvvaj # fAZm+rB3YgIGZlcoYdW+GBMyMDI0MDYxNzIyMTQyOC4xNjlaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOoasYEwIhgPMjAyNDA2MTcyMDU4NDFaGA8yMDI0MDYx # ODIwNTg0MVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hqxgQIBADAHAgEAAgIP # KzAHAgEAAgIR6DAKAgUA6hwDAQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AKgOgBAuUbTQVBx04gbhVqO9nGZe5TQaxwT1i2ecEGQAjJhCyhdn9YxwaURvSN4E # X7nKP2efGYEXUdiU2p1oCE8j2vqc/R3bnYJr7/9c4Ib2auJnXJdS/jC+mdyTGFmP # blfl43QCRnj1oCx7a6g29jHeakML1oY1q+zBcUAh/C+qMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAA # AeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgqbBl+nrvXOWKubUW8ntVYGR9ItKOpFKRBZnHdfXL # pqgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCS # b4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIC9IyXM5/TWDqWVuyzsRDZ+U # BqTps3Pi6jGQp/ZzIdEPMA0GCSqGSIb3DQEBCwUABIICAIa5ts/DuidiwrZxJknP # PPXeUXA191vejgYaeEdfAIsuwxDDX/d1ViYUlz8ijxxHEf1/tj92PamuUUBvSX4n # I0c8gwkJgpev1KNk8OFmaeP2qOPrgXdvVxHXFhHjZKLWWH1sBgy7Pxm8JOusD5JH # DcYdV9uyKZrTGcZ442noD9pdIOQu2Y0knq8P4YutCWf6T3HBs8Ey+0aQSeXC+zyZ # cDvyg9kr+aMofDY9hZIdNoVZI+o6AKOEvxOygH6inxzPu4gzD7pHV5CQJUfFyWyE # SBiG1ouf1mYY/gv46Exolm46eodbjuwIg22RB2WGI8MsL4+6nQ8SQ5DL7qAtvW4Z # BAeZMw/yem2CgCt+qQkWhaBF1waG83L33H0VbaphEARjcT/o926p7N9DJ8n+AiY+ # SrEZ+FN1AN3hHUrdH1kvdT4RUOISV4ZZxPwvxAAt+fV9A7j36AzitML6sdIxDhmh # Y9bGFi0og66Qt6Q0+OfACPimatyCKOFNYwuK4yC8tmjEPwx8//E2Ps+3JkDPQGow # Ns7sbonjotyD8zCxQPhR5yL8VEMiurBEO3dao3NN9mLn4eOHUqhyRiR1S5A2URI5 # KNGiY2Kf0HfJ0ocSLOti2HLJB4sBGrkHE2Vn6MWR5fMnNmK1XwmYNZxou+TRerjc # Sr64I0+Rbm5kxw84pDMHLGCx # SIG # End signature block
combined_dataset/train/non-malicious/2593.ps1
2593.ps1
$ReplItemsQuery = "DECLARE @ReplItems TABLE ( [ServerName] [varchar](64) NOT NULL, [Databasename] [varchar](128) NOT NULL, [addl_loan_data] [int] NULL, [appraisal] [int] NULL, [borrower] [int] NULL, [br_address] [int] NULL, [br_expense] [int] NULL, [br_income] [int] NULL, [br_liability] [int] NULL, [br_REO] [int] NULL, [channels] [int] NULL, [codes] [int] NULL, [customer_elements] [int] NULL, [funding] [int] NULL, [inst_channel_assoc] [int] NULL, [institution] [int] NULL, [institution_association] [int] NULL, [loan_appl] [int] NULL, [loan_fees] [int] NULL, [loan_price_history] [int] NULL, [loan_prod] [int] NULL, [loan_regulatory] [int] NULL, [loan_status] [int] NULL, [product] [int] NULL, [product_channel_assoc] [int] NULL, [property] [int] NULL, [servicing] [int] NULL, [shipping] [int] NULL, [underwriting] [int] NULL ) INSERT INTO @ReplItems EXEC sp_MSForEachDB' USE ? SELECT ServerName AS ServerName , DB_NAME() AS DBName , addl_loan_data, appraisal, borrower , br_address, br_expense, br_income , br_liability, br_REO, channels , codes, customer_elements, funding , inst_channel_assoc, institution, institution_association , loan_appl, loan_fees, loan_price_history , loan_prod, loan_regulatory, loan_status , product, product_channel_assoc, property , servicing, shipping, underwriting FROM (SELECT DISTINCT @@SERVERNAME AS ServerName , DB_NAME() AS DBName , t.name AS TableName , COUNT(c.name) AS ColumnNum FROM sys.tables t JOIN sys.columns c ON t.object_id = c.object_id JOIN sys.types ty ON c.system_type_id = ty.system_type_id where t.is_published = 1 or t.is_merge_published = 1 or t.is_schema_published = 1 GROUP BY t.name --ORDER BY 2,3 ) AS SourceTable PIVOT (SUM(ColumnNum) FOR TableName IN (addl_loan_data , appraisal, borrower, br_address , br_expense, br_income, br_liability , br_REO, channels, codes , customer_elements, funding, inst_channel_assoc , institution, institution_association, loan_appl , loan_fees, loan_price_history, loan_prod , loan_regulatory, loan_status, product , product_channel_assoc, property, servicing , shipping, underwriting) ) AS PivotTable;' SELECT * FROM @ReplItems ORDER BY 1,2" $ServerQuery = "SELECT Server FROM SQLDatabases WHERE DatabaseName LIKE 'distribution' AND Filename LIKE '%.MDF' AND Server NOT LIKE '%PSQLSVC21%' -- not an SMC replication server ORDER BY 1" function Run-Query() { param ( $SqlQuery, $SqlServer, $SqlCatalog ) $SqlConnection = New-Object System.Data.SqlClient.SqlConnection("Data Source=$SqlServer;Integrated Security=SSPI;Initial Catalog=$SqlCatalog;"); $SqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $SqlCmd.CommandText = $SqlQuery $SqlCmd.Connection = $SqlConnection $SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $SqlAdapter.SelectCommand = $SqlCmd $DataSet = New-Object System.Data.DataSet $a = $SqlAdapter.Fill($DataSet) $SqlConnection.Close() $DataSet.Tables | Select-Object -ExpandProperty Rows } $ReplicatedItems = @() $Publishers = Run-Query -SqlQuery $ServerQuery -SqlServer XSQLUTIL18 -SqlCatalog Status | Select-Object -Property Server | Sort-Object -Property Server foreach ($Publisher IN $Publishers) { $databases = Run-Query -SqlQuery $ReplItemsQuery -SqlServer $($Publisher.Server) | Sort-Object -Property ServerName, Databasename if (!$databases) { Write-Host "Found an empty database record for server $($Publisher.Server)." } else { $dbnew = $databases[0].Databasename } foreach ($db IN $databases ) { $dbcurrent = $($db.Databasename) if (!$dbcurrent) { break; } $ReplicatedItem = New-Object -TypeName PSObject Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "ServerName" -Value $($db.ServerName) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "DatabaseName" -Value $($db.Databasename) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "addl_loan_data" -Value $($db.addl_loan_data) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "appraisal" -Value $($db.appraisal) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "borrower" -Value $($db.borrower) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "br_address" -Value $($db.br_address) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "br_expense" -Value $($db.br_expense) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "br_income" -Value $($db.br_income) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "br_liability" -Value $($db.br_liability) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "br_REO" -Value $($db.br_REO) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "channels" -Value $($db.channels) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "codes" -Value $($db.codes) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "customer_elements" -Value $($db.customer_elements) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "funding" -Value $($db.funding) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "inst_channel_assoc" -Value $($db.inst_channel_assoc) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "institution" -Value $($db.institution) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "institution_association" -Value $($db.institution_association) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_appl" -Value $($db.loan_appl) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_fees" -Value $($db.loan_fees) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_price_history" -Value $($db.loan_price_history) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_prod" -Value $($db.loan_prod) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_regulatory" -Value $($db.loan_regulatory) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "loan_status" -Value $($db.loan_status) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "product" -Value $($db.product) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "product_channel_assoc" -Value $($db.product_channel_assoc) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "property" -Value $($db.property) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "servicing" -Value $($db.servicing) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "shipping" -Value $($db.shipping) Add-Member -InputObject $ReplicatedItem -type NoteProperty -Name "underwriting" -Value $($db.underwriting) $ReplicatedItems += $ReplicatedItem } } $ReplicatedItems = $ReplicatedItems | Sort-Object "ServerName", "DatabaseName" $SpreadSheet = ("E:\Dexma\logs\ReplicatedItems-" + (Get-Date -Format ddMMyyyy) + ".xlsx") $TempCSV = ($env:TEMP + "\" + ([System.GUID]::NewGuid()).ToString() + ".csv") $ReplicatedItems | Export-Csv -Path $TempCSV -NoTypeInformation if (Test-Path -Path $SpreadSheet) { Remove-Item -Path $SpreadSheet } $erroractionpreference = "SilentlyContinue" $OutBook = New-Object -comobject Excel.Application $OutBook.visible = $False $Workbook = $OutBook.Workbooks.Open($TempCSV) $Workbook.Title = ("Replicated Items for SMC replication" + (Get-Date -Format D)) $Workbook.Author = "Michael J. Messano" $Worksheet = $Workbook.Worksheets.Item(1) $LastColumn = ($worksheet.UsedRange.Columns.Count + 1 ) for ( $i = 1; $i -lt $LastColumn; $i++) { $Worksheet.Cells.item(1,$i).Interior.ColorIndex = 15 $Worksheet.Cells.item(1,$i).Font.ColorIndex = 5 $Worksheet.Cells.item(1,$i).Font.Bold = $True if ($i -gt 2) { $Worksheet.Cells.item(1,$i).Orientation = 90 } } $Worksheet.UsedRange.EntireColumn.Autofit() | Out-Null $Worksheet.Name = "SMC Replicated Items" $List = $Worksheet.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $Worksheet.UsedRange, $null, [Microsoft.Office.Interop.Excel.X1YesNoGuess]::xlYes, $null) $List.Name = "Item Table" $Workbook.SaveAs($SpreadSheet, 51) $Workbook.Saved = $true $Workbook.Close() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($Workbook) | Out-Null $SpreadSheet.Quit() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($SpreadSheet) | Out-Null [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() if (Test-Path -Path $TempCSV) { Remove-Item -Path $TempCSV }
combined_dataset/train/non-malicious/sample_67_78.ps1
sample_67_78.ps1
#!/usr/bin/env pwsh $PlaywrightFileName = Join-Path $PSScriptRoot "Microsoft.Playwright.dll" [Reflection.Assembly]::LoadFile($PlaywrightFileName) | Out-Null exit [Microsoft.Playwright.Program]::Main($args) # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoJjGbg2OY61ib # Kwt3GCNoKEhugpoxT6j0VnwLrTwJMaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFVpdfgk6vo1WeGDLQ9ZujwX # D0DmghRyBza6020VaYxOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGW+oEuwliHbutmeBVtvPgl8vA8LyG9b/efwXnCM4qPhwnhPMB7eT9wH/ # KTM4I149kZshGl+1cwD+YEBIpPmkBlFH5LgCIK9Dr35SqEozApzteUvZwLt5m04D # Qoc0mX9Zb3Z3ef5EQLJbjTC7Ncy/PzRkvZ4V4UOKRdY3TEoOo+pVSJRBeran9Fc/ # gPhnuoAup+SgQrvNQKVQdcdvBAcbcBg85hXV7saKGAciPDx4KmuufNYTrVmgipiU # 1jvE0A0BoWXx5BRFI+5FYX6ePlB2OZxTO8ZPwN0JYOLbUlQe0Q99VBjfiIsge0sA # +4WVv/M/bQ5jGVOK/jS5hUik+HsQXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAKeTn41FqYye5qiLkZ40DQ+iDJoq7ApLAn++ImSULLbgIGZnLPTEG0 # GBMyMDI0MDcxMDIxMDg0Ny41OTZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOo4+qMwIhgPMjAyNDA3MTAyMDE4NDNaGA8yMDI0MDcxMTIwMTg0M1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6jj6owIBADAHAgEAAgINeDAHAgEAAgIS+jAKAgUA # 6jpMIwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJLZgcpY6Xf2dRu6oIIj # zbUxSFwjDFKKs2KsEX1xSiOguc/GwwKm6LjfrT2ZCXMMtiPk2Dos9yWnzDR0UlBo # 2ZQiwP89A0ZRDqerJCEeAldTw6166Ug6vvx4VeK4c5zJK77Rw98dJZFN1jSogRxO # tN9D1kiXdX0bOUyieGRYlTnWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgFDLkpECK4pXhk34YiEwObDp9Chzrtar9LfyqoCG+uywwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEIHn21pdpny/r0Ou4AjKR3VEYjXWHOKa/r06NKaeRglG6 # MA0GCSqGSIb3DQEBCwUABIICALkQNEHFFqX1paOT7j/wBRZAq5T3KcnaudKMA8/0 # JnVgG7fCI0Epecw8ST909d4UytGOdU1jzp2eTv+a4Mbue8O2SqY4TCol9EfygQ/b # L6uFqbPk0YqEiBw0Fhgqg5OrPf0IjAe0Vf8yEjDTg5VddHGvzs/nvN4WCx9SyPUP # GxQaugmQTkNvXrvchiItgUt0GuqFB7dP3Aq/2oJTpubLavq+4QglCidirCpB2dmt # 7ieuHcdvoB9pI+nm/zZ3+3GvHUFF7+nEMgSXN0R1qsLRPEgKVwWyh+uUbPcjnxuz # XLxQ1s8IFx4IWEcMOOsM61FHIpN9547ogdXwAx3e9Gidc+bmCzkTa60ckDk7lYZ/ # JmtNyv+NUQugwEZs3hCANMMojaTiKtq9G5heI2CU/N1o6BV+jYHgwGjtZk21/bF/ # 5wld7f9oCKNBISbJwd/wFN+xMnfbfX1JFb2LoJ2P5RF416SGGF0UUvRka8dqf3qK # 8Sg0QApiFqVFAx9JxYURwDOPzHjvXuh10pejBtNALOHcVABFY1WA55dhXrd1Olsy # tWUnc6Z5YOqkkRKq6YznkOxlFFeJNCU4isHxCIThiAq9HKzMkPQV5MFDEjWIKl8R # QkgHU9Y+6s+k5JPqEgSsVgpyRUagoByKwZqHGocvOcq5IfWnkhOVQUYePwWIRY6k # 0ZzR # SIG # End signature block
combined_dataset/train/non-malicious/Remove-DeadITunesTracks.ps1
Remove-DeadITunesTracks.ps1
Clear $ITunes = New-Object -ComObject iTunes.Application 1..$ITunes.LibraryPlaylist.Tracks.Count | % { $CurrentTrack = $ITunes.LibraryPlaylist.Tracks.Item($_) # File Track ?? if ( $CurrentTrack.Kind -eq 1 ) { if ( ! ([System.IO.File]::Exists($CurrentTrack.Location)) ) { Write-Host "$($CurrentTrack.Artist) - $($CurrentTrack.Name) has been deleted." $CurrentTrack.Delete() } } Write-Progress -activity "Removing Dead Tracks" -status "$($CurrentTrack.Artist) - $($CurrentTrack.Name)" -percentComplete ( $_/$ITunes.LibraryPlaylist.Tracks.Count*100) }
combined_dataset/train/non-malicious/sample_31_27.ps1
sample_31_27.ps1
# # Module manifest for module 'OCI.PSModules.Containerengine' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Containerengine.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a2abf0e1-9176-4de5-88c9-38563bb69eee' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Containerengine Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerengine.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Complete-OCIContainerengineCredentialRotation', 'Disable-OCIContainerengineAddon', 'Get-OCIContainerengineAddon', 'Get-OCIContainerengineAddonOptionsList', 'Get-OCIContainerengineAddonsList', 'Get-OCIContainerengineCluster', 'Get-OCIContainerengineClusterMigrateToNativeVcnStatus', 'Get-OCIContainerengineClusterOptions', 'Get-OCIContainerengineClustersList', 'Get-OCIContainerengineCredentialRotationStatus', 'Get-OCIContainerengineNodePool', 'Get-OCIContainerengineNodePoolOptions', 'Get-OCIContainerengineNodePoolsList', 'Get-OCIContainerenginePodShapesList', 'Get-OCIContainerengineVirtualNode', 'Get-OCIContainerengineVirtualNodePool', 'Get-OCIContainerengineVirtualNodePoolsList', 'Get-OCIContainerengineVirtualNodesList', 'Get-OCIContainerengineWorkloadMapping', 'Get-OCIContainerengineWorkloadMappingsList', 'Get-OCIContainerengineWorkRequest', 'Get-OCIContainerengineWorkRequestErrorsList', 'Get-OCIContainerengineWorkRequestLogsList', 'Get-OCIContainerengineWorkRequestsList', 'Invoke-OCIContainerengineClusterMigrateToNativeVcn', 'Invoke-OCIContainerengineInstallAddon', 'New-OCIContainerengineCluster', 'New-OCIContainerengineKubeconfig', 'New-OCIContainerengineNodePool', 'New-OCIContainerengineVirtualNodePool', 'New-OCIContainerengineWorkloadMapping', 'Remove-OCIContainerengineCluster', 'Remove-OCIContainerengineNode', 'Remove-OCIContainerengineNodePool', 'Remove-OCIContainerengineVirtualNodePool', 'Remove-OCIContainerengineWorkloadMapping', 'Remove-OCIContainerengineWorkRequest', 'Start-OCIContainerengineCredentialRotation', 'Update-OCIContainerengineAddon', 'Update-OCIContainerengineCluster', 'Update-OCIContainerengineClusterEndpointConfig', 'Update-OCIContainerengineNodePool', 'Update-OCIContainerengineVirtualNodePool', 'Update-OCIContainerengineWorkloadMapping' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerengine' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_35_5.ps1
sample_35_5.ps1
# # Module manifest for module 'PSScriptAnalyzer' # @{ # Author of this module Author = 'Microsoft Corporation' # Script module or binary module file associated with this manifest. RootModule = 'PSScriptAnalyzer.psm1' # Version number of this module. ModuleVersion = '1.22.0' # ID used to uniquely identify this module GUID = 'd6245802-193d-4068-a631-8863a4342a18' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) Microsoft Corporation 2016. All rights reserved.' # Description of the functionality provided by this module Description = 'PSScriptAnalyzer provides script analysis and checks for potential code defects in the scripts by applying a group of built-in or customized rules on the scripts being analyzed.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '3.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @('ScriptAnalyzer.types.ps1xml') # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @('ScriptAnalyzer.format.ps1xml') # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module FunctionsToExport = @() # Cmdlets to export from this module CmdletsToExport = @('Get-ScriptAnalyzerRule', 'Invoke-ScriptAnalyzer', 'Invoke-Formatter') # Variables to export from this module VariablesToExport = @() # Aliases to export from this module AliasesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess PrivateData = @{ PSData = @{ Tags = 'lint', 'bestpractice' LicenseUri = 'https://github.com/PowerShell/PSScriptAnalyzer/blob/master/LICENSE' ProjectUri = 'https://github.com/PowerShell/PSScriptAnalyzer' IconUri = 'https://raw.githubusercontent.com/powershell/psscriptanalyzer/master/logo.png' ReleaseNotes = '' } } # HelpInfo URI of this module HelpInfoURI = 'https://aka.ms/ps-modules-help' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDElwD9K9ZWGrgX # yB0p91A6ZKvG7XbRNYr5QxNte+aJ6aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF2y/Ksff7ZXFZkDzWHtDB39 # vKj4S7jZeehs6xRX29bUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGJbjeuPNP0TzbVBEpxidgYRlcILmRVPmRE6fmUb3FD939CRfLAxDZEaY # /nUsqemFdlGesYxZLoiTN+LHY87fm+8gkubftmnnmlrsRAT+wt77p942FHjeJdyI # L9VSkLSJdmEpAhzWnTbszXGb16Swe1iwW8qqOgcNzFsxQxjeCB2luCZTSM5jCb0J # XJFYPJBvVRhbaikLMvJygXypcpkt0/wMugCfZdLs+oHKTC9Thfx0D5/fPhgQHSZ8 # LYPFtMoxqqTHfY6RO+d9PBCvGpkG675VviJaAqDCcasCusIY8vz42ybK+WYW5eTO # SJV0Dmn1MJYYDe1CqDEYH0flWiQLNqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAGdQveuMGAJmzHL6O9zick+owHSlLWkqx0jXzkUUkS4QIGZhgNSc1Q # GBMyMDI0MDQxNjIxMDgzMS4xMzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ckjFDAiGA8yMDI0MDQxNjE2MTcy # NFoYDzIwMjQwNDE3MTYxNzI0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpySMU # AgEAMAcCAQACAiI9MAcCAQACAhNTMAoCBQDpynSUAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABRPjWpKPz4a8hNRqN3XxWxWFbFRkI+O6znRQetIWp7Vt5pY # NRfapCWRMN7gtmesMxF31IOip+KwT+qEzE2AjfbXqGya5JvFOAey/XbVQzQGsEYG # yRUsSrz7kKdVlFIEjuyDpOP7JtqTbWuUii0+eqUkvCcXzKC5FGgXNJ98Y0XKkWav # DJXcOkiXE0FO/u0FuuhUYHceXM1xe4OBDaJZWr8+KwK8yo/Zxg+ivpGwIWoMSVfW # KvJ9X9i69JiCbYa7n8enUMr6D821VUVzXhmScEg76klfMVYFMUe2KYcg57tek8vB # otI/OEqp/ikU8S2HYYbdd6KrFJ/tlfSff6nV+xoxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCwXxp4BElE9/Zh9Pu6vBVDSu2NzhCSWTg/cDfLeCrG9zCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u # KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgNbeJUu026L4LTOJstXQQLLYDTBDT # LFwbIK3ZGO2pqFUwDQYJKoZIhvcNAQELBQAEggIAgHK8iQuGBYRPH1qnqPL5iLeo # s/XTwAFDp/HXWcC2fG9eIZP1pfPhJZ1GReLEAnwyPDGGj7+epjoVUOr/L2KIVKFq # AUzbx+kTd/7otP2zJnBwGSZkSy816aF4XRVHf/yAbetjUaWzvSCsNwMMhLo/EWQy # LC7LKQO7EZIBLVyncfByNJ3MyPnk690BM1uEvwi9fuLSfCpwEPHBRWXetLPxpp16 # 9yQpgefuq9tYqcW56YIAC6xp1lFvE5TFNMVU77LDiPPjZNizw3FlHO5wVHvmLW2M # S2t4uM/EOIdQqHaFWpiATNdtlmPNCEEB+J24N1Ah9I20/J9sZUI0vlLAcQJYpEVL # LOm/Hg2OEPRY4tDOI72UZJjmTCAEQsWajDmXXNPwR9cclpJAHiNU/XcjWY9cgZ6v # qmsf64AVYILNe87upgJ/GmckMdFhCjoGofwnA5Se0zTpl5X9/3riENKbnTFRvVFm # J/ZUl9PJqm/fSMdS61Obq3PdoJSznRBHBQvdZpuJnJE22ri4EQItdPF/qPLE0RUI # FznNkGZFUpdujnjZDo5EGsNNCAz7L4QfpNzdDUI3HIW7Y4hceXWedJJN7jnZMcrb # +MKrjTO3nRtW7lXCbKw8x/Sak9PrRLW692Yd0gJwS02Borc256wIS9j4dzT+a/9B # jg4RBXFC6aH3sk29kSs= # SIG # End signature block
combined_dataset/train/non-malicious/sample_12_31.ps1
sample_12_31.ps1
ConvertFrom-StringData @' id_ex_exbpacmdact=Exchange Support Tool - ExBPA id_ex_exbpacmdstat=Running Exchange Best Practices Analyzer (ExBPA), please wait... id_ex_exbpacmdfiledescription=ExBPA Health Check id_ex_exbpacmdreportsection=Exchange Toolbox '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVmUIaS3EhrrD1 # r+UIU1gu/s+U4Vj5YiUZ92+59UkLqaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPuj # jGmy1nPpwZFKnf0iPayYaPy8suCedLpN/lU86ItVMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmPnKVmAwk6KNQ8grRoA7/DRQw1ETg33ElZId # wAV8yRu3vQcqwwqkiGD0xbf3LUR9KBjr25gxkOYOMaHeZJ5OsjM12ffX6qpWxjXy # QBuFCfZ6v6XqrgYekyyjaF9TXfEXAL3ySAmjflorrmyb/bRj6+D3MjcZ3ocXrbtO # IJwZ24E7Zg73t5qMGJg1KGMIOyOZKE9Zoj7zSp7uU+IAw+SrX897XTDSZMre4ZTS # FIfX7XS0cSnOJ4mLxI09j4mkVhTK0r5X93NmqiGgEN8P1XiSTwUMz3cP4J9aVoDF # aWTxGv1zsVeefX6qd6bhnWfQHwmC28LLR672xO+7+ZurCUN+BqGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDzqtXUyQ2MQ0EhXyavSwG1DjAt3JpI1ijd # E2qc5NxBdgIGZutgsUnmGBMyMDI0MTAyODExNDA0MS43NDNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG # hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV # zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm # XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE # xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu # o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu # e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW # OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp # MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2 # 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+ # Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX # Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3 # gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi # Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1 # 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC # egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8 # jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh # 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5 # A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld # yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6 # XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF # HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X # ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0 # MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA # AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe # 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs # FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB # 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S # 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn # +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgcRumEfWZSdIP/cmBJ5OlNA1kqERrybUyY8jcr9PceO0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60 # RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN # J5IJMA0GCSqGSIb3DQEBCwUABIICAGo/aF3XiyKO1ZHtYN9cmgeXYQ1daSfDTitj # I8OgCx6vk/fsc05BachfzohN32dt6jrYNf/xQ429bl9Scz2aesZQMW9cobcSCKZO # k7QledYqtVeK6NjPExPxFBRPEcm0xJeMMGXJStLNude4aQnYHMoOyKZviurovfrf # yQ/8BPVnt0PzeWd8hC/gKgLdjqQlLoyUe053SgUdpiOtdBx6HAoak1r9k35P4JzC # os2gY3STfJXY/n70K8yxGitNclwWoONIjoOsh7TosOaVS0qSVGK0Pb0F3D6Fr1b8 # +s6sNbOvEUc/te9zU6afok4S50IaggHBfBD1avG8pQHgxOohq43ClezE1Us9aLs3 # 1bQ0+FSiEy+9V2w3QX9aT7ofkcgaGUBm0kxzGAKaIYZLN5fc27HDy2MTBZHL9012 # mTGOuYAPc50kSUcoUg8ePnF7kTi5YFr55M6b2stCR7L6uSMV4odj6Z+0oIJLbk+r # ja9AoB32pOp6zYTafQx6CmJSicdooDhwVsidd1UAnk5uOuiamZ1Wm6pMKfW4wX2D # w2f7BkPZydDwZcq2nJofpsGCtH+RapklUzI6JcbngJeYof1J7Uk537pXhRmpH9Yv # DMK3fuIW+oZ5gkZXzvmFgWLM2WZGWCaEB+MZpCqaVZuqyocPgXMVMahEwL/t3J6S # npjcywp9 # SIG # End signature block
combined_dataset/train/non-malicious/4124.ps1
4124.ps1
cls Set-Variable -Name a -Scope Global -Force Set-Variable -Name Output -Scope Global -Force Function AddRemovePrograms($KeyName, $DisplayName, $Version){ New-PSDrive -Name HKCR -PSProvider Registry -Root HKEY_CLASSES_ROOT Set-Variable -Name AddRemKey -Scope Local -Force Set-Variable -Name guid -Scope Local -Force Set-Variable -Name ProductsKey -Scope Local -Force If (!(Test-Path c:\windows\GSPBox_Icon.bmp)){ Copy-Item -Path \\global.gsp\data\clients\na_clients\Build\Add-ins\GSPBox_Icon.bmp -Destination c:\Windows -Force } $AddRemKey = "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" $ProductsKey = "HKCR:\Installer\Products\" New-Item -Path $AddRemKey -Name $KeyName –Force New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayName -Value $DisplayName -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayVersion -Value $Version -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name UninstallString -Value " " -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name Publisher -Value "Gresham, Smith and Partners" -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayIcon -Value "c:\windows\GSPBox_Icon.bmp" -PropertyType String $guid = [guid]::NewGuid().ToString("N") $guid.ToString() $guid = $guid.ToUpper() New-Item -Path $ProductsKey -Name $guid –Force New-ItemProperty -Path $ProductsKey"\"$guid -Name ProductName -Value $DisplayName -PropertyType String -Force remove-psdrive -name HKCR Remove-Variable -Name AddRemKey -Scope Local -Force Remove-Variable -Name guid -Scope Local -Force Remove-Variable -Name ProductsKey -Scope Local -Force } Invoke-Command {dism.exe /online /disable-feature /featurename:MediaCenter /norestart} $a = Invoke-Command {dism.exe /online /get-featureinfo /featurename:MediaCenter} $Output = $a | Select-String "State : Disabled" Write-Host $Output If ($Output -like "State : Disabled"){ AddRemovePrograms "MediaCenter" "MediaCenter" "Disabled" } Remove-Variable -Name a -Scope Global -Force Remove-Variable -Name Output -Scope Global -Force
combined_dataset/train/non-malicious/sample_50_63.ps1
sample_50_63.ps1
##------------------------------------------------------------------ ## <copyright file="ExtensionHelper.psm1" company="Microsoft"> ## Copyright (C) Microsoft. All rights reserved. ## </copyright> ##------------------------------------------------------------------ #region Constants $global:systemDriveLetter = $env:SystemDrive.split(':')[0] $global:extensionRootLocation = Split-Path -Parent $PSScriptRoot $global:packageBinPath = Join-Path -Path $global:extensionRootLocation -ChildPath "bin" $global:ObsArtifactsPaths = @{ FDA = Join-Path -Path $global:packageBinPath -ChildPath "FDA\content\FleetDiagnosticsAgent" GMA = Join-Path -Path $global:packageBinPath -ChildPath "GMA" MAWatchdog = Join-Path -Path $global:packageBinPath -ChildPath "MAWatchdog" ObservabilityAgent = Join-Path -Path $global:packageBinPath -ChildPath "ObsAgent\lib" ObservabilityDeployment = Join-Path -Path $global:packageBinPath -ChildPath "ObsDep" SBCClient = Join-Path -Path $global:packageBinPath -ChildPath "SBRPClient" TestObservability = Join-Path -Path $global:packageBinPath -ChildPath "TestObservability" UtcExporter = Join-Path -Path $global:packageBinPath -ChildPath "UtcExporter" } $global:SymLinkPaths = @{ DiagnosticsInitializer = @{ SymLink = "C:\Program Files\WindowsPowerShell\Modules\DiagnosticsInitializer" Destination = Join-Path $global:ObsArtifactsPaths.ObservabilityAgent -ChildPath "DiagnosticsInitializer" } SBRPClient = @{ SymLink = "C:\Program Files\SBRPClient" Destination = $global:ObsArtifactsPaths.SBCClient } ObservabilityAgent = @{ SymLink = "C:\Program Files\ObsAgent" Destination = $global:ObsArtifactsPaths.ObservabilityAgent } TestObservability = @{ SymLink = "C:\Program Files\WindowsPowerShell\Modules\TestObservability" Destination = $global:ObsArtifactsPaths.TestObservability } } $global:DeviceType = $null $global:HandlerPublicSettings = $null $global:ArcAgentResourceInfo = $null $global:LogFile = $null #endregion Constants #region Imports Import-Module (Join-Path -Path $global:ObsArtifactsPaths.GMA -ChildPath 'GMATenantJsonHelper.psm1') ` -DisableNameChecking ` -Verbose:$false #endregion Imports #region Functions #region Pre-installation validation functions function Assert-NoObsGMAProcessIsRunning { param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile ## Step 1: Check if MAWatchdog is running? If yes, then stop and unregister the service. if (Get-Service $MiscConstants.ObsServiceDetails.WatchdogAgent.Name -ErrorAction SilentlyContinue) { ## Unregister watchdog agent service Write-Log "$functionName : Found already running watchdog service. Trying to stop and unregister the service." ` -LogFile $LogFile Stop-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.WatchdogAgent.Name ` -LogFile $LogFile $sleepSeconds = 30 Write-Log ` -Message "$functionName : Letting the process sleep for $sleepSeconds second(s), so that any child processes of the service can shutdown gracefully." ` -LogFile $logFile Start-Sleep -Seconds $sleepSeconds Unregister-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.WatchdogAgent.Name ` -LogFile $LogFile } else { Write-Log "$functionName : No registered watchdog service found." ` -LogFile $LogFile } ## Step 2: Now check if MA host processes are still running or not. $runningMAHostProcesses = @() $runningMAHostProcesses += Get-WmiObject win32_process | Where-Object {$_.name -like $MiscConstants.GMAHostProcessNameRegex} Write-Log "$functionName : Count of already running MonAgentHost process = $($runningMAHostProcesses.Count)." ` -LogFile $LogFile foreach ($hostProcess in $runningMAHostProcesses) { ## Step 3: If yes, check for command line value and validate it is not running as AMA and then check if the GMA is running in multi-tenant mode. if (($hostProcess.CommandLine -notmatch $MiscConstants.AMAModeCmdParam) -and ($hostProcess.CommandLine -match $MiscConstants.GMAMultiTenantModeCmdParam)) { ## Step 4: If yes, then stop that MA host process forcefully and the child processes will shutdown by themselves. $procId = $hostProcess.ProcessId Stop-Process -Id $procId -Force Write-Log "$functionName : Stopped the process ($($hostProcess.Name) with id: $procId) running as multi-tenant service with these cmd params: $($hostProcess.CommandLine)." ` -LogFile $LogFile $sleepSeconds = 60 Write-Log ` -Message "$functionName : Letting the process sleep for $sleepSeconds second(s), so that child GMA processes can shutdown gracefully." ` -LogFile $logFile Start-Sleep -Seconds $sleepSeconds break } } Write-Log "[$functionName] Exiting." -LogFile $LogFile return $true } function Assert-SufficientDiskSpaceAvailableForGMACache { param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile $ObsFolderName = $(Get-CacheDirectories).ObservabilityVolume if (-not (Test-Path $ObsFolderName -PathType Container)) { Write-Log "[$functionName] Checking diskspace as $ObsFolderName folder does not exist." -LogFile $LogFile $availableDiskspaceOnSysDrive = ((Get-Volume -DriveLetter $global:systemDriveLetter).SizeRemaining) / 1GB Write-Log "[$functionName] Available diskspace on $($global:systemDriveLetter) is $availableDiskspaceOnSysDrive GB." ` -LogFile $LogFile if ($availableDiskspaceOnSysDrive -lt $MiscConstants.AvailableDiskSpaceLimitInGB) { ## Update error message with disk space size so we know in the status and Portal. $ErrorConstants.InsufficientDiskSpaceForGMACache.Message = $ErrorConstants.InsufficientDiskSpaceForGMACache.Message -f $availableDiskspaceOnSysDrive, $global:systemDriveLetter return $ErrorConstants.InsufficientDiskSpaceForGMACache.Name } } else { Write-Log "[$functionName] As $ObsFolderName folder exists already, skip the diskspace check." -LogFile $LogFile } Write-Log "[$functionName] Exiting." -LogFile $LogFile return $true } function Invoke-PreInstallationValidation { param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name $validationFunctionNames = ( $MiscConstants.ValidationFunctionNames.AssertNoObsGMAProcessIsRunning, $MiscConstants.ValidationFunctionNames.AssertSufficientDiskSpaceAvailableForGMACache ) Write-Log ` -Message "[$functionName] Performing pre-installation validation." ` -LogFile $logFile foreach($validationFunction in $validationFunctionNames) { $validationResult = (Invoke-Expression "$validationFunction -LogFile `'$logFile`'") if ($validationResult -ne $true) { Write-Log ` -Message "[$functionName] $validationFunction - $($ErrorConstants.$validationResult.Message)" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $validationResult } Write-Log ` -Message "[$functionName] $validationFunction - $validationResult" ` -LogFile $LogFile ` } Write-Log ` -Message "[$functionName] Pre-installation validation completed successfully." ` -LogFile $logFile } #endregion Pre-installation validation functions #region GCS functions function Get-CloudName { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile ## Default Cloud. $gcsCloudName = $MiscConstants.CloudNames.AzurePublicCloud[1] $arcAgentResourceInfo = Get-ArcAgentResourceInfo -LogFile $logFile if ($null -ne $arcAgentResourceInfo -and (Confirm-IsStringNotEmpty $arcAgentResourceInfo.cloud)) { $gcsCloudName = $arcAgentResourceInfo.cloud Write-Log "[$functionName] CloudName from arc agent show = $gcsCloudName." -LogFile $LogFile } else { ## Check if any cloud value is passed through Config settings. $publicSettings = Get-HandlerConfigSettings -LogFile $LogFile if (Confirm-IsStringNotEmpty $publicSettings.cloudName) { $gcsCloudName = $publicSettings.cloudName Write-Log "[$functionName] CloudName from publicSetting = $($publicSettings.cloudName)." -LogFile $LogFile } } Write-Log "[$functionName] Exiting. GcsCloudName: $gcsCloudName." -LogFile $LogFile return $gcsCloudName } function Get-GcsEnvironmentName { Param ( [Parameter(Mandatory)] [System.String] $CloudName, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering. Params: {CloudName = $CloudName}" -LogFile $LogFile ## Default environment value. $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Prod ## Check reg key value for HCI and SDDC test devices $isSddcTestDevice = Test-RegKeyExists -Path $MiscConstants.SddcRegKey.Path -Name $MiscConstants.SddcRegKey.Name -LogFile $LogFile -GetValueIfExists if($null -ne $isSddcTestDevice -and $isSddcTestDevice -ne 0) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Ppe Write-Log "[$functionName] As $($MiscConstants.SddcRegKey.Path)\$($MiscConstants.SddcRegKey.Name) reg key is present, setting gcsEnvironmentName value to $gcsEnvironmentName." ` -LogFile $LogFile } ## Check reg key for ASZ CI devices elseif (Test-RegKeyExists -Path $MiscConstants.CIRegKey.Path -Name $MiscConstants.CIRegKey.Name -LogFile $LogFile) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Ppe Write-Log "[$functionName] As $($MiscConstants.CIRegKey.Path)\$($MiscConstants.CIRegKey.Name) reg key is present, setting gcsEnvironmentName value to $gcsEnvironmentName." ` -LogFile $LogFile } ## Check whether cloud name is Canary or PPE or reg key created for CI exists or not, if yes then change the GCSEnvironment to point to PPE instead. elseif ($CloudName -in $MiscConstants.CloudNames.AzureCanary -or ` $CloudName -in $MiscConstants.CloudNames.AzurePPE) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Ppe Write-Log "[$functionName] Based on CloudName ($CloudName), setting gcsEnvironmentName value to $gcsEnvironmentName." -LogFile $LogFile } elseif ($CloudName -in $MiscConstants.CloudNames.AzureUSGovernmentCloud) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Fairfax Write-Log "[$functionName] Based on CloudName ($CloudName), setting gcsEnvironmentName value to $gcsEnvironmentName." -LogFile $LogFile } elseif ($CloudName -in $MiscConstants.CloudNames.AzureChinaCloud) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.Mooncake Write-Log "[$functionName] Based on CloudName ($CloudName), setting gcsEnvironmentName value to $gcsEnvironmentName." -LogFile $LogFile } elseif (Get-IsArcAEnvironment) { $gcsEnvironmentName = $MiscConstants.GCSEnvironment.ArcAPpe Write-Log "[$functionName] As environment is ArcA, setting gcsEnvironmentName value to $gcsEnvironmentName." -LogFile $LogFile } Write-Log "[$functionName] Exiting. GcsEnvironmentName = $gcsEnvironmentName" -LogFile $LogFile return $gcsEnvironmentName } function Get-GcsRegionName { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile ## Defaulted to eastus region. $gcsRegionName = "eastus" $arcAgentResourceInfo = Get-ArcAgentResourceInfo -LogFile $logFile if ($null -ne $arcAgentResourceInfo -and (Confirm-IsStringNotEmpty $arcAgentResourceInfo.location)) { $gcsRegionName = $arcAgentResourceInfo.location Write-Log "[$functionName] RegionName from arc agent show = $gcsRegionName." -LogFile $LogFile } else { ## Check if any region value is passed through Config settings, if yes than use that $publicSettings = Get-HandlerConfigSettings -LogFile $LogFile if (Confirm-IsStringNotEmpty $publicSettings.region) { $gcsRegionName = $publicSettings.region Write-Log "[$functionName] RegionName from publicSetting = $gcsRegionName." -LogFile $LogFile } } Write-Log "[$functionName] Exiting. GCSRegionName: $gcsRegionName." -LogFile $LogFile return $gcsRegionName } function Wait-ForGcsConfigSync() { [CmdletBinding()] Param ( [Parameter(Mandatory)] [System.String] $LogFile, [Parameter(Mandatory = $false)] [int] $TimeInSeconds = 60 ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Entering. TimeOut: $TimeInSeconds" ` -LogFile $LogFile Write-Host "Going to wait for GCSConfig sync $TimeInSeconds" Start-Sleep -Seconds $TimeInSeconds $cacheDir = Get-CacheDirectories $gcsConfigFiles = Get-ChildItem -Path $cacheDir.DiagnosticsCache -Filter GcsConfig -Recurse if($gcsConfigFiles.Count -eq 0) { Write-Log ` -Message "$functionName : $($ErrorConstants.GcsConfigFilesNotFound.Message)" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error } Write-Log ` -Message "$functionName : Exiting. GCSCongfile count: $($gcsConfigFiles.Count)" ` -LogFile $LogFile } #endregion GCS functions #region Handler/Extension functions ## Get sequence number from env variable provided by Agent. function Get-ConfigSequenceNumber { if ($null -eq $env:ConfigSequenceNumber) { 0 } else { $env:ConfigSequenceNumber } } function Get-GmaPackageContentPath { $global:ObsArtifactsPaths.GMA } function Get-HandlerConfigSettings { <# Sample config json file: ------------------------------------------------------------ { "runtimeSettings": [ { "handlerSettings": { "publicSettings": { "region": "eastus", "cloudName": "AzureCanary", "deviceType": "AzureEdge" } } } ] } ----------------------------------------------------------- Or If you don't want to pass any values, it can be empty as follows: { "runtimeSettings": [ { "handlerSettings":{ "publicSettings":{} } } ] } #> param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name if ($null -eq $global:HandlerPublicSettings) { Write-Log "[$functionName] global:HandlerPublicSettings object found empty. Fetching the publicSettings and saving it in the global variable." -LogFile $LogFile $handlerEnvInfo = Get-HandlerEnvInfo -LogFile $LogFile if (-not (Test-Path $handlerEnvInfo.configFolder -PathType Container)) { Write-Log "[$functionName] $($ErrorConstants.ConfigFolderDoesNotExist.Message)" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $ErrorConstants.ConfigFolderDoesNotExist.Name } $configFile = Get-ChildItem -Path $handlerEnvInfo.configFolder | Sort-Object CreationTime -Descending | Select-Object -First 1 # Parse config file to read parameters $configJson = Get-Content -Path $configFile.FullName -Raw | ConvertFrom-Json $global:HandlerPublicSettings = $configJson.runtimeSettings[0].handlerSettings.publicSettings } else { Write-Log "[$functionName] global:HandlerPublicSettings object has value, returning it." -LogFile $LogFile } return $global:HandlerPublicSettings } function Get-HandlerEnvInfo { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) <# Sample HandlerEnvironment.json content: [ { "handlerEnvironment": { "configFolder": "C:\\Packages\\Plugins\\Microsoft.AzureStack.Observability.Observability\\0.0.0.4\\RuntimeSettings", "deploymentid": "", "heartbeatFile": "C:\\Packages\\Plugins\\Microsoft.AzureStack.Observability.Observability\\0.0.0.4\\status\\HeartBeat.Json", "hostResolverAddress": "", "instance": "", "logFolder": "C:\\ProgramData\\GuestConfig\\extension_logs\\Microsoft.AzureStack.Observability.Observability", "rolename": "", "statusFolder": "C:\\Packages\\Plugins\\Microsoft.AzureStack.Observability.Observability\\0.0.0.4\\status" }, "name": "Microsoft.RecoveryServices.Test.AzureSiteRecovery", "version": "1" } ] #> $envFile = Join-path -Path $global:extensionRootLocation -ChildPath "HandlerEnvironment.json" if (-not (Test-Path $envFile -PathType Leaf)) { throw $ErrorConstants.HandlerEnvJsonDoesNotExist.Name } # Read handler config $envJson = Get-Content -Path $envFile -Raw | ConvertFrom-Json if ($envJson -is [System.Array]) { $envJson = $envJson[0] } return $envJson.handlerEnvironment } function Get-HandlerHeartBeatFile { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $handlerEnvInfo = Get-HandlerEnvInfo -LogFile $LogFile return $handlerEnvInfo.heartbeatFile } function Get-HandlerLogFile { $functionName = $MyInvocation.MyCommand.Name if ($null -eq $global:LogFile) { $global:LogFile = Join-Path $(Get-LogFolderPath) -ChildPath $MiscConstants.HandlerLogFileName Write-Log "[$functionName] Setting the global:LogFile with the log file path of $($global:LogFile)." } else { Write-Log "[$functionName] global:LogFile object has value, returning it." } return $global:LogFile } function Get-LogFolderPath { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $handlerEnvInfo = Get-HandlerEnvInfo -LogFile $LogFile if (-not (Test-Path $handlerEnvInfo.logFolder -PathType Container)) { throw $ErrorConstants.LogFolderDoesNotExist.Name } return $handlerEnvInfo.logFolder } function Get-StatusFolderPath { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $handlerEnvInfo = Get-HandlerEnvInfo -LogFile $LogFile if (-not (Test-Path $handlerEnvInfo.statusFolder -PathType Container)) { throw $ErrorConstants.StatusFolderDoesNotExist.Name } return $handlerEnvInfo.statusFolder } function Get-StatusFilePath { $configSeqNum = Get-ConfigSequenceNumber $statusFolder = Get-StatusFolderPath return "$statusFolder\$configSeqNum.status" } #endregion Handler/Extension functions #region Misc functions function Get-CacheDirectories { Param () $gmaCacheLocation = Join-Path -Path $env:SystemDrive -ChildPath "GMACache" return [ordered] @{ GMACache = $gmaCacheLocation DiagnosticsCache = Join-Path -Path $gmaCacheLocation -ChildPath "DiagnosticsCache" HealthCache = Join-Path -Path $gmaCacheLocation -ChildPath "HealthCache" JsonDropLocation = Join-Path -Path $gmaCacheLocation -ChildPath "JsonDropLocation" MonAgentHostCache = Join-Path -Path $gmaCacheLocation -ChildPath "MonAgentHostCache" TelemetryCache = Join-Path -Path $gmaCacheLocation -ChildPath "TelemetryCache" ObservabilityVolume = Join-Path -Path $env:SystemDrive -ChildPath "Observability" } } function New-CacheDirectories { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Creating cache directories." ` -LogFile $LogFile $cacheDirectories = Get-CacheDirectories foreach ($directory in $cacheDirectories.Values) { New-Directory ` -Path $directory ` -LogFile $logFile } Write-Log "$functionName : Created cache directories." ` -LogFile $LogFile return $cacheDirectories } function New-Directory { param ( [Parameter(Mandatory = $true)] [System.String] $Path, [Parameter(Mandatory = $false)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Directory to create is '$Path'." ` -LogFile $LogFile if (Test-Path $Path -PathType Container) { Write-Log ` -Message "$functionName : Directory '$Path' exists already." ` -LogFile $LogFile } else { New-Item ` -Path $Path ` -ItemType "Directory" ` -Force ` -Verbose:$False ` | Out-Null Write-Log ` -Message "$functionName : Directory '$Path' created." ` -LogFile $LogFile } } function Get-UtcExporterPackageContentPath { $global:ObsArtifactsPaths.UtcExporter } function Get-FDAPackageContentPath { $global:ObsArtifactsPaths.FDA } function Get-ObservabilityDeploymentPackagePath { $global:ObsArtifactsPaths.ObservabilityDeployment } function Get-WatchdogPackageContentPath { $global:ObsArtifactsPaths.MAWatchdog } function Get-VCRuntimePackageContentPath { "$($global:ObsArtifactsPaths.ObservabilityDeployment)\content\VS17" } function Get-WatchdogStatusFile { param ( [Parameter(Mandatory = $true)] [System.String] $LogFile ) $watchdogStatusDirectory = Join-Path -Path $(Get-LogFolderPath) -ChildPath "WatchdogStatus" New-Directory -Path $watchdogStatusDirectory -LogFile $LogFile return Join-Path -Path $watchdogStatusDirectory -ChildPath $MiscConstants.WatchdogStatusFileName } function Set-Status { Param ( [Parameter(Mandatory)] [System.String] $Name, [Parameter(Mandatory)] [System.String] $Operation, [Parameter(Mandatory)] [System.String] $Message, [Parameter(Mandatory)] [ValidateSet("transitioning", "error", "success", "warning")] [System.String] $Status, [Parameter(Mandatory)] [System.Int16] $Code ) & "$PSScriptRoot\ReportStatus.ps1" ` -Name $Name ` -Operation $Operation ` -Status $Status ` -Code $Code ` -Message $Message } function Get-IsArcAEnvironment { return (Test-RegKeyExists -Path $MiscConstants.ArcARegKey.Path -Name $MiscConstants.ArcARegKey.Name -GetValueIfExists -LogFile $LogFile) -eq $true } function Set-StandaloneScenarioRegistry { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [System.String] $LogFile ) New-RegKey ` -Path $MiscConstants.GMAScenarioRegKey.Path ` -Name $MiscConstants.GMAScenarioRegKey.Name ` -PropertyType $MiscConstants.GMAScenarioRegKey.PropertyType ` -Value $MiscConstants.GMAScenarioRegKey.OneP ` -CreatePathOnly ` -LogFile $LogFile New-RegKey ` -Path $MiscConstants.GMAScenarioRegKey.Path ` -Name $MiscConstants.GMAScenarioRegKey.Name ` -PropertyType $MiscConstants.GMAScenarioRegKey.PropertyType ` -Value $MiscConstants.GMAScenarioRegKey.OneP ` -LogFile $LogFile } function Get-Sha256Hash { Param ( [Parameter(Mandatory=$true)] [System.String] $ClearString ) $hasher = [System.Security.Cryptography.HashAlgorithm]::Create('sha256') $hash = $hasher.ComputeHash([System.Text.Encoding]::UTF8.GetBytes($ClearString)) $hashString = [System.BitConverter]::ToString($hash) $hashString = $hashString.Replace('-', '') return $hashString } #endregion Misc functions #region UTC setup functions Function Initialize-UTCSetup { [CmdletBinding()] Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name try { Write-Log ` -Message "$functionName : Initializing UTC setup." ` -LogFile $logFile #region Stop diagtrack service Stop-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -LogFile $logFile #endregion Stop diagtrack service ## Create the UTC exporter destination folder (if not present) and copy the UtcGenevaExporter dll in it. Write-Log ` -Message "$functionName : Create folder for UTCExporterdll and place the respective binary in it." ` -LogFile $logFile $utcExporterDllName = $MiscConstants.UtcxporterDllName $utcExporterSourcePath = Join-Path -Path (Get-UtcExporterPackageContentPath) -ChildPath $utcExporterDllName $utcExporterDestinationDirectory = $MiscConstants.UtcExporterDestinationDirectory New-Directory ` -Path $utcExporterDestinationDirectory ` -LogFile $logFile Copy-Item ` -Path $utcExporterSourcePath ` -Destination $utcExporterDestinationDirectory ` -Force ` | Out-Null $utcExporterDestinationPath = Join-Path -Path $utcExporterDestinationDirectory -ChildPath $utcExporterDllName if (Test-Path $utcExporterDestinationPath) { Write-Log ` -Message "$functionName : Successfully copied '$utcExporterDllName' to '$utcExporterDestinationPath'." ` -LogFile $logFile } else { Write-Log ` -Message "$functionName : Failed to copy '$utcExporterDllName' to '$utcExporterDestinationPath'." ` -LogFile $logFile ` -Level $MiscConstans.Status.Error throw $ErrorConstants.CannotCopyUtcExporterDll.Name } #region Create reg keys New-RegKey ` -Path $MiscConstants.DiagTrackExportersRegKeyPath ` -LogFile $logFile ` -CreatePathOnly New-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -LogFile $logFile ` -CreatePathOnly New-RegKey ` -Path $MiscConstants.DiagTrackRegKey.Path ` -Name $MiscConstants.DiagTrackRegKey.Name ` -PropertyType $MiscConstants.DiagTrackRegKey.PropertyType ` -Value $MiscConstants.DiagTrackRegKey.Value ` -LogFile $logFile New-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -Name $MiscConstants.GenevaExporterRegKey.Name ` -PropertyType $MiscConstants.GenevaExporterRegKey.PropertyType ` -Value $utcExporterDestinationPath ` -LogFile $logFile New-RegKey ` -Path $MiscConstants.TestHooksRegKey.Path ` -Name $MiscConstants.TestHooksRegKey.Name ` -PropertyType $MiscConstants.TestHooksRegKey.PropertyType ` -Value $MiscConstants.TestHooksRegKey.Value ` -LogFile $logFile New-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -Name $MiscConstants.GenevaNamespaceRegKey.Name ` -PropertyType $MiscConstants.GenevaNamespaceRegKey.PropertyType ` -Value $MiscConstants.GenevaNamespaceRegKey.Value ` -LogFile $logFile #endregion Create reg keys #region Start diagtrack service Start-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -LogFile $logFile #endregion Start diagtrack service Write-Log ` -Message "$functionName : Successfully initialized UTC setup." ` -LogFile $logFile } finally { if ((Get-Service $MiscConstants.ObsServiceDetails.DiagTrack.Name).Status -eq "Stopped") { Write-Log ` -Message "$functionName : Starting $($MiscConstants.ObsServiceDetails.DiagTrack.Name) service after it was stopped." ` -LogFile $LogFile Start-Service ` -Name $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -ErrorAction SilentlyContinue ` -Verbose:$false ` | Out-Null } } } Function Clear-UTCSetup { [CmdletBinding()] Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name try { Write-Log ` -Message "$functionName : Cleaning up UTC related artifacts." ` -LogFile $logFile #region Stop diagtrack service Stop-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -LogFile $LogFile #endregion Stop diagtrack service #region Remove UtcExporter dll Write-Log ` -Message "$functionName : Removing UTCExporterdll file and its folder." ` -LogFile $logFile $utcExporterDestinationPath = Join-Path -Path $MiscConstants.UtcExporterDestinationDirectory -ChildPath $MiscConstants.UtcxporterDllName if (Test-Path -Path $utcExporterDestinationPath) { Remove-Item ` -Path $utcExporterDestinationPath ` -Force ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Removed file '$utcExporterDestinationPath'." ` -LogFile $logFile if ((Get-ChildItem -Path $MiscConstants.UtcExporterDestinationDirectory | Measure-Object).Count -eq 0) { Remove-Item ` -Path $MiscConstants.UtcExporterDestinationDirectory ` -Force ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Removed directory '$($MiscConstants.UtcExporterDestinationDirectory)'." ` -LogFile $logFile } Write-Log ` -Message "$functionName : Removed UTCExporterdll file '$utcExporterDestinationPath' and its folder path '$($MiscConstants.UtcExporterDestinationDirectory)'." ` -LogFile $logFile } else { Write-Log ` -Message "$functionName : UTCExporter dll does not exists at path '$utcExporterDestinationPath'. Nothing to remove." ` -LogFile $logFile } #endregion Remove UtcExporter dll #region Remove reg keys Remove-RegKey ` -Path $MiscConstants.DiagTrackRegKey.Path ` -Name $MiscConstants.DiagTrackRegKey.Name ` -LogFile $logFile Remove-RegKey ` -Path $MiscConstants.TestHooksRegKey.Path ` -Name $MiscConstants.TestHooksRegKey.Name ` -LogFile $logFile Remove-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -Name $MiscConstants.GenevaExporterRegKey.Name ` -LogFile $logFile Remove-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -Name $MiscConstants.GenevaNamespaceRegKey.Name ` -LogFile $logFile Remove-RegKey ` -Path $MiscConstants.GenevaExporterRegKey.Path ` -LogFile $logFile ` -RemovePathOnly #endregion Remove reg keys #region Start diagtrack service Start-ServiceForObservability ` -ServiceName $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -LogFile $LogFile #endregion Start diagtrack service Write-Log ` -Message "$functionName : Cleaned up artifacts related to UTC setup." ` -Logfile $logFile } finally { if ((Get-Service $MiscConstants.ObsServiceDetails.DiagTrack.Name).Status -eq "Stopped") { Write-Log ` -Message "$functionName : Starting $($MiscConstants.ObsServiceDetails.DiagTrack.Name) service after it was stopped." ` -LogFile $LogFile Start-Service ` -Name $MiscConstants.ObsServiceDetails.DiagTrack.Name ` -ErrorAction SilentlyContinue ` -Verbose:$false ` | Out-Null } } } #endregion UTC setup functions #region VCRuntime setup function function Install-VCRuntime { [CmdletBinding()] Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $Logfile <# Validate if there is an already installed version of VCRedist package and if yes, whether it is higher than the one we are installing. If higher, then skip installation. #> foreach ($regKeyPath in $MiscConstants.VCRedistRegKeys.Paths) { $installedVCRedistVersion = Test-RegKeyExists -Path $regKeyPath -Name $MiscConstants.VCRedistRegKeys.Name -GetValueIfExists -LogFile $Logfile if ($null -ne $installedVCRedistVersion) { $installedVCRedistVersion = $installedVCRedistVersion.Replace('v', '') # For e.g. If the version value comes to be "v14.32.31332.00" and to compare it with the file version we need to remove the character 'v'. Write-Log "[$functionName] VCRedist is already installed with version: $installedVCRedistVersion." -LogFile $Logfile break } } $vcRedistFilePath = Join-Path -Path (Get-VCRuntimePackageContentPath) -ChildPath $MiscConstants.VCRuntimeExeName $currentVCRedistFileVersion = (Get-Item $vcRedistFilePath).VersionInfo.FileVersion Write-Log "[$functionName] Current VCRedist file ($vcRedistFilePath) version is $currentVCRedistFileVersion." -LogFile $Logfile if ($null -eq $installedVCRedistVersion -or $installedVCRedistVersion -lt $currentVCRedistFileVersion) { $vcRedistInstallationLogFile = Join-Path $(Get-LogFolderPath) -ChildPath $MiscConstants.VCRedistInstallationLogFileName Write-Log "[$functionName] Either the VCRedist is not installed or the installed version is less than current version. Thus, installing VCRedist using following command - $vcRedistFilePath /install /quiet /norestart /log $vcRedistInstallationLogFile" -LogFile $LogFile $vcInstall = Start-Process -File $vcRedistFilePath -ArgumentList "/install /quiet /norestart /log $vcRedistInstallationLogFile" -Wait -NoNewWindow -PassThru <# Exit codes descriptions (https://learn.microsoft.com/en-us/windows/win32/msi/error-codes): 0 = Install succeeded. 3010 = A restart is required to complete the install (Machine reboot is pending). #> ## Update the error message with Exit code so that it can be visible on the Portal. $ErrorConstants.VCRedistInstallFailed.Message = $ErrorConstants.VCRedistInstallFailed.Message -f $vcInstall.ExitCode if ($vcInstall.ExitCode -ne 0 -and $vcInstall.ExitCode -ne 3010) { Write-Log ` -Message "[$functionName] $($ErrorConstants.VCRedistInstallFailed.Message)" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $ErrorConstants.VCRedistInstallFailed.Name } Write-Log "[$functionName] VC Runtime $vcRedistFilePath successfully installed." -LogFile $LogFile } else { Write-Log "[$functionName] VCRedist is already installed with version $installedVCRedistVersion which is either equal or higher than current vcredist file version of $currentVCRedistFileVersion. Thus, skipping the installation." -LogFile $Logfile } Write-Log "[$functionName] Exiting." -LogFile $Logfile } #endregion VCRuntime setup function #region Registry functions function New-RegKey { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $Path, [Parameter(Mandatory = $false)] [System.String] $Name, [Parameter(Mandatory = $false)] [System.String] $PropertyType, [Parameter(Mandatory = $false)] [System.String] $Value, [Parameter(Mandatory = $false)] [System.String] $LogFile, [Parameter(Mandatory=$false)] [System.Management.Automation.SwitchParameter] $CreatePathOnly ) $functionName = $MyInvocation.MyCommand.Name if ($CreatePathOnly) { if (-not (Test-Path -Path $Path)) { New-Item ` -Path $Path ` -Force ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Created RegKey path ($Path)." ` -LogFile $LogFile } else { Write-Log ` -Message "$functionName : RegKey path ($Path) exists already." ` -LogFile $LogFile } } else { if (-not (Test-RegKeyExists -Path $Path -Name $Name -LogFile $LogFile)) { New-ItemProperty ` -Path $Path ` -Name $Name ` -PropertyType $PropertyType ` -Value $Value ` -Force ` | Out-Null Write-Log ` -Message "$functionName : Created registry key with path ($Path), name ($Name) and value ($Value)." ` -LogFile $LogFile } else { Write-Log ` -Message "$functionName : RegKey path ($Path) and name ($Name) exists already." ` -LogFile $LogFile } } } Function Remove-RegKey { [CmdletBinding()] Param ( [Parameter(Mandatory = $True)] [System.String] $Path, [Parameter(Mandatory = $False)] [System.String] $Name, [Parameter(Mandatory = $False)] [System.String] $LogFile, [Parameter(Mandatory=$False)] [System.Management.Automation.SwitchParameter] $RemovePathOnly ) $functionName = $MyInvocation.MyCommand.Name if ($RemovePathOnly) { if (Test-Path -Path $Path) { Remove-Item ` -Path $Path ` -Force ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Path ($Path) removed successfully." ` -LogFile $LogFile } else { Write-Log ` -Message "$functionName : Path ($Path) does not exists. Nothing to remove" ` -LogFile $LogFile } } else { if (Test-RegKeyExists -Path $Path -Name $Name -LogFile $LogFile) { Remove-ItemProperty ` -Path $Path ` -Name $Name ` -Force ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : RegKey path ($Path) and name ($Name) removed successfully." ` -LogFile $LogFile } else { Write-Log ` -Message "$functionName : RegKey path ($Path) and name ($Name) does not exists. Nothing to remove" ` -LogFile $LogFile } } } #endregion Registry functions #region Scheduled task functions function Enable-ObsScheduledTask { [CmdletBinding()] param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Enabling ObsScheduledTask ($($MiscConstants.ObsScheduledTaskDetails.TaskName))." ` -LogFile $LogFile $taskObject = Get-ScheduledTask ` -TaskPath $MiscConstants.ObsScheduledTaskDetails.TaskPath ` -TaskName $MiscConstants.ObsScheduledTaskDetails.TaskName ` -ErrorAction $MiscConstants.ErrorActionPreference.SilentlyContinue if ($null -eq $taskObject) { Write-Log ` -Message "$functionName : No scheduled task with name ($($MiscConstants.ObsScheduledTaskDetails.TaskName)) was found to enable." ` -LogFile $LogFile } else { Enable-ScheduledTask ` -InputObject $taskObject ` -ErrorAction $MiscConstants.ErrorActionPreference.Stop ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Successfully enabled obs scheduled task with name $($taskObject.TaskName) at path $($taskObject.TaskPath)." ` -LogFile $LogFile } } function Disable-ObsScheduledTask { [CmdletBinding()] Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Disabling ObsScheduledTask ($($MiscConstants.ObsScheduledTaskDetails.TaskName))." ` -LogFile $LogFile $taskObject = Get-ScheduledTask ` -TaskPath $MiscConstants.ObsScheduledTaskDetails.TaskPath ` -TaskName $MiscConstants.ObsScheduledTaskDetails.TaskName ` -ErrorAction $MiscConstants.ErrorActionPreference.SilentlyContinue if ($null -eq $taskObject) { Write-Log ` -Message "$functionName : No scheduled task with name $($MiscConstants.ObsScheduledTaskDetails.TaskName) was found to disable." ` -LogFile $LogFile } else { Disable-ScheduledTask ` -InputObject $taskObject ` -ErrorAction $MiscConstants.ErrorActionPreference.Stop ` -Verbose:$false ` | Out-Null Write-Log ` -Message "$functionName : Successfully disabled obs scheduled task with name $($taskObject.TaskName) at path $($taskObject.TaskPath)." ` -LogFile $LogFile } } function Remove-ObsScheduledTask { param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name $trimmedTaskPath = $MiscConstants.ObsScheduledTaskDetails.TaskPath.TrimEnd('\') $tasks = Get-ScheduledTask -TaskPath "$trimmedTaskPath\*" -ErrorAction $MiscConstants.ErrorActionPreference.SilentlyContinue if ($tasks) { foreach($task in $tasks) { if($task.TaskName -eq $MiscConstants.ObsScheduledTaskDetails.TaskName) { Unregister-ScheduledTask -TaskName $task.TaskName -TaskPath $task.TaskPath -Confirm:$false | Out-Null Write-Log ` -Message "$functionName : Successfully removed scheduled task $($task.TaskName) from path $($task.TaskPath)." ` -LogFile $LogFile } } } else { Write-Log ` -Message "$functionName : Either the path '$trimmedTaskPath' doesn`'t exists or no scheduled tasks found to delete." ` -LogFile $LogFile } } #endregion Scheduled task functions #region Windows service functions function Register-ServiceForObservability { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [System.String] $ServiceDisplayName, [Parameter(Mandatory = $true)] [System.String] $ServiceBinaryFilePath, [Parameter(Mandatory = $false)] [System.String] $ServiceStartupType = 'Manual', [Parameter(Mandatory = $false)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name try { Write-Log ` -Message "$functionName : Starting registration of service '$ServiceName'." ` -LogFile $logFile Write-Log ` -Message "$functionName : Configuring service '$ServiceName' from path '$ServiceBinaryFilePath'" ` -LogFile $LogFile if (Get-Service $ServiceName -ErrorAction SilentlyContinue) { Write-Log ` -Message "$functionName : Service '$ServiceName' already registered." ` -LogFile $LogFile } else { New-Service ` -Name $ServiceName ` -BinaryPathName $ServiceBinaryFilePath ` -DisplayName $ServiceDisplayName ` -StartupType $ServiceStartupType ` -ErrorAction Stop ` -Verbose:$false ` | Out-Null } Write-Log ` -Message "$functionName : Registration of service '$ServiceName' with display name '$ServiceDisplayName' completed." ` -LogFile $logFile } catch { Write-Log ` -Message "$functionName : $($ErrorConstants.CannotRegisterService.Message) Service Name: '$ServiceName'. Exception: $_" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $ErrorConstants.CannotRegisterService.Name } } function Start-ServiceForObservability { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $ServiceName, [Parameter(Mandatory = $false)] [System.String] $LogFile, [Parameter(Mandatory = $false)] [int] $Retries = $MiscConstants.Retries ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Starting service '$ServiceName'." ` -LogFile $logFile # Start MA Watchdog Agent Service $retryCount = $Retries $serviceStatus = (Get-Service $ServiceName).Status if ($serviceStatus -eq "Running") { Write-Log ` -Message "$functionName : Service '$ServiceName' running already." ` -LogFile $LogFile return } while(($serviceStatus -ne "Running") -and ($retryCount -gt 0)) { Start-Service $ServiceName ` -WarningAction SilentlyContinue ` -WarningVariable $startSvcWarn if ($null -ne $startSvcWarn) { Write-Log ` -Message "$functionName : $startSvcWarn" ` -Level $MiscConstants.Level.Warning ` -LogFile $LogFile } Write-Log ` -Message "$functionName : Waiting for service '$ServiceName' to start..." ` -LogFile $LogFile Start-Sleep -Seconds 5 $serviceStatus = (Get-Service $ServiceName).Status $retryCount-- } if ($serviceStatus -ne "Running") { Write-Log ` -Message "$functionName : $($ErrorConstants.CannotStartService.Message) Service Name: '$ServiceName'" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $ErrorConstants.CannotStartService.Name } Write-Log ` -Message "$functionName : Successfully started service '$ServiceName'." ` -LogFile $LogFile } function Stop-ServiceForObservability { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.String] $ServiceName, [Parameter(Mandatory = $false)] [System.String] $LogFile, [Parameter(Mandatory = $false)] [int] $Retries = $MiscConstants.Retries ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Stopping service '$ServiceName'." ` -LogFile $logFile # Stop MA Watchdog Agent Service $retryCount = $Retries $serviceStatus = (Get-Service $ServiceName).Status if ($serviceStatus -eq "Stopped") { Write-Log ` -Message "$functionName : Service '$ServiceName' stopped already." ` -LogFile $LogFile return } while (($serviceStatus -ne "Stopped") -and ($retryCount -gt 0)) { Stop-Service $ServiceName ` -WarningAction SilentlyContinue ` -WarningVariable $stopSvcWarn if ($null -ne $stopSvcWarn) { Write-Log ` -Message "$functionName : $stopSvcWarn" ` -Level $MiscConstants.Level.Warning ` -LogFile $LogFile } Write-Log ` -Message "$functionName : Waiting for service '$ServiceName' to stop..." ` -LogFile $LogFile Start-Sleep -Seconds 5 $serviceStatus = (Get-Service $ServiceName).Status $retryCount-- } if ($serviceStatus -ne "Stopped") { Write-Log ` -Message "$functionName : $($ErrorConstants.CannotStopService.Message) Service Name: '$ServiceName'" ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw $ErrorConstants.CannotStopService.Name } Write-Log ` -Message "$functionName : Successfully stopped service '$ServiceName'." ` -LogFile $LogFile } Function Unregister-ServiceForObservability { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [System.String] $ServiceName, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "$functionName : Unregistering service '$ServiceName'." ` -LogFile $LogFile if (Get-Service $ServiceName -ErrorAction SilentlyContinue) { Stop-ServiceForObservability -ServiceName $ServiceName -LogFile $LogFile } Write-Log ` -Message "$functionName : $(sc.exe delete $ServiceName -Verbose)" ` -LogFile $LogFile Write-Log ` -Message "$functionName : Successfully unregistered service '$ServiceName'." ` -LogFile $LogFile } #endregion #region Diag functions Function Confirm-IsDeviceTypeValid { ## Internal function not to export. [CmdletBinding()] Param ( [Parameter(Mandatory = $True)] [System.String] $DeviceType, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name if ($DeviceType -in $MiscConstants.DeviceTypes.Values) { Write-Log ` -Message "$functionName : Confirmed deviceType '$DeviceType' is valid." ` -LogFile $LogFile } else { throw $ErrorConstants.InvalidDeviceTypeValue.Name } } Function Set-DeviceType { [CmdletBinding()] Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name $deviceTypeFromRegKey = $null $deviceTypeFromPublicSettings = $null ## Check for device type value from registry key $deviceTypeFromRegKey = Test-RegKeyExists ` -Path $MiscConstants.DeviceTypeRegKey.Path ` -Name $MiscConstants.DeviceTypeRegKey.Name ` -LogFile $LogFile ` -GetValueIfExists $publicSettings = Get-HandlerConfigSettings -LogFile $LogFile ## Check if deviceType value exists in Config settings. if ($null -ne $publicSettings -and (Confirm-IsStringNotEmpty $publicSettings.deviceType)) { $deviceTypeFromPublicSettings = $publicSettings.deviceType } ## Case 1: Value NOT present either in public settings or in reg key. if ([System.String]::IsNullOrEmpty($deviceTypeFromPublicSettings) -and ` [System.String]::IsNullOrEmpty($deviceTypeFromRegKey)) { throw $ErrorConstants.DeviceTypeValueNotFound.Name } ## Case 2: Value present in public settings and not in reg key. elseif (-not ([System.String]::IsNullOrEmpty($deviceTypeFromPublicSettings)) -and ` [System.String]::IsNullOrEmpty($deviceTypeFromRegKey)) { $global:DeviceType = $deviceTypeFromPublicSettings New-RegKey ` -Path $MiscConstants.DeviceTypeRegKey.Path ` -LogFile $LogFile ` -CreatePathOnly New-RegKey ` -Path $MiscConstants.DeviceTypeRegKey.Path ` -Name $MiscConstants.DeviceTypeRegKey.Name ` -PropertyType $MiscConstants.DeviceTypeRegKey.PropertyType ` -Value $global:DeviceType ` -LogFile $logFile Write-Log ` -Message "$functionName : Using deviceType value from public settings = $global:DeviceType" ` -LogFile $LogFile } ## Case 3: Value present in reg key and not in public settings. elseif (-not ([System.String]::IsNullOrEmpty($deviceTypeFromRegKey)) -and ` [System.String]::IsNullOrEmpty($deviceTypeFromPublicSettings)) { $global:DeviceType = $deviceTypeFromRegKey Write-Log ` -Message "$functionName : Using deviceType value from registry key = $global:DeviceType" ` -LogFile $LogFile } ## Case 4: Value present in both (i.e. public settings and registry key). else { ## Case 4.1: If value is same, use any. if ($deviceTypeFromRegKey -ieq $deviceTypeFromPublicSettings) { $global:DeviceType = $deviceTypeFromRegKey Write-Log ` -Message "$functionName : Device type value from registry key is same as public settings = $global:DeviceType" ` -LogFile $LogFile } else { ## Case 4.2: If both values are different, than there are three more cases. if ( ## Case 4.2.1: If settings has HCI and reg key has EnvValidatorStandAlone, then HCI will be used. ( $deviceTypeFromPublicSettings -ieq $MiscConstants.DeviceTypes.HCI -and ` $deviceTypeFromRegKey -ieq $MiscConstants.DeviceTypes.EnvValidatorStandAlone ) -or ` ## Case 4.2.2: If settigs has AzureEdge and reg key has either HCI or EnvValidatorStandAlone, then AzureEdge will be used. ( $deviceTypeFromPublicSettings -ieq $MiscConstants.DeviceTypes.AzureEdge -and ` ( $deviceTypeFromRegKey -ieq $MiscConstants.DeviceTypes.HCI -or ` $deviceTypeFromRegKey -ieq $MiscConstants.DeviceTypes.EnvValidatorStandAlone ) ) ) { $global:DeviceType = $deviceTypeFromPublicSettings Write-Log ` -Message "$functionName : Device type value from public settings '$($global:DeviceType)' is selected over registry key '$deviceTypeFromRegKey'." ` -LogFile $LogFile } else { ## Case 4.2.3: If not above two, then reg key value will be used over settings. $global:DeviceType = $deviceTypeFromRegKey Write-Log ` -Message "$functionName : Device type value from registry key '$($global:DeviceType)' is selected over public settings '$deviceTypeFromPublicSettings'." ` -LogFile $LogFile } } } Confirm-IsDeviceTypeValid ` -DeviceType $global:DeviceType ` -LogFile $LogFile } #endregion Diag functions #region Telemetry functions Function Confirm-IsTelemetryEnabled { <# Turn off telemetry by default for EnvValidatorStandAlone, we do not know whether user has consented for Telemetry or not and until we have a way to get consent value for EnvValidatorStandAlone, disable telemetry by default. #> if ($global:DeviceType -eq $MiscConstants.DeviceTypes.EnvValidatorStandAlone) { return $false } ## Default return $true } #endregion Telemetry functions #region logman Function Initialize-LogmanTraceSession { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "[$functionName] Entering." ` -LogFile $LogFile $logmanCreateResult = $null if (Get-Command logman -ErrorAction SilentlyContinue) { $sessionsExistsResult = logman query $MiscConstants.Logman.TraceName if ($sessionsExistsResult[1] -eq "Error:" -and $sessionsExistsResult[2] -eq "Data Collector Set was not found.") { <# Reference: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/logman-create-trace --v: This flag removes the versioning added by default in the etl files. The version is removed because we need only one file to be present. -ow: This flag overwrites the existing file, when the current session is stopped and a new one is started.There is another -a (i.e. append) flag but after adding that, it fails to start the session and so for time being we are using this flag. As we don't expect the customers to be disabling the mandatory extensions oftenly. #> $logmanCreateResult += logman create trace $MiscConstants.Logman.TraceName -f bincirc -o $MiscConstants.Logman.OutputFilePath -max $MiscConstants.Logman.MaxLogFileSizeInMB --v -ow foreach ($guid in $MiscConstants.Logman.ComponentProviderGuids.Values) { $logmanCreateResult += logman update trace $MiscConstants.Logman.TraceName -p "{$guid}" } Write-Log ` -Message "[$functionName] Successfully created logman trace session for Obs components with Output file path of $($MiscConstants.Logman.OutputFilePath) and max log file size of $($MiscConstants.Logman.MaxLogFileSizeInMB) MB. Results = $($logmanCreateResult | Out-String)" ` -LogFile $LogFile } else { Write-Log ` -Message "[$functionName] Logman trace session for Obs components exists already. Result = $($sessionsExistsResult | Out-String)" ` -LogFile $LogFile } } else { Write-Log ` -Message "[$functionName] Logman command is not available in the OS." ` -LogFile $LogFile } Write-Log ` -Message "[$functionName] Exiting." ` -LogFile $LogFile } Function Start-LogmanTraceSession { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "[$functionName] Entering." ` -LogFile $LogFile if (Get-Command logman -ErrorAction SilentlyContinue) { if (-not $(Get-EtwTraceSession $MiscConstants.Logman.TraceName -ErrorAction SilentlyContinue)) { $logmanStartResult = logman start $MiscConstants.Logman.TraceName Write-Log ` -Message "[$functionName] Successfully started logman trace session for Obs components. Result = $($logmanStartResult | Out-String)" ` -LogFile $LogFile $logmanQueryResult = logman query $MiscConstants.Logman.TraceName Write-Log ` -Message "[$functionName] Logman query result = $($logmanQueryResult | Out-String)" ` -LogFile $LogFile } else { Write-Log ` -Message "[$functionName] Logman trace session for Obs components is running already." ` -LogFile $LogFile } } else { Write-Log ` -Message "[$functionName] Logman command is not available in the OS." ` -LogFile $LogFile } Write-Log ` -Message "[$functionName] Exiting." ` -LogFile $LogFile } Function Stop-LogmanTraceSession { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "[$functionName] Entering." ` -LogFile $LogFile if (Get-Command logman -ErrorAction SilentlyContinue) { if (Get-EtwTraceSession $MiscConstants.Logman.TraceName -ErrorAction SilentlyContinue) { $logmanStopResult = logman stop $MiscConstants.Logman.TraceName Write-Log ` -Message "[$functionName] Logman trace session for Obs components stopped successfully. Result = $($logmanStopResult | Out-String)" ` -LogFile $LogFile $logmanQueryResult = logman query $MiscConstants.Logman.TraceName Write-Log ` -Message "[$functionName] Logman query result = $($logmanQueryResult | Out-String)" ` -LogFile $LogFile } else { Write-Log ` -Message "[$functionName] Logman trace session for Obs components is stopped already." ` -LogFile $LogFile } } else { Write-Log ` -Message "[$functionName] Logman command is not available in the OS." ` -LogFile $LogFile } Write-Log ` -Message "[$functionName] Exiting." ` -LogFile $LogFile } Function Remove-LogmanTraceSession { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log ` -Message "[$functionName] Entering." ` -LogFile $LogFile if (Get-Command logman -ErrorAction SilentlyContinue) { $sessionsExistsResult = logman query $MiscConstants.Logman.TraceName <# Checking the length because if the session exists, it will give an output in array format (as shown below), so we just save it in a variable and count the length of the result. If the session is present it will have this below output. ``` PS C:\sapanc00\FDA\Microsoft.FleetDiagnosticsAgent.Core.2.4.20230613.720> logman query sapancTest Name: sapancTest Status: Stopped Root Path: C:\ Segment: Off Schedules: On Segment Max Size: 100 MB Run as: SYSTEM Name: sapancTest\sapancTest Type: Trace Append: Off Circular: On Overwrite: On Buffer Size: 8 Buffers Lost: 0 Buffers Written: 0 Buffer Flush Timer: 0 Clock Type: Performance File Mode: File The command completed successfully. ``` But if the session is not present, then output should be as below, where the length of array is just 3. ``` PS C:\sapanc00\FDA\Microsoft.FleetDiagnosticsAgent.Core.2.4.20230613.720> logman query sapancTest Error: Data Collector Set was not found. ``` #> if ($sessionsExistsResult.Length -gt 10) { $logmanDeleteResult = logman delete $MiscConstants.Logman.TraceName Write-Log ` -Message "[$functionName] Successfully deleted logman trace session for Obs components. Result = $($logmanDeleteResult | Out-String)" ` -LogFile $LogFile } else { Write-Log ` -Message "[$functionName] Logman trace session for Obs components does not exist. SessionExistsResult = $($sessionsExistsResult | Out-String)" ` -LogFile $LogFile } } else { Write-Log ` -Message "[$functionName] Logman command is not available in the OS." ` -LogFile $LogFile } Write-Log ` -Message "[$functionName] Exiting." ` -LogFile $LogFile } #endregion logman #region Observability Symlinks function Add-ObservabilitySymLinks { Param ( [Parameter(Mandatory = $False)] [System.String] $LogFile, [Parameter(Mandatory = $False)] [System.Management.Automation.SwitchParameter] $TestObsOnly ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile if ($TestObsOnly) { $symLinks = $global:SymLinkPaths.GetEnumerator() | Where-Object {$_.Name -ieq "TestObservability"} } else { $symLinks = $global:SymLinkPaths.GetEnumerator() } $symLinks | ForEach-Object { $symLinkPath = $_.Value.SymLink $destination = $_.Value.Destination if (-not (Test-Path $symLinkPath)) { if (-not (Test-PathIsSymLink -Path $symLinkPath -LogFile $LogFile)) { Write-Log "[$functionName] Adding symlink $symLinkPath to path $destination." -LogFile $LogFile Write-Log "[$functionName] $(cmd /c mklink /d "$symLinkPath" "$destination")" -LogFile $LogFile } else { Write-Log "[$functionName] Symlink $symLinkPath to path $destination already exists." -LogFile $LogFile } } else { Write-Log "[$functionName] Actual folder path to the symlinkPath ($symLinkPath) already exists." -LogFile $LogFile } } Write-Log "[$functionName] Exiting." -LogFile $LogFile } function Remove-ObservabilitySymLinks { Param ( [Parameter(Mandatory = $false)] [int] $Retries = $MiscConstants.Retries, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile $retryCount = $Retries $success = $false $sleepSeconds = 10 while ($retryCount -gt 0 -and -not $success) { try { $global:SymLinkPaths.GetEnumerator() | ForEach-Object { $symLinkPath = $_.Value.SymLink $destination = $_.Value.Destination if (Test-PathIsSymLink -Path $symLinkPath -LogFile $logFile) { Write-Log "[$functionName] Removing symlink $symLinkPath to path $destination." -LogFile $LogFile Write-Log "[$functionName] $(cmd /c rmdir "$symLinkPath")" -LogFile $LogFile } } $success = $true foreach ($component in $global:SymLinkPaths.GetEnumerator()) { $symLinkPath = $component.Value.SymLink $destination = $component.Value.Destination if (Test-PathIsSymLink -Path $symLinkPath -LogFile $logFile) { Write-Log ` -Message "[$functionName] Failed to remove symlink $symLinkPath." ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error $success = $false } } if (-not $success) { Write-Log ` -Message "[$functionName] Retrying after $sleepSeconds seconds." ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error Start-Sleep -Seconds $sleepSeconds } } catch { Write-Log ` -Message "[$functionName] Removing symlinks failed with error $_. Retrying after $sleepSeconds seconds." ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error Start-Sleep -Seconds 10 } $retryCount-- } if ($retryCount -eq 0 -and -not $success) { $errMsg = "[$functionName] Failed to remove symlinks." Write-Log ` -Message $errMsg ` -LogFile $LogFile ` -Level $MiscConstants.Level.Error throw errMsg } Write-Log "[$functionName] Exiting." -LogFile $LogFile } function Test-PathIsSymLink { Param ( [Parameter(Mandatory = $True)] [System.String] $Path, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name if (Test-Path $Path) { if ((Get-Item $Path -ErrorAction SilentlyContinue).LinkType -eq "SymbolicLink") { Write-Log ` -Message "[$functionName] Path $Path is a SymLink." ` -LogFile $LogFile return $True } } Write-Log ` -Message "[$functionName] Path $Path is not a SymLink." ` -LogFile $LogFile return $False } #endregion Observability Symlinks #region Identity Parameters from runtime settings function Get-IdenityParametersFromPublicSettings { Param ( [Parameter(Mandatory = $False)] [System.Object] $IdentityParamsToFetch, [Parameter(Mandatory = $False)] [System.String] $LogFile ) $functionName = $MyInvocation.MyCommand.Name Write-Log "[$functionName] Entering." -LogFile $LogFile $retrievedIdParams = @{} ## Check if any cloud value is passed through Config settings, if yes than use that $publicSettings = Get-HandlerConfigSettings -LogFile $LogFile foreach ($idParam in $IdentityParamsToFetch.Values) { ## Check if any identity value is passed through Config settings, if yes than use that if (Confirm-IsStringNotEmpty $publicSettings.$idParam) { Write-Log "[$functionName] $idParam value from publicSetting = $($publicSettings.$idParam)." -LogFile $LogFile $retrievedIdParams[$idParam] = $publicSettings.$idParam } else { Write-Log "[$functionName] $idParam not found in public settings." -LogFile $LogFile $retrievedIdParams[$idParam] = [System.String]::Empty } } Write-Log "[$functionName] Exiting. $($retrievedIdParams | Out-String)." -LogFile $LogFile return $retrievedIdParams } #endregion Identity Parameters from runtime settings #endregion Functions #region Exports Export-ModuleMember -Function Get-GmaPackageContentPath # Pre-installation validation functions Export-ModuleMember -Function Invoke-PreInstallationValidation ## GCS functions Export-ModuleMember -Function Get-CloudName Export-ModuleMember -Function Get-GcsEnvironmentName Export-ModuleMember -Function Get-GcsRegionName Export-ModuleMember -Function Wait-ForGcsConfigSync ## Handler/Extension functions Export-ModuleMember -Function Get-ConfigSequenceNumber Export-ModuleMember -Function Get-HandlerConfigSettings Export-ModuleMember -Function Get-HandlerEnvInfo Export-ModuleMember -Function Get-HandlerHeartBeatFile Export-ModuleMember -Function Get-HandlerLogFile Export-ModuleMember -Function Get-LogFolderPath Export-ModuleMember -Function Get-StatusFolderPath Export-ModuleMember -Function Get-StatusFilePath ## Misc functions Export-ModuleMember -Function Get-CacheDirectories Export-ModuleMember -Function New-CacheDirectories Export-ModuleMember -Function New-Directory Export-ModuleMember -Function Get-FDAPackageContentPath Export-ModuleMember -Function Get-ObservabilityDeploymentPackagePath Export-ModuleMember -Function Get-UtcExporterPackageContentPath Export-ModuleMember -Function Get-VCRuntimePackageContentPath Export-ModuleMember -Function Get-WatchdogPackageContentPath Export-ModuleMember -Function Get-WatchdogStatusFile Export-ModuleMember -Function Set-Status Export-ModuleMember -Function Set-StandaloneScenarioRegistry Export-ModuleMember -Function Get-IsArcAEnvironment Export-ModuleMember -Function Get-Sha256Hash ## UTC setup functions Export-ModuleMember -Function Initialize-UTCSetup Export-ModuleMember -Function Clear-UTCSetup ## Registry functions Export-ModuleMember -Function New-RegKey Export-ModuleMember -Function Remove-RegKey # VCRuntime setup function Export-ModuleMember -Function Install-VCRuntime ## Scheduled task functions Export-ModuleMember -Function Enable-ObsScheduledTask Export-ModuleMember -Function Disable-ObsScheduledTask Export-ModuleMember -Function Remove-ObsScheduledTask ## Windows service functions Export-ModuleMember -Function Register-ServiceForObservability Export-ModuleMember -Function Start-ServiceForObservability Export-ModuleMember -Function Stop-ServiceForObservability Export-ModuleMember -Function Unregister-ServiceForObservability ## Diag functions Export-ModuleMember -Function Set-DeviceType ## Telemetry functions Export-ModuleMember -Function Confirm-IsTelemetryEnabled ## logman functions Export-ModuleMember -Function Initialize-LogmanTraceSession Export-ModuleMember -Function Start-LogmanTraceSession Export-ModuleMember -Function Stop-LogmanTraceSession Export-ModuleMember -Function Remove-LogmanTraceSession # DiagnosticsInitializer Symlink functions Export-ModuleMember -Function Add-ObservabilitySymLinks Export-ModuleMember -Function Remove-ObservabilitySymLinks Export-ModuleMEmber -Function Test-PathIsSymLink ## Identity Parameters from runtime settings Export-ModuleMember -Function Get-IdenityParametersFromPublicSettings #endregion Exports # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCR2eBqS3kFODTB # h/gXpn+QdTR2kdYzcdZYriCLDRzPMKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDeaOVJpUEjNcVLoQIgCj2Qj # 1FjD1XQVy1OvJSXhBlMwMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAetmKQYXC+0VvAwpBRRzctmK0fKi66e7zjkGC3Md5vXyu6PUmoDtHbYpy # b++MJeNDZS9pI2RAot7+Rjgod9hvpRasjNjGKVEcfSLZIyeNW1R/I2RESOfv0p0E # jfzDpqtF+Zl6hAZ3aSDWvjloembCopbrouhwkZUSHjn7lzSWho9lRLnZ/gpvbx6C # 9ww6s1bFtdbxUGP0L9kOZLWtxVlayGTWci5M/YOX2nOary0T/RnAYLPMs4LeSqrS # QXLWaGH5w2BulBj0GUERX0ZykMWhtcOAJix/OtLez07eo+te70Lc/dN89rscv0t9 # eeI3UMmZbDpaoFdZ0JzGn6Kwcamp+KGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAloC5SqTFnckwozmAmQAN8rsK2EMKH5h9EujSzMTCv7AIGZbqeumI9 # GBMyMDI0MDIxMjE0MDgzMS42NzhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK # AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI # N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB # v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt # mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgjDJ+P+JlczGH9hEPHe+18N4v125y6BXMx3NW6FVItf4wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l # 63UJMA0GCSqGSIb3DQEBCwUABIICAFO8qcl3iUnJsskIc8QSJKRMiN/E1N7mx9z/ # 8oCQRSI/apgvhUn+cKxmRRmQ4UV1Ea2G2Jm+Bz7vSvRF6tRF3Uz/5HP2yDvjM915 # ZV4NaY2IvxSff1Lj+lDDPJaMKyt5nwlsH3JLT+DyECFtT46B8n4qTdn8IYEJZukk # enMgprm+i4hUnKmZoEnx0XWr7BeZ1NTs7YW9+cmX1VDhAO6WjTPCbfd/9jzU2h3W # g+D/2fYyj+LR7pq8cfMHkBgYqDe4bkg0DepXLS/w5emngaE2jg7pgX9X02K5/qL/ # Mg+N/hQzrOl40DkvaQAuCTEFZ9Deh0NPtDJOI4qFqv+jMSF5FW7eFBGXbzdHhZOg # GY0GVRXXdXCdcBYUauC7yC5oSvoI3TG9slj8xBIwc+NREEK9EGmrDwSUzOy+Tb1e # 0WXM99W8D1qxZDiuw/shdWRiROeVj7twtDJFTcaWJKmKMYG74n0LNqaWXErnw2cu # tdIoR3t8t/u4BNmItOKQ1z9PetQMmoNLqK4oHPucX17a9VJmU3rTMpW7YP5vzKTE # e5Z5J3QStZqsbJUxCGrK+Sl9vlwX00V+UheU4e8H5xwk+z9yrLpu99VWwKWUbxgr # IRjL+vxlyggR5uOx9NhqpwHpjmkfVNzhiPgoyoyaas6gWfIdVwttpaKip8wlLBZp # mJEEWx6K # SIG # End signature block
combined_dataset/train/non-malicious/2642.ps1
2642.ps1
param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerList, [Parameter(Mandatory=$false)] [string] $OutputPath=([Environment]::GetFolderPath("MyDocuments"))) if((Test-Path $OutputPath) -eq $false) { throw "Invalid -OutputPath, please use a valid file path" } if(Test-Path $ServerList){ $output=@() $machines=Get-Content $ServerList $filename=(Join-Path -Path $OutputPath -ChildPath("Environement_IP_List_"+(Get-Date -Format yyyyMMddHHmm)+".csv")) foreach($machine in $machines){ $return=New-Object System.Object if(Test-Connection $machine -Quiet -Count 1){ $ip = (Test-Connection $machine -count 1).IPV4Address.ToString() } else{ $ip = "Machine not available" } $return | Add-Member -type NoteProperty -Name "Host" -Value $machine $return | Add-Member -type NoteProperty -Name "IP" -Value $ip $output+=$return } $output | Export-CSV -Path $filename -NoTypeInformation } else{ throw "Invalid -ServerList, please use a valid file path" }
combined_dataset/train/non-malicious/sample_34_64.ps1
sample_34_64.ps1
# # Module manifest for module 'OCI.PSModules.Queue' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Queue.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c5d60ce-a44b-46ce-97f7-351848bec841' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Queue Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Queue.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIQueue', 'Get-OCIQueueChannelsList', 'Get-OCIQueueMessages', 'Get-OCIQueuesList', 'Get-OCIQueueStats', 'Get-OCIQueueWorkRequest', 'Get-OCIQueueWorkRequestErrorsList', 'Get-OCIQueueWorkRequestLogsList', 'Get-OCIQueueWorkRequestsList', 'Invoke-OCIQueuePurgeQueue', 'Move-OCIQueueCompartment', 'New-OCIQueue', 'Remove-OCIQueue', 'Remove-OCIQueueMessage', 'Remove-OCIQueueMessages', 'Update-OCIQueue', 'Update-OCIQueueMessage', 'Update-OCIQueueMessages', 'Write-OCIQueueMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Queue' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1571.ps1
1571.ps1
function Get-MrAutoService { [CmdletBinding()] param ( [Parameter(Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [string[]]$ComputerName, [System.Management.Automation.Credential()]$Credential = [System.Management.Automation.PSCredential]::Empty ) BEGIN { $Params = @{} If ($PSBoundParameters['Credential']) { $Params.Credential = $Credential } } PROCESS { $Params.ComputerName = $ComputerName Invoke-Command @Params { $Services = Get-WmiObject -Class Win32_Service -Filter { StartMode = 'Auto' } -Property Name | Select-Object -ExpandProperty Name foreach ($Service in $Services) { Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\$Service" | Where-Object {$_.Start -eq 2 -and $_.DelayedAutoStart -ne 1} | Select-Object -Property @{label='ServiceName';expression={$_.PSChildName}} | Get-Service } } } }
combined_dataset/train/non-malicious/sample_37_44.ps1
sample_37_44.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for EventNameFilter. .Description Create an in-memory object for EventNameFilter. .Outputs Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.Api20220801Preview.EventNameFilter #> function New-AzWebPubSubEventNameFilterObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.Api20220801Preview.EventNameFilter')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Gets or sets a list of system events. Supported events: `"connected`" and `"disconnected`". Blocking event `"connect`" is not supported because it requires a response.")] [string[]] $SystemEvent, [Parameter(HelpMessage="Gets or sets a matching pattern for event names. There are 3 kinds of patterns supported: 1. `"*`", it matches any event name 2. Combine multiple events with `",`", for example `"event1,event2`", it matches events `"event1`" and `"event2`" 3. A single event name, for example, `"event1`", it matches `"event1`".")] [string] $UserEventPattern ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.Api20220801Preview.EventNameFilter]::New() if ($PSBoundParameters.ContainsKey('SystemEvent')) { $Object.SystemEvent = $SystemEvent } if ($PSBoundParameters.ContainsKey('UserEventPattern')) { $Object.UserEventPattern = $UserEventPattern } return $Object } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAilWEBqGsRJGUM # p9QaslEw8W9TRPc2f/E2iBGhyBGe/6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ4wzh+lDK707IjeQe4PBd5N # cvtE/T8ZUlVq54F6v6WVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEApKmBtCHgqqkIuytZC/qWc6/bo3rsWpjpW13gpYu8JMiciYIHOU2YvHqr # fwEPukLO+0ggQD2jlDtF8Kuj0g3wciJyc7Io75M1AigOmg0RqZMhuRUmBRd91lr0 # 5kHRhVOhJ7fkOo3zOjSmsKtfQURGOESdzjq8/uDaD8DnGEo6Ok4HWzm+xxUVq+Fn # 59Kpbv4jL9FmC5ewFV1aATj7JgZICjJReneUCSDr1bwSCI9+zwxgZoluSQAqZfNr # F1C5fMnNZw6MbMH1Ua9aWY/FRDBbNOZCEacTAiDeTo8cfSjA5lsRtwCSVqT7s9Sq # qudQGwI9Rf9aPFCqDOBG+jX6TCISXKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAV/t19HcRJrGLHuEJ/8O93VzQWNH02HzY+lamBLb7D+wIGZh/GsppV # GBMyMDI0MDQyMzEzMTUyMy4xNjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQyNDIwNTE1OFowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC3QIB/zAHAgEAAgIklzAK # AgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAL5g/H2OsBvN7sRs # WQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhwofo99Xxk/KCzCACcFbyA # 216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt3+19K/W7+QQ4Y0MOWaYZ # uM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg0kYRJN6ykfq3mYY4uvu7e0htkfshNhhtlPFBUQgdCz0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xy # MuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFzDEisoKgKMPqA12+DiwHa # 14RcMA0GCSqGSIb3DQEBCwUABIICAGASD8kv0BlbaqM16QEN4sUuVHcCJUCLdB+G # RnlEsAevQBFukzc8q/NnvwMHaW/VIZOpdVSMpIgDE1VXhTd9H/KqjueyLVtSmujR # cwBptETlmDvtf1xV1mcDopxya1/INFxU1XQauXYZuxYBQJbwUW4iav3+Bnh3oYwE # 00JU/v1AGd8P9XY4pXk+hd1J85yPvYZpPkKeU5kK251TCQ8lpAT0sLDyVj3vWodG # h09b1Gc3SMvsSRxLE9HF3D/GN1B/Flto+uUIIPmBJXzUg6nx8jIiACcHinK+Nkxd # PuJylh4057JpYG5GXrCQ4/N61w+m1c69Lz0fes8qta7tEOTaKnATz+HpFVJYWfBA # gEMecNnfxdVKS/3JmRi2UqzcwITLcgfFvQK5ygLxHzSC1JrOknP5CxZSimtKOi// # vvZ2uPRXF7L+Txfsf3Z3U8w0PQO/CxqJGH8JgB9pmU+ZcPcU4dmD8qtIXp4BjUt2 # Yc6dQ316Nyjx0EC8LE5rWB1PXjqontdhk5F0gUBqyuAbi+HHCNcSCyqjyNTlmBJX # c8EFzA3AWnxuGDbiQa1FBC/Mc6EoAwZ5EsfbiAPMsdUwCL+ViYCpdGO/YhOAQKgx # xpK4IaymsQsvE5nLwNAvPQDAVxqdfDxqTgB27OCRiMevQFgiFa13sYh+28L15BgD # hhEi1JWl # SIG # End signature block
combined_dataset/train/non-malicious/3222.ps1
3222.ps1
describe 'New-PoshBotTextResponse' { it 'Returns a [PoshBot.Text.Response] object' { $resp = New-PoshBotTextResponse -Text 'abc' $resp.PSObject.TypeNames[0] | should be 'PoshBot.Text.Response' } it 'Has a valid [Text] field' { $resp = New-PoshBotTextResponse -Text 'abc' $resp.Text | should be 'abc' } it 'Will redirect to DM channel when told' { $resp = New-PoshBotTextResponse -Text 'abc' -DM $resp.DM | should be $true } it 'Will wrap in code block when told' { $resp = New-PoshBotTextResponse -Text 'abc' -AsCode $resp.AsCode | should be $true } }
combined_dataset/train/non-malicious/Work-in-progressSPdeploy.ps1
Work-in-progressSPdeploy.ps1
[System.Reflection.Assembly]::Load('Microsoft.Build.Utilities.v3.5, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') | out-null [System.Reflection.Assembly]::Load('Microsoft.SharePoint, Version=12.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429c') | out-null $msbuild = [Microsoft.Build.Utilities.ToolLocationHelper]::GetPathToDotNetFrameworkFile("msbuild.exe", "VersionLatest") $global:basepath = (resolve-path ..).path $stsadm = Join-Path ([Microsoft.SharePoint.Utilities.SPUtility]::GetGenericSetupPath("BIN")) "stsadm.exe" function Run-MSBuild($msBuildArgs) { & $msbuild $msBuildArgs } function Get-FirstDirectoryUnderneathSrc { dir (Get-FullPath "src") | where { $_.PSIsContainer -eq $true } | select -first 1 } function Get-FullPath($subdirectory) { return join-path -path $basepath -childPath $subdirectory } $wspbuilder = Get-FullPath("tools\\WSPBuilder.exe") function Run-WspBuilder($rootDirectory) { pushd cd $rootDirectory & $WSPBuilder -BuildWSP true -OutputPath (Get-FullPath 'deployment') popd } function Clean-Path($dir) { #I don't like the SilentlyContinue option, but we need to ignore the case #where there is no directory to delete (in this situation, an error is thrown) del $dir -recurse -force -erroraction SilentlyContinue mkdir $dir -erroraction SilentlyContinue | out-null } function Create-DeploymentBatchFile($filename, $featureName, $solutionName, $url) { $contents = @" ECHO OFF SET STSADM="%PROGRAMFILES%\\Common Files\\Microsoft Shared\\web server extensions\\12\\BIN\\stsadm.exe" %STSADM% -o deactivatefeature -name $featureName -url $url %STSADM% -o retractsolution -allcontenturls -immediate -name $solutionName %STSADM% -o execadmsvcjobs %STSADM% -o deletesolution -name $solutionName -override %STSADM% -o addsolution -filename $solutionName %STSADM% -o deploysolution -allcontenturls -immediate -allowgacdeployment -name $solutionName %STSADM% -o execadmsvcjobs REM second call to execadmsvcjobs allows for a little more delay. Shouldn't be necessary, but is. %STSADM% -o execadmsvcjobs %STSADM% -o activatefeature -url $url -name $featureName "@ Out-File -inputObject $contents -filePath $filename -encoding ASCII } #Do-Deployment - regardless of current status, will install the Solution function Do-Deployment($featureName, $solutionName, $rootDirectory) { echo $featureName, $solutionName, $rootDirectory if (-not (Is-Installed $solutionName)) { Install-Solution -solutionName $solutionName -filename (join-path $rootDirectory $solutionName) } Exec-AdmSvcJobs if (-not (Is-Deployed $solutionName)) { Deploy-Solution -solutionName $solutionName -featureName $featureName -filename (join-path $rootDirectory $solutionName) } else { Upgrade-Solution -solutionName $solutionName -featureName $featureName -filename (join-path $rootDirectory $solutionName) } } function Is-Installed($solutionName) { #is Solution in the Solution store at all? return [Microsoft.SharePoint.Administration.SPFarm]::Local.Solutions[$solutionName] -ne $null } function Is-Deployed($solutionName) { #Is Solution successfully deployed everywhere? Partial/failed deployments don't count as deployed $solution = [Microsoft.SharePoint.Administration.SPFarm]::Local.Solutions[$solutionName] if ($solution -eq $null) { return false; } return $solution.Deployed } function Install-Solution($solutionName, $filename) { #Assumes solution is NOT already installed. For "unsure installation", use Do-Deployment [Microsoft.SharePoint.Administration.SPFarm]::Local.Solutions.psbase.Add($filename) | out-null } function Deploy-Solution($featureName, $solutionName, $filename) { #Assumes solution is already installed. For "unsure installation", use Do-Deployment $dateToGuaranteeInstantDeployment = [datetime]::Now.AddDays(-2) #method signature requires typed Collection, so we're unrolling #the IEnumerable<SPWebApplication> into an array. $webApplications = [Microsoft.SharePoint.Administration.SPWebService]::ContentService.WebApplications | % { $_ } $webApplicationsCollection = new-object Microsoft.SharePoint.Administration.SPWebApplication[] -arg ($webApplications.Count) 0..($webApplications.Count-1) | % { $webApplicationsCollection[$_] = $webApplications[$_] } [Microsoft.SharePoint.Administration.SPFarm]::Local.Solutions[$solutionName].Deploy($dateToGuaranteeInstantDeployment, $true, $webApplicationsCollection, $false) } function Upgrade-Solution($featureName, $solutionName, $filename) { [Microsoft.SharePoint.Administration.SPFarm]::Local.Solutions[$solutionName].Upgrade($filename) } function Exec-AdmSvcJobs { & $stsadm -o execadmsvcjobs #sleep for a few more seconds to account for concurrency bugs/timing issues sleep -seconds 2 }
combined_dataset/train/non-malicious/1077.ps1
1077.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldDetectIfOSIs64Bit { $is64Bit = (Test-Path env:"ProgramFiles(x86)") Assert-Equal $is64Bit (Test-OSIs64Bit) }
combined_dataset/train/non-malicious/Twitter Module v0.2.1b.ps1
Twitter Module v0.2.1b.ps1
<# <# Name: Social Media Scripting Framework Module: Twitter Version: 0.2 BETA Date: 2013/02/03 Author: Carlos Veira Lorenzo RoughRevision: chriskenis e-mail: cveira [at] thinkinbig [dot] org blog: thinkinbig.org twitter: @cveira facebook: www.facebook.com/cveira Google+: gplus.to/cveira LinkedIn: es.linkedin.com/in/cveira/ Support: http://thinkinbig.org/oms/ Forums & Communities: facebook.com/ThinkInBig gplus.to/ThinkInBig http://bit.ly/SMSF-Forum Code Mirror Sites: https://smsf.codeplex.com/ https://github.com/cveira/social-media-scripting-framework https://code.google.com/p/social-media-scripting-framework/ http://sourceforge.net/projects/smsf/ Social Media Scripting Framework. Copyright (C) 2013 Carlos Veira Lorenzo. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. #> [Reflection.Assembly]::LoadWithPartialName("System.Security") | Out-Null [Reflection.Assembly]::LoadWithPartialName("System.Net") | Out-Null [string] $script:TweetContentPattern = '((?s)<p[^>]*js-tweet-text tweet-text[^>]*>(?<TweetContent>.*?)</p>.*?' + ` '<li[^>]*js-stat-count js-stat-retweets stat-count[^>]*>(?<ReTweetStats>.*?)</li>.*?' + ` '<li[^>]*js-stat-count js-stat-favorites stat-count[^>]*>(?<FavoritesStats>.*?)</li>)|' + ` '((?s)<p[^>]*js-tweet-text tweet-text[^>]*>(?<TweetContent>.*?)</p>.*?' + ` '<li[^>]*js-stat-count js-stat-retweets stat-count[^>]*>(?<ReTweetStats>.*?)</li>)|' + ` '((?s)<p[^>]*js-tweet-text tweet-text[^>]*>(?<TweetContent>.*?)</p>.*?' + ` '<li[^>]*js-stat-count js-stat-favorites stat-count[^>]*>(?<FavoritesStats>.*?)</li>)|' + ` '((?s)<p[^>]*js-tweet-text tweet-text[^>]*>(?<TweetContent>.*?)</p>)' $script:TwitterTimeOut = 3 * 60 * 1000 # seconds [string] $script:TwitterUserAgent = "PowerShell" + (Get-Host).Version.Major [string] $script:ApiRoot = "http://api.twitter.com/1.1/" Function Get-TweetRetweetsFromPage([ref] $PageSourceCode){ [string] $RetweetsCountPattern = '<strong[^>]*[^>]*>(?<RetweetsCount>.*?)</strong>' if ($PageSourceCode.Value -match $script:TweetContentPattern){ if ($Matches.ReTweetStats -match $RetweetsCountPattern){$Matches.RetweetsCount} else {0} } else {0} } Function Get-TweetFavoritesFromPage([ref] $PageSourceCode){ [string] $FavoritesCountPattern = '<strong[^>]*[^>]*>(?<FavoritesCount>.*?)</strong>' if ($PageSourceCode.Value -match $script:TweetContentPattern){ if ($Matches.FavoritesStats -match $FavoritesCountPattern){$Matches.FavoritesCount} else {0} } else {0} } Function Get-TweetContentFromPage([ref] $PageSourceCode){ if ($PageSourceCode.Value -match $script:TweetContentPattern){$Matches.TweetContent} else {"N/D"} } Function Get-TweetLinksFromPage([ref] $PageSourceCode){ [RegEx] $LinksPattern = '(data-expanded-url="(.*?)")+' [string[]] $TweetLinks = @() if ($PageSourceCode.Value -match $script:TweetContentPattern){ $CurrentMatch = $LinksPattern.match($Matches.TweetContent) if (-not $CurrentMatch.Success){$TweetLinks += "N/D"} while ($CurrentMatch.Success){ $TweetLinks += $CurrentMatch.Value.Split('"')[1] $CurrentMatch = $CurrentMatch.NextMatch() } } else {$TweetLinks += "N/D"} return $TweetLinks } Function Get-TweetHashTagsFromPage([ref] $PageSourceCode){ [string] $HashTagNamePattern = "%23(?<HashTag>.*?)&amp" [RegEx] $LinksPattern = '(href="(.*?)")+' [string[]] $TweetLinks = @() if ($PageSourceCode.Value -match $script:TweetContentPattern){ $CurrentMatch = $LinksPattern.match($Matches.TweetContent) if (-not $CurrentMatch.Success){$TweetLinks += "N/D"} while ($CurrentMatch.Success){ if ($CurrentMatch.Value -match $HashTagNamePattern){$TweetLinks += $Matches.HashTag } $CurrentMatch = $CurrentMatch.NextMatch() } } else {$TweetLinks += "N/D"} return $TweetLinks } Function EscapeDataStringRfc3986([string]$text){ [string[]] $Rfc3986CharsToEscape = @("!", "*", "'", "(", ")") [string] $EscapedText = [System.Uri]::EscapeDataString($text) for ($i = 0; $i -lt $Rfc3986CharsToEscape.Length; $i++){ $EscapedText = $EscapedText.Replace($Rfc3986CharsToEscape[$i], [System.Uri]::HexEscape($Rfc3986CharsToEscape[$i])) } return $EscapedText } Function Set-OAuthSignature{ param( [string] $HttpRequestType, [string] $HttpEndpoint, [string] $HttpQueryString, [string] $OAuthNonce, [string] $OAuthTimeStamp, [string] $OAuthConsumerKey, [string] $OAuthConsumerSecret, [string] $OAuthToken, [string] $OAuthTokenSecret ) [string[]] $HttpQueryStringParameters $ParameterString = @{} if ($HttpQueryString.Length -gt 0){ $HttpQueryStringParameters = $HttpQueryString.Split("&") $HttpQueryStringParameters | ForEach-Object {$ParameterString.Add($_.Split("=")[0], $_.Split("=")[1]) } } $ParameterString.Add("oauth_consumer_key", $OAuthConsumerKey) $ParameterString.Add("oauth_nonce", $OAuthNonce) $ParameterString.Add("oauth_signature_method", "HMAC-SHA1") $ParameterString.Add("oauth_timestamp", $OAuthTimeStamp) $ParameterString.Add("oauth_token", $OAuthToken) $ParameterString.Add("oauth_version", "1.0") $signature = $HttpRequestType + "&" # 1. The URL in the signature string HAS NO QUERY_STRING PARAMETERS $signature += [System.Uri]::EscapeDataString($HttpEndpoint) + "&" # 2. All the parameters included in the QUERY_STRING {when calling [System.Net.WebRequest]::Create()} have to be included in the signature # 3. When building the signature string, parameters must be in alphabetical order. $ParameterString.Keys | Sort-Object | ForEach-Object { # [System.Uri]::EscapeDataString($_ + "=" + $ParameterString.$_ + "&") is not RFC3986 compliant in .NET < 4.x! # RFC3986 compliancy is documented in OAuth 1.0A, not in Twitter documentation! $signature += EscapeDataStringRfc3986 $($_ + "=" + $ParameterString.$_ + "&") } $signature = $signature.Substring(0, $signature.Length - 3) $SignatureKey = [System.Uri]::EscapeDataString($OAuthConsumerSecret) + "&" + [System.Uri]::EscapeDataString($OAuthTokenSecret) $Hasher = New-Object System.Security.Cryptography.HMACSHA1 $Hasher.Key = [System.Text.Encoding]::ASCII.GetBytes($SignatureKey) $OAuthSignature = [System.Convert]::ToBase64String($Hasher.ComputeHash([System.Text.Encoding]::ASCII.GetBytes($signature))) return $OAuthSignature } Function Set-OAuthHeader{ param( [string] $OAuthConsumerKey, [string] $OAuthNonce, [string] $OAuthSignature, [string] $OAuthTimeStamp, [string] $OAuthToken ) $OAuthHeader = 'OAuth ' $OAuthHeader += 'oauth_consumer_key="' + [System.Uri]::EscapeDataString($OAuthConsumerKey) + '", ' $OAuthHeader += 'oauth_nonce="' + [System.Uri]::EscapeDataString($OAuthNonce) + '", ' $OAuthHeader += 'oauth_signature="' + [System.Uri]::EscapeDataString($OAuthSignature) + '", ' $OAuthHeader += 'oauth_signature_method="HMAC-SHA1", ' $OAuthHeader += 'oauth_timestamp="' + [System.Uri]::EscapeDataString($OAuthTimeStamp) + '", ' $OAuthHeader += 'oauth_token="' + [System.Uri]::EscapeDataString($OAuthToken) + '", ' $OAuthHeader += 'oauth_version="1.0"' return $OAuthHeader } Function Get-RawTweetRetweetedBy([string]$TweetPermaLink, [string]$Output = 'raw'){ [string] $HttpRequestType = "GET" [string] $TwitterRawResponse = "" [string] $ApiURL = $script:ApiRoot + "/statuses/" + $TweetPermaLink.Split("/")[5] + "/retweeted_by.xml" # [string] $ApiURL = "http://api.twitter.com/1/statuses/" + $TweetPermaLink.Split("/")[5] + "/retweeted_by.xml" --> = typo or version 1 iso 1.1 ??? [string] $HttpQueryString = "" $OAuthConsumerKey = $TwitterConsumerKey $OAuthConsumerSecret = $TwitterConsumerSecret $OAuthToken = $TwitterAccessToken $OAuthTokenSecret = $TwitterAccessTokenSecret $OAuthNonce = [System.Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes([System.DateTime]::Now.Ticks.ToString())) $OAuthTimeStamp = [int64](New-TimeSpan "01 January 1970 00:00:00" $(Get-Date)).TotalSeconds $OAuthSignature = Set-OAuthSignature $HttpRequestType $ApiURL $HttpQueryString $OAuthNonce $OAuthTimeStamp $OAuthConsumerKey $OAuthConsumerSecret $OAuthToken $OAuthTokenSecret $OAuthHeader = Set-OAuthHeader $OAuthConsumerKey $OAuthNonce $OAuthSignature $OAuthTimeStamp $OAuthToken [System.Net.HttpWebRequest] $request = [System.Net.WebRequest]::Create($ApiURL) $request.Method = $HttpRequestType $request.UserAgent = $script:TwitterUserAgent $request.Timeout = $script:TwitterTimeOut $request.ContentType = "application/x-www-form-urlencoded" $request.Headers.Add("Authorization", $OAuthHeader) try { [System.Net.HttpWebResponse] $response = $request.GetResponse() if ($response -ne $null){ $ResponseStream = New-Object System.IO.StreamReader($response.GetResponseStream()) $ResponseStream.ReadToEnd().Trim() | Select-String -NotMatch "api.twitter.com" | ForEach-Object {$TwitterRawResponse += $_ } | Out-Null } switch ($Output){ 'raw'{return $TwitterRawResponse} 'xml'{ $TwitterXMLResponse = @() [xml]$TwitterRawResponse | ForEach-Object {$_.users.user } | ForEach-Object { $TwitterXMLResponse += New-Object PSObject -Property @{ Name = $_.name ScreenName = $_.screen_name Description = $_.description URL = $_.url Friends = $_.friends_count Followers = $_.followers_count Tweets = $_.statuses_count Listed = $_.listed_count } } return $TwitterXMLResponse } } $response.Close() } catch {$_.Exception.Message} } Function Get-RawTweetRetweetedByAsXml([string] $TweetPermaLink){ Get-RawTweetRetweetedBy -TweetPermaLink $TweetPermaLink -Output 'xml' } Function Get-RawTwitterAsJson { param( [string]$TwitterObject, [string]$TweetPermaLink = "", [string]$UserName = "", [int] $results = 20, [string] $FirstId = "", [string] $LastId = "", [string] $PageId = "-1", [int] $ResultsPerPage = 20 ) [string] $HttpRequestType = "GET" [string] $HttpEndpoint = "" [string] $HttpQueryString = "" [string] $ApiURL = "" switch ($TwitterObject){ 'TwitterMentions'{$ApiURL = $script:ApiRoot + "statuses/mentions_timeline.json?count=20&include_entities=true&include_rts=true"} 'TweetRetweets'{$ApiURL = $script:ApiRoot + "statuses/retweets/" + $TweetPermaLink.Split("/")[5] + ".json?count=100"} 'TwitterUser'{$ApiURL = $script:ApiRoot + "users/show.json?screen_name=" + $UserName.Trim() + "&include_entities=true"} 'Tweet'{$ApiURL = $script:ApiRoot + "statuses/show.json?id=" + $TweetPermaLink.Split("/")[5] + "&include_entities=true"} 'TwitterFavorites'{$ApiURL = $script:ApiRoot + "favorites/list.json?count=20&screen_name=" + $UserName.Trim() + "&include_entities=true"} 'TweetsFromUser'{ if (($FirstId -ne "") -and ($FirstId -match "\\d+")){$FilterParameters += "&max_id=" + $FirstId } if (($LastId -ne "") -and ($LastId -match "\\d+")){$FilterParameters += "&since_id=" + $LastId } $ApiURL = $script:ApiRoot + "statuses/user_timeline.json?include_entities=true&include_rts=true&exclude_replies=true&count=" + $results + $FilterParameters + "&screen_name=" + $UserName.Trim() } 'TwitterTimeLine'{$ApiURL = $script:ApiRoot + "statuses/home_timeline.json?include_entities=true&count=20"} 'TwitterListSubscribers'{$ApiURL = $script:ApiRoot + "lists/subscribers.json?slug=" + $TweetPermaLink.Split("/")[4] + "&owner_screen_name=" + $TweetPermaLink.Split("/")[3] + "&include_entities=true&cursor=" + $PageId + "&skip_status=true"} 'TwitterListMembers'{$ApiURL = $script:ApiRoot + "lists/members.json?slug=" + $TweetPermaLink.Split("/")[4] + "&owner_screen_name=" + $TweetPermaLink.Split("/")[3] + "&include_entities=true&cursor=" + $PageId + "&skip_status=true"} 'TwitterListTimeLine'{$ApiURL = $script:ApiRoot + "lists/statuses.json?slug=" + $TweetPermaLink.Split("/")[4] + "&owner_screen_name=" + $TweetPermaLink.Split("/")[3] + "&count=" + $ResultsPerPage + "&include_entities=true&include_rts=true"} 'TwitterUserFriendsFromUser'{$ApiURL = $script:ApiRoot + "friends/list.json?screen_name=" + $UserName.Trim() + "&include_entities=true&cursor=" + $PageId + "&skip_status=true"} 'TwitterFollowersFromUser'{$ApiURL = $script:ApiRoot + "followers/list.json?screen_name=" + $UserName.Trim() + "&include_entities=true&cursor=" + $PageId + "&skip_status=true"} ''{} } if ($ApiURL.IndexOf("?") -ne -1){ $HttpEndpoint = $ApiURL.Split("?")[0] $HttpQueryString = $ApiURL.Split("?")[1] } else { $HttpEndpoint = $ApiURL $HttpQueryString = "" } $OAuthConsumerKey = $TwitterConsumerKey $OAuthConsumerSecret = $TwitterConsumerSecret $OAuthToken = $TwitterAccessToken $OAuthTokenSecret = $TwitterAccessTokenSecret $OAuthNonce = [System.Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes([System.DateTime]::Now.Ticks.ToString())) $OAuthTimeStamp = [int64](New-TimeSpan "01 January 1970 00:00:00" $(Get-Date)).TotalSeconds $OAuthSignature = Set-OAuthSignature $HttpRequestType $HttpEndpoint $HttpQueryString $OAuthNonce $OAuthTimeStamp $OAuthConsumerKey $OAuthConsumerSecret $OAuthToken $OAuthTokenSecret $OAuthHeader = Set-OAuthHeader $OAuthConsumerKey $OAuthNonce $OAuthSignature $OAuthTimeStamp $OAuthToken [System.Net.HttpWebRequest] $request = [System.Net.WebRequest]::Create($ApiURL) $request.Method = $HttpRequestType $request.UserAgent = $script:TwitterUserAgent $request.Timeout = $script:TwitterTimeOut $request.ContentType = "application/x-www-form-urlencoded" $request.Headers.Add("Authorization", $OAuthHeader) try { [System.Net.HttpWebResponse] $response = $request.GetResponse() if ($response -ne $null){ $ResponseStream = New-Object System.IO.StreamReader($response.GetResponseStream()) $ResponseStream.ReadToEnd().Trim() } $response.Close() } catch {$_.Exception.Message} } Function Get-RawTwitterMentionsAsJson { Get-RawTwitterAsJson -TwitterObject 'TwitterMentions' } Function Get-RawTweetRetweetsAsJson($TweetPermaLink){ Get-RawTwitterAsJson -TwitterObject 'TweetRetweets' -TweetPermaLink $TweetPermaLink } Function Get-RawTwitterUserAsJson($UserName){ Get-RawTwitterAsJson -TwitterObject 'TwitterUser' -Username $Username } Function Get-RawTweetAsJson($TweetPermaLink){ Get-RawTwitterAsJson -TwitterObject 'Tweet' -TweetPermaLink $TweetPermaLink } Function Get-RawTwitterFavoritesAsJson($UserName){ Get-RawTwitterAsJson -TwitterObject 'TwitterFavorites' -UserName $UserName } Function Get-RawTweetsFromUserAsJson($UserName,$results = 20,$FirstId = "",$LastId = ""){ Get-RawTwitterAsJson -TwitterObject 'TweetsFromUser' -UserName $UserName -results $results -FirstId $FirstId -LastId $LastId } Function Get-RawTwitterTimeLineAsJson{ Get-RawTwitterAsJson -TwitterObject 'TwitterTimeLine' } Function Get-RawTwitterListSubscribersAsJson($TweetPermaLink,$PageId = "-1" ) { Get-RawTwitterAsJson -TwitterObject 'TwitterListSubscribers' -TweetPermaLink $TweetPermaLink -PageId $PageId } Function Get-RawTwitterListMembersAsJson($TweetPermaLink,$PageId = "-1"){ Get-RawTwitterAsJson -TwitterObject 'TwitterListMembers' -TweetPermaLink $TweetPermaLink -PageId $PageId } Function Get-RawTwitterListTimeLineAsJson($TweetPermaLink,$ResultsPerPage = 20){ Get-RawTwitterAsJson -TwitterObject 'TwitterListTimeLine' -TweetPermaLink $TweetPermaLink -ResultsPerPage $ResultsPerPage } Function Get-RawTwitterUserFriendsFromUserAsJson($UserName,$PageId = "-1"){ Get-RawTwitterAsJson -TwitterObject 'TwitterUserFriendsFromUser' -UserName $UserName -PageId $PageId } Function Get-RawTwitterFollowersFromUserAsJson($UserName,$PageId = "-1"){ Get-RawTwitterAsJson -TwitterObject 'TwitterFollowersFromUser' -UserName $UserName -PageId $PageId } Function Get-RawTwitterSearchAsJson{ param( [string] $query, [int] $ResultsPerPage = 20, [string] $Language = "", [string] $ResultType = "", [string] $StartDate = "", [string] $GeoCode = "", [int64] $SinceId = 0, [int64] $MaxId = 0 ) # https://dev.twitter.com/docs/api/1.1/get/search/tweets # https://dev.twitter.com/docs/using-search # https://dev.twitter.com/docs/working-with-timelines [string] $HttpRequestType = "GET" [string] $HttpEndpoint = "" [string] $HttpQueryString = "" [string] $TwitterRawResponse = "" [string] $SearchParameters = "include_entities=true" if ($ResultType -eq ""){$SearchParameters += "&result_type=mixed"} else { switch ($ResultType){ "mixed" {$SearchParameters += "&result_type=mixed"} "recent" {$SearchParameters += "&result_type=recent"} "popular" {$SearchParameters += "&result_type=popular"} default {$SearchParameters += "&result_type=mixed"} } } if (($StartDate -ne "") -and ($StartDate -match "\\d{4}-\\d{2}-\\d{2}")){$SearchParameters += "&until=" + $StartDate} if (($GeoCode -ne "") -and ($GeoCode -match "(\\-*[\\d\\.]+),(\\-*[\\d\\.]+),(\\d+)(km|mi)")){$SearchParameters += "&geocode=" + $GeoCode} if ($SinceId -ne 0){$SearchParameters += "&since_id=" + $SinceId} if ($MaxId -ne 0){$SearchParameters += "&max_id=" + $MaxId} $SearchParameters += "&count=" + $ResultsPerPage + "&q=" [string] $ApiURL = $script:ApiRoot + "search/tweets.json?" + $SearchParameters + [System.Uri]::EscapeDataString($query.Trim()) if ($ApiURL.IndexOf("?") -ne -1){ $HttpEndpoint = $ApiURL.Split("?")[0] $HttpQueryString = $ApiURL.Split("?")[1] } else { $HttpEndpoint = $ApiURL $HttpQueryString = "" } $OAuthConsumerKey = $TwitterConsumerKey $OAuthConsumerSecret = $TwitterConsumerSecret $OAuthToken = $TwitterAccessToken $OAuthTokenSecret = $TwitterAccessTokenSecret $OAuthNonce = [System.Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes([System.DateTime]::Now.Ticks.ToString())) $OAuthTimeStamp = [int](New-TimeSpan "01 January 1970 00:00:00" $(Get-Date)).TotalSeconds $OAuthSignature = Set-OAuthSignature $HttpRequestType $HttpEndpoint $HttpQueryString $OAuthNonce $OAuthTimeStamp $OAuthConsumerKey $OAuthConsumerSecret $OAuthToken $OAuthTokenSecret $OAuthHeader = Set-OAuthHeader $OAuthConsumerKey $OAuthNonce $OAuthSignature $OAuthTimeStamp $OAuthToken [System.Net.HttpWebRequest] $request = [System.Net.WebRequest]::Create($ApiURL) $request.Method = $HttpRequestType $request.UserAgent = $script:TwitterUserAgent $request.Timeout = $script:TwitterTimeOut $request.ContentType = "application/x-www-form-urlencoded" $request.Headers.Add("Authorization", $OAuthHeader) try { [System.Net.HttpWebResponse] $response = $request.GetResponse() if ($response -ne $null){ $ResponseStream = New-Object System.IO.StreamReader($response.GetResponseStream()) $ResponseStream.ReadToEnd().Trim() } $response.Close() } catch {$_.Exception.Message} } Function Send-Tweet ([string] $TweetMessage){ # https://dev.twitter.com/docs/api/1.1/post/statuses/update # Send-Tweet "This is my first Tweet from #PowerShell using, raw #DotNet and #OAuth!" [string] $HttpRequestType = "POST" [string] $HttpEndpoint = "" [string] $HttpQueryString = "" [string] $TwitterRawResponse = "" [string] $ApiURL = $script:ApiRoot + "statuses/update.json" if ($TweetMessage.Length -gt 140){$TweetMessage = $TweetMessage.Substring(0,140)} # Body POST Data format is NOT documented! # look at how the supplied example looks like @ https://dev.twitter.com/docs/api/1.1/post/statuses/update [byte[]] $HttpPostBody = [System.Text.Encoding]::UTF8.GetBytes("status=" + (EscapeDataStringRfc3986 ($TweetMessage))) $HttpEndpoint = $ApiURL # The 'status' parameter gets encoded TWICE in the OAuth signature. This detail is NOT documented! # Run an example with the OAuth Tool and look at the results for the OAuth signature. # [System.Uri]::EscapeDataString() is not RFC3986 compliant in .NET < 4.x! # RFC3986 compliancy is documented in OAuth 1.0A, not in Twitter documentation! $HttpQueryString = "status=" + (EscapeDataStringRfc3986 $TweetMessage) $OAuthConsumerKey = $TwitterConsumerKey $OAuthConsumerSecret = $TwitterConsumerSecret $OAuthToken = $TwitterAccessToken $OAuthTokenSecret = $TwitterAccessTokenSecret $OAuthNonce = [System.Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes([System.DateTime]::Now.Ticks.ToString())) $OAuthTimeStamp = [int](New-TimeSpan "01 January 1970 00:00:00" $(Get-Date)).TotalSeconds $OAuthSignature = Set-OAuthSignature $HttpRequestType $HttpEndpoint $HttpQueryString $OAuthNonce $OAuthTimeStamp $OAuthConsumerKey $OAuthConsumerSecret $OAuthToken $OAuthTokenSecret $OAuthHeader = Set-OAuthHeader $OAuthConsumerKey $OAuthNonce $OAuthSignature $OAuthTimeStamp $OAuthToken [System.Net.HttpWebRequest] $request = [System.Net.WebRequest]::Create($ApiURL) $request.Method = $HttpRequestType $request.UserAgent = $script:TwitterUserAgent $request.Timeout = $script:TwitterTimeOut $request.ContentType = "application/x-www-form-urlencoded" $request.ContentLength = $HttpPostBody.Length $request.ServicePoint.Expect100Continue = $false $request.Headers.Add("Authorization", $OAuthHeader) try { [System.IO.Stream] $RequestBody = $request.GetRequestStream() $RequestBody.Write($HttpPostBody, 0, $HttpPostBody.Length) # $RequestBody.Flush() $RequestBody.Close() [System.Net.HttpWebResponse] $response = $request.GetResponse() if ($response -ne $null){ $ResponseStream = New-Object System.IO.StreamReader($response.GetResponseStream()) $ResponseStream.ReadToEnd().Trim() } $response.Close() } catch {$_.Exception.Message} } Function Get-TwitterProfile([string]$UserName){Get-RawTwitterUserAsJson $UserName | ConvertFrom-JSON} Function Get-UnpagedFollowerList([object[]] $PagedFollowersList){ $UnpagedFollowers = @() $PagedFollowersList | ForEach-Object {$UnpagedFollowers += $_.users } $UnpagedFollowers = $UnpagedFollowers | Select-Object * -unique return $UnpagedFollowers } Function Get-TwitterFollowers([string] $UserName){ begin{ [PSCustomObject[]] $RawFollowersPages = @() $CurrentPage = $null $TimeToWait = 66 $FollowersPerPage = 20 $PageCount = 0 [int] $TotalFollowers = (Get-RawTwitterUserAsJson $UserName | ConvertFrom-JSON).followers_count } process{ try { $PageCount = 1 $CurrentPage = Get-RawTwitterFollowersFromUserAsJson $UserName | ConvertFrom-JSON $RawFollowersPages += $CurrentPage do { Write-Progress -Activity "Retrieving Followers ..." -Status "Progress: " -PercentComplete ((($PageCount * $FollowersPerPage) / $TotalFollowers) * 100) $PageCount++ $RawFollowersPages += $CurrentPage Start-Sleep -Seconds $TimeToWait $CurrentPage = Get-RawTwitterFollowersFromUserAsJson $UserName -PageId $CurrentPage.next_cursor | ConvertFrom-JSON } until ($CurrentPage.next_cursor -eq 0) } catch { [PSCustomObject[]] $RawFollowersPages = @() $_.Exception.Message } } end { Get-UnpagedFollowerList $RawFollowersPages # $RawFollowersPages } } Function Get-TweetsFromUser{ param( [string]$UserName, [int]$results = 20, [switch]$quick, [switch]$IncludeAll ) # Get-TweetsFromUser cveira -results 250 -quick # $DebugPreference = "Continue" [PSObject[]] $TimeLine = @() [PSObject[]] $tweets = @() $SourcePattern = '((?s)<a[^>]*[^>]*>(?<TweetSource>.*?)</a>)' $TwitterMaxResults = 100 $TimeToWait = 6 $ExtendedTimeToWait = 0 $TimeToWaitForRTs = 66 $TimeToWaitForFavs = 66 $IncludeRTs = $false $IncludeFavorites = $false if ($quick){ $IncludeAll = $false $IncludeRTs = $false $IncludeFavorites = $false } elseif ($IncludeAll){ $IncludeRTs = $true $IncludeFavorites = $true } if ($TimeToWaitForRTs -ge $TimeToWaitForFavs){$ExtendedTimeToWait = $TimeToWaitForRTs} else {$ExtendedTimeToWait = $TimeToWaitForFavs} if ($results -lt $TwitterMaxResults){$tweets = Get-RawTweetsFromUserAsJson -UserName $UserName -results $results | ConvertFrom-Json} else { do { Write-Progress -Activity "Retrieving Tweets ..." -Status "Progress: $($tweets.Count) / $results" -PercentComplete (($($tweets.Count) / $results) * 100) $CurrentTweets = Get-RawTweetsFromUserAsJson -UserName $UserName -results $TwitterMaxResults -FirstId $LastId | ConvertFrom-Json Write-Debug "[INFO] Retrieved Tweets: $($tweets.Count)" Write-Debug "[INFO] CurrentTweets count: $($CurrentTweets.Count)" Write-Debug "[INFO] LastId: $LastId" Write-Debug "[INFO] FirstId: $($CurrentTweets[0].id)" if ($CurrentTweets[0].id -eq $LastId){$FirstTweet = 1} else {$FirstTweet = 0} $LastId = $CurrentTweets[($CurrentTweets.Count -1)].id $tweets += $CurrentTweets[ $FirstTweet..($CurrentTweets.Count - 1) ] Start-Sleep -Seconds $TimeToWait } until ($tweets.Count -gt $results) $tweets = $tweets[0..($results - 1)] } if ($quick){$tweets} else { $i = 1 $tweets | ForEach-Object { if ($IncludeAll){ Write-Progress -Activity "Normalizing Information ..." -Status "Progress: $i / $results - ETC: $((($results - $i) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes - Time Elapsed: $((($i - 1) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes" -PercentComplete (($i / $results) * 100) } else { Write-Progress -Activity "Normalizing Information ..." -Status "Progress: $i / $results" -PercentComplete (($i / $results) * 100) } $NewTweet = $_ $NewTweet.user = $NewTweet.user.screen_name if ($NewTweet.source -match $SourcePattern){ $NewTweet.source = $Matches.TweetSource } Write-Debug ".Links not exists: $($NewTweet.Links -eq $null)" if ($NewTweet.Links -eq $null){ $NewTweet | Add-Member -NotePropertyName Links -NotePropertyValue $NewTweet.entities.urls.expanded_url } else { $NewTweet.Links = $NewTweet.entities.urls.expanded_url } Write-Debug ".HashTags not exists: $($null -eq $NewTweet.HashTags)" if ($null -eq $NewTweet.HashTags){ $NewTweet | Add-Member -NotePropertyName HashTags -NotePropertyValue $NewTweet.entities.hashtags.text -force } else { $NewTweet.HashTags = $NewTweet.entities.hashtags.text } Write-Debug ".Mentions not exists: $($null -eq $NewTweet.Mentions)" if ($null -eq $NewTweet.Mentions){ $NewTweet | Add-Member -NotePropertyName Mentions -NotePropertyValue $NewTweet.entities.user_mentions.screen_name -force } else { $NewTweet.Mentions = $NewTweet.entities.user_mentions.screen_name } Write-Debug ".PermaLink not exists: $($NewTweet.PermaLink -eq $null)" if ($NewTweet.retweeted_status.user.screen_name -eq $null){ if ($NewTweet.PermaLink -eq $null){ $NewTweet | Add-Member -NotePropertyName PermaLink -NotePropertyValue "https://twitter.com/$($NewTweet.user)/status/$($NewTweet.id)" } else { $NewTweet.PermaLink = "https://twitter.com/$($NewTweet.user)/status/$($NewTweet.id)" } } else { if ($NewTweet.PermaLink -eq $null){ $NewTweet | Add-Member -NotePropertyName PermaLink -NotePropertyValue "https://twitter.com/$($NewTweet.retweeted_status.user.screen_name)/status/$($NewTweet.retweeted_status.id)" } else { $NewTweet.PermaLink = "https://twitter.com/$($NewTweet.retweeted_status.user.screen_name)/status/$($NewTweet.retweeted_status.id)" } } Write-Debug "[INFO] PermaLink: $($NewTweet.PermaLink)" if ($IncludeRTs){ if ($IncludeAll){ Write-Progress -Activity "Retrieving Retweets ..." -Status "Progress: $i / $results - ETC: $((($results - $i) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes - Time Elapsed: $((($i - 1) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes" -PercentComplete (($i / $results) * 100) } else { Write-Progress -Activity "Retrieving Retweets ..." -Status "Progress: $i / $results" -PercentComplete (($i / $results) * 100) } Write-Debug ".retweets not exists: $($NewTweet.entities.retweets -eq $null)" if ($NewTweet.entities.retweets -eq $null){ $NewTweet.entities | Add-Member -NotePropertyName retweets -NotePropertyValue @() } else { $NewTweet.entities.retweets = @() } Write-Debug ".Interactions not exists: $($NewTweet.Interactions -eq $null)" if ($NewTweet.Interactions -eq $null){ $NewTweet | Add-Member -NotePropertyName Interactions -NotePropertyValue @() } else { $NewTweet.Interactions = @() } $NewTweet.entities.retweets = Get-RawTweetRetweetsAsJson $NewTweet.PermaLink | ConvertFrom-Json # $NewTweet.retweet_count = $NewTweet.entities.retweets.Count $NewTweet.Interactions += $NewTweet.entities.retweets | ForEach-Object { New-Object PSObject -Property @{ screen_name = $_.user.screen_name location = $_.user.location } } Write-Debug "[INFO] Retrieved Retweets: $($NewTweet.entities.retweets.Count)" Write-Debug "[INFO] Interactions: $($NewTweet.Interactions.Count)" } if ($IncludeFavorites){ if ($IncludeAll){ Write-Progress -Activity "Retrieving Favorites ..." -Status "Progress: $i / $results - ETC: $((($results - $i) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes - Time Elapsed: $((($i - 1) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes" -PercentComplete (($i / $results) * 100) } else { Write-Progress -Activity "Retrieving Favorites ..." -Status "Progress: $i / $results" -PercentComplete (($i / $results) * 100) } Write-Debug ".favorites_count not exists: $($NewTweet.favorites_count -eq $null)" if ($NewTweet.favorites_count -eq $null){ $NewTweet | Add-Member -NotePropertyName favorites_count -NotePropertyValue 0 } else { $NewTweet.favorites_count = 0 } $SourceCode = Get-PageSourceCode $NewTweet.PermaLink $NewTweet.favorites_count = Get-TweetFavoritesFromPage ([ref] $SourceCode) Write-Debug "[INFO] Retrieved Favorites: $($NewTweet.favorites_count)" } if ($IncludeAll){Start-Sleep -Seconds $ExtendedTimeToWait } $TimeLine += $NewTweet $i++ } $TimeLine }# $DebugPreference = "SilentlyContinue" } Function Normalize-TwitterTimeLine{ param( [PSObject[]]$TimeLine, [switch]$IncludeAll ) # $TimeLine = Normalize-TwitterTimeLine $tweets -IncludeAll # $DebugPreference = "Continue" [PSObject[]] $NewTimeLine = @() $TimeToWait = 0 $TimeToWaitForRTs = 66 $TimeToWaitForFavs = 66 $SourcePattern = '((?s)<a[^>]*[^>]*>(?<TweetSource>.*?)</a>)' $i = 1 $IncludeRTs = $false $IncludeFavorites = $false if ($IncludeAll){$IncludeRTs = $IncludeFavorites = $true} if ($TimeToWaitForRTs -ge $TimeToWaitForFavs){$TimeToWait = $TimeToWaitForRTs} else {$TimeToWait = $TimeToWaitForFavs} $TimeLine | ForEach-Object { $NewTweet = $_ if ($IncludeAll){Write-Progress -Activity "Normalizing Information ..." -Status "Progress: $i / $($TimeLine.Count) - ETC: $((($TimeLine.Count - $i)*($TimeToWaitForRTs + $TimeToWaitForFavs))/60) minutes - Time Elapsed: $((($i - 1)*($TimeToWaitForRTs + $TimeToWaitForFavs))/60) minutes" -PercentComplete (($i / $TimeLine.Count)* 100)} else {Write-Progress -Activity "Normalizing Information ..." -Status "Progress: $i / $($TimeLine.Count)" -PercentComplete (($i / $TimeLine.Count) * 100)} $NewTweet.user = $NewTweet.user.screen_name if ($NewTweet.source -match $SourcePattern){$NewTweet.source = $Matches.TweetSource} Write-Debug ".Links not exists: $($NewTweet.Links -eq $null)" if ($NewTweet.Links -eq $null) {$NewTweet | Add-Member -NotePropertyName Links -NotePropertyValue $NewTweet.entities.urls.expanded_url} else {$NewTweet.Links = $NewTweet.entities.urls.expanded_url} Write-Debug ".HashTags not exists: $($null -eq $NewTweet.HashTags)" if ($null -eq $NewTweet.HashTags) {$NewTweet | Add-Member -NotePropertyName HashTags -NotePropertyValue $NewTweet.entities.hashtags.text -force} else {$NewTweet.HashTags = $NewTweet.entities.hashtags.text} Write-Debug ".Mentions not exists: $($null -eq $NewTweet.Mentions)" if ($null -eq $NewTweet.Mentions) {$NewTweet | Add-Member -NotePropertyName Mentions -NotePropertyValue $NewTweet.entities.user_mentions.screen_name -force} else {$NewTweet.Mentions = $NewTweet.entities.user_mentions.screen_name} Write-Debug ".PermaLink not exists: $($NewTweet.PermaLink -eq $null)" if ($NewTweet.retweeted_status.user.screen_name -eq $null) { if ($NewTweet.PermaLink -eq $null) {$NewTweet | Add-Member -NotePropertyName PermaLink -NotePropertyValue "https://twitter.com/$($NewTweet.user)/status/$($NewTweet.id)"} else {$NewTweet.PermaLink = "https://twitter.com/$($NewTweet.user)/status/$($NewTweet.id)"} } else { if ($NewTweet.PermaLink -eq $null) {$NewTweet | Add-Member -NotePropertyName PermaLink -NotePropertyValue "https://twitter.com/$($NewTweet.retweeted_status.user.screen_name)/status/$($NewTweet.retweeted_status.id)"} else {$NewTweet.PermaLink = "https://twitter.com/$($NewTweet.retweeted_status.user.screen_name)/status/$($NewTweet.retweeted_status.id)"} } Write-Debug "[INFO] PermaLink: $($NewTweet.PermaLink)" if ($IncludeRTs) { if ($IncludeAll) {Write-Progress -Activity "Retrieving Retweets ..." -Status "Progress: $i / $($TimeLine.Count) - ETC: $((($TimeLine.Count - $i) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes - Time Elapsed: $((($i - 1) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes" -PercentComplete (($i / $TimeLine.Count) * 100) } else {Write-Progress -Activity "Retrieving Retweets ..." -Status "Progress: $i / $($TimeLine.Count)" -PercentComplete (($i / $TimeLine.Count) * 100) } Write-Debug ".retweets not exists: $($NewTweet.entities.retweets -eq $null)" if ($NewTweet.entities.retweets -eq $null) {$NewTweet.entities | Add-Member -NotePropertyName retweets -NotePropertyValue @() } else {$NewTweet.entities.retweets = @() } Write-Debug ".Interactions not exists: $($NewTweet.Interactions -eq $null)" if ($NewTweet.Interactions -eq $null) {$NewTweet | Add-Member -NotePropertyName Interactions -NotePropertyValue @() } else {$NewTweet.Interactions = @() } $NewTweet.entities.retweets = Get-RawTweetRetweetsAsJson $NewTweet.PermaLink | ConvertFrom-Json # $NewTweet.retweet_count = $NewTweet.entities.retweets.Count $NewTweet.Interactions += $NewTweet.entities.retweets | ForEach-Object { New-Object PSObject -Property @{ screen_name = $_.user.screen_name location = $_.user.location } } Write-Debug "[INFO] Retrieved Retweets: $($NewTweet.entities.retweets.Count)" Write-Debug "[INFO] Interactions: $($NewTweet.Interactions.Count)" } if ($IncludeFavorites) { if ($IncludeAll) {Write-Progress -Activity "Retrieving Favorites ..." -Status "Progress: $i / $($TimeLine.Count) - ETC: $((($TimeLine.Count - $i) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes - Time Elapsed: $((($i - 1) * ($TimeToWaitForRTs + $TimeToWaitForFavs)) / 60) minutes" -PercentComplete (($i / $TimeLine.Count) * 100) } else {Write-Progress -Activity "Retrieving Favorites ..." -Status "Progress: $i / $($TimeLine.Count)" -PercentComplete (($i / $TimeLine.Count) * 100) } Write-Debug ".favorites_count not exists: $($NewTweet.favorites_count -eq $null)" if ($NewTweet.favorites_count -eq $null) {$NewTweet | Add-Member -NotePropertyName favorites_count -NotePropertyValue 0 } else {$NewTweet.favorites_count = 0 } $SourceCode = Get-PageSourceCode $NewTweet.PermaLink $NewTweet.favorites_count = Get-TweetFavoritesFromPage ([ref] $SourceCode) Write-Debug "[INFO] Retrieved Favorites: $($NewTweet.favorites_count)" } if ($IncludeAll) {Start-Sleep -Seconds $TimeToWait } $NewTimeLine += $NewTweet $i++ }# end $TimeLine foreach # $DebugPreference = "SilentlyContinue" $NewTimeLine } Function Analyze-TwitterHasTags() { begin { $HashTags = @{} [PSObject[]] $ranking = @() } process { $post = $_ $post.HashTags | ForEach-Object { if ($HashTags.ContainsKey("$_")) { $HashTags["$_"] = $HashTags["$_"] + 1 } else { $HashTags.Add("$_", 1) } } } end { $HashTags.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ HashTag = $_ Count = $HashTags.$_ } } return $ranking } } Function Analyze-TwitterMentions() { begin { $Mentions = @{} [PSObject[]] $ranking = @() } process { $post = $_ $post.Mentions | ForEach-Object { if ($Mentions.ContainsKey("$_")) { $Mentions["$_"] = $Mentions["$_"] + 1 } else { $Mentions.Add("$_", 1) } } } end { $Mentions.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ User = $_ Count = $Mentions.$_ } } return $ranking } } Function Analyze-TwitterTimeProfile([string] $range = 'month') { begin { $Hours = @{} $DaysOfWeek = @{} $Days = @{} $Months = @{} $Years = @{} [PSObject[]] $ranking = @() $DAY_OF_WEEK = 0 $MONTH = 1 $DAY = 2 $HOUR = 3 $YEAR = 5 } process { $post = $_ $CreationDate = $post.created_at.Split(" ") $CurrentDayOfWeek = $CreationDate[$DAY_OF_WEEK] $CurrentDay = $CreationDate[$DAY] $CurrentMonth = $CreationDate[$MONTH] $CurrentYear = $CreationDate[$YEAR] $CurrentHour = $CreationDate[$HOUR].Split(":")[0] switch ($range.ToLower()) { "hour" { if ($Hours.ContainsKey("$CurrentHour")) { $Hours["$CurrentHour"] = $Hours["$CurrentHour"] + 1 } else { $Hours.Add("$CurrentHour", 1) } } "DayOfWeek" { if ($DaysOfWeek.ContainsKey("$CurrentDayOfWeek")) { $DaysOfWeek["$CurrentDayOfWeek"] = $DaysOfWeek["$CurrentDayOfWeek"] + 1 } else { $DaysOfWeek.Add("$CurrentDayOfWeek", 1) } } "day" { if ($Days.ContainsKey("$CurrentDay")) { $Days["$CurrentDay"] = $Days["$CurrentDay"] + 1 } else { $Days.Add("$CurrentDay", 1) } } "month" { if ($Months.ContainsKey("$CurrentMonth")) { $Months["$CurrentMonth"] = $Months["$CurrentMonth"] + 1 } else { $Months.Add("$CurrentMonth", 1) } } "year" { if ($Years.ContainsKey("$CurrentYear")) { $Years["$CurrentYear"] = $Years["$CurrentYear"] + 1 } else { $Years.Add("$CurrentYear", 1) } } default { if ($Months.ContainsKey("$CurrentMonth")) { $Months["$CurrentMonth"] = $Months["$CurrentMonth"] + 1 } else { $Months.Add("$CurrentMonth", 1) } } } } end { switch ($range.ToLower()) { "hour" { $Hours.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Hour = $_ Count = $Hours.$_ } } } "DayOfWeek" { $DaysOfWeek.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ DayOfWeek = $_ Count = $DaysOfWeek.$_ } } } "day" { $Days.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Day = $_ Count = $Days.$_ } } } "month" { $Months.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Month = $_ Count = $Months.$_ } } } "year" { $Years.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Year = $_ Count = $Years.$_ } } } default { $Months.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Month = $_ Count = $Months.$_ } } } } return $ranking } } Function Analyze-TwitterInteractions() { begin { $Interactions = @{} [PSObject[]] $ranking = @() } process { $post = $_ $post.Interactions.screen_name | ForEach-Object { if ($Interactions.ContainsKey("$_")) { $Interactions["$_"] = $Interactions["$_"] + 1 } else { $Interactions.Add("$_", 1) } } } end { $Interactions.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ User = $_ Count = $Interactions.$_ } } return $ranking } } Function Analyze-TwitterLocations() { begin { $Locations = @{} [PSObject[]] $ranking = @() } process { $post = $_ if ($post.Connections.location -eq $null) {$LocationInfo = $post.location} else {$LocationInfo = $post.Connections.location} $LocationInfo | ForEach-Object { if ($Locations.ContainsKey("$_")) { $Locations["$_"] = $Locations["$_"] + 1 } else { $Locations.Add("$_", 1) } } } end { $Locations.keys | ForEach-Object { $ranking += New-Object PSObject -Property @{ Location = $_ Count = $Locations.$_ } } return $ranking } } Function Rebuild-TwitterTimeLine([PSObject[]] $from) { [PSObject[]] $TimeLine = @() $TimeToWait = 6 $i = 1 $ExecutionTime = [Diagnostics.Stopwatch]::StartNew() $from | ForEach-Object { if ($SourceSchema.count -eq 0) { $SourceSchema = $_ | Get-Member -MemberType NoteProperty | ForEach-Object {$_.Name } $PropertyName = GetMatchesInCollection "PermaLink" $SourceSchema } $ExecutionTime.Stop() Write-Progress -Activity "Retrieving tweets ..." -Status "Progress: $i / $($from.Count) - ETC: $('{0:#0.00}' -f (($from.Count - $i) * $ExecutionTime.Elapsed.TotalMinutes)) minutes - Time Elapsed: $('{0:#0.00}' -f (($i - 1) * $ExecutionTime.Elapsed.TotalMinutes)) minutes" -PercentComplete (($i / $from.Count) * 100) $ExecutionTime = [Diagnostics.Stopwatch]::StartNew() if ($_.$PropertyName -match "twitter.com") { $TimeLine += Get-RawTweetAsJson $_.$PropertyName | ConvertFrom-Json Start-Sleep -Seconds $TimeToWait } else { Write-Host -foregroundcolor $COLOR_BRIGHT " INFO: Skipping non-Twitter post: $($_.$PropertyName)"} $i++ } return $TimeLine } Function Get-TwitterSearch{ param( [string] $query, [int] $results = 20, [string] $language = "", [string] $type = "mixed", [string] $StartDate = "", [string] $GeoCode = "" ) # Get-TwitterSearch -query "#cloud" -results 250 # $DebugPreference = "Continue" [PSObject[]] $tweets = @() $TwitterMaxResults = 100 $SecondsToWait = 6 [int64] $MaxId = 0 if (($type -ne "recent") -and ($type -ne "popular")) {$type = "mixed" } if (-not (($StartDate -ne "") -and ($StartDate -match "\\d{4}-\\d{2}-\\d{2}"))) {$StartDate = "" } if (-not (($GeoCode -ne "") -and ($GeoCode -match "(\\-*[\\d\\.]+),(\\-*[\\d\\.]+),(\\d+)(km|mi)"))) {$GeoCode = "" } if (-not (($language -ne "") -and ($language -match "\\w{2}"))) {$language = "" } if ($results -lt $TwitterMaxResults) {$tweets = (Get-RawTwitterSearchAsJson -query $query -ResultsPerPage $results -Language $language -ResultType $type -StartDate $StartDate -GeoCode $GeoCode).statuses | ConvertFrom-Json } else { $MaxId = 0 $ExecutionTime = [Diagnostics.Stopwatch]::StartNew() do { $ExecutionTime.Stop() Write-Progress -Activity "Retrieving Tweets ..." -Status "Progress: $($tweets.Count) / $results - ETC: $('{0:#0.00}' -f (($results - $($tweets.Count)) * $ExecutionTime.Elapsed.TotalMinutes)) minutes - Time Elapsed: $('{0:#0.00}' -f (($($tweets.Count) - 1) * $ExecutionTime.Elapsed.TotalMinutes)) minutes" -PercentComplete (($($tweets.Count) / $results) * 100) $ExecutionTime = [Diagnostics.Stopwatch]::StartNew() if ($MaxId -eq 0) {$CurrentTweets = Get-RawTwitterSearchAsJson -query $query -ResultsPerPage $TwitterMaxResults -Language $language -ResultType $type -StartDate $StartDate -GeoCode $GeoCode | ConvertFrom-Json} else { $CurrentTweets = Get-RawTwitterSearchAsJson -query $query -ResultsPerPage $TwitterMaxResults -Language $language -ResultType $type -StartDate $StartDate -GeoCode $GeoCode -MaxId ($MaxId - 1) | ConvertFrom-Json if ($CurrentTweets.statuses.count -eq 0) {break} } Write-Debug "[INFO] Retrieved Tweets: $($tweets.Count)" Write-Debug "[INFO] CurrentTweets count: $($CurrentTweets.statuses.Count)" Write-Debug "[INFO] CurrentTweets metadata count: $($CurrentTweets.search_metadata.count)" Write-Debug "[INFO] MaxId: $MaxId" $MaxId = $CurrentTweets.search_metadata.max_id $tweets += $CurrentTweets.statuses Start-Sleep -Seconds $SecondsToWait } until ($tweets.Count -gt $results) if ($tweets.count -gt $results) { $tweets = $tweets[0..($results - 1)] } } return $tweets # $DebugPreference = "SilentlyContinue" }
combined_dataset/train/non-malicious/3501.ps1
3501.ps1
function Test-NewAzureRmSearchService { $rgname = getAssetName $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $svcName = $rgname + "-service" $sku = "Standard" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode Assert-NotNull $newSearchService Assert-AreEqual $svcName $newSearchService.Name Assert-AreEqual $sku $newSearchService.Sku Assert-AreEqual $loc $newSearchService.Location Assert-AreEqual $partitionCount $newSearchService.PartitionCount Assert-AreEqual $replicaCount $newSearchService.ReplicaCount Assert-AreEqual $hostingMode $newSearchService.HostingMode } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmSearchServiceBasic { $rgname = getAssetName $rgname = $rgname $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $svcName = $rgname + "-service" $sku = "Basic" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode Assert-NotNull $newSearchService Assert-AreEqual $svcName $newSearchService.Name Assert-AreEqual $sku $newSearchService.Sku Assert-AreEqual $loc $newSearchService.Location Assert-AreEqual $partitionCount $newSearchService.PartitionCount Assert-AreEqual $replicaCount $newSearchService.ReplicaCount Assert-AreEqual $hostingMode $newSearchService.HostingMode } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmSearchServiceL1 { $rgname = getAssetName $rgname = $rgname $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $svcName = $rgname + "-service" $sku = "Storage_Optimized_L1" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode Assert-NotNull $newSearchService Assert-AreEqual $svcName $newSearchService.Name Assert-AreEqual $sku $newSearchService.Sku Assert-AreEqual $loc $newSearchService.Location Assert-AreEqual $partitionCount $newSearchService.PartitionCount Assert-AreEqual $replicaCount $newSearchService.ReplicaCount Assert-AreEqual $hostingMode $newSearchService.HostingMode } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureRmSearchService { $rgname = getAssetName $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $svcName = $rgname + "-service" $sku = "Standard" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc $retrievedSearchService1 = Get-AzSearchService -ResourceGroupName $rgname -Name $svcName $retrievedSearchService2 = Get-AzSearchService -ResourceId $newSearchService.Id Assert-NotNull $retrievedSearchService1 Assert-NotNull $retrievedSearchService2 Assert-AreEqual $newSearchService.Name $retrievedSearchService1.Name Assert-AreEqual $newSearchService.Name $retrievedSearchService2.Name Assert-AreEqual $newSearchService.Location $retrievedSearchService1.Location Assert-AreEqual $newSearchService.Location $retrievedSearchService2.Location Assert-AreEqual $sku $newSearchService.Sku Assert-AreEqual $newSearchService.Sku $retrievedSearchService1.Sku Assert-AreEqual $newSearchService.Sku $retrievedSearchService2.Sku $svcName2 = $rgname + "-service2" $newSearchService2 = New-AzSearchService -ResourceGroupName $rgname -Name $svcName2 -Sku $sku -Location $loc $allSearchServices = Get-AzSearchService -ResourceGroupName $rgname Assert-AreEqual 2 $allSearchServices.Count } finally { Clean-ResourceGroup $rgname } } function Test-RemoveAzureRmSearchService { $rgname = getAssetName $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $sku = "Standard" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service1") -Sku $sku -Location $loc $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-NotNull $retrievedSvc $retrievedSvc | Remove-AzSearchService -Force $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-Null $retrievedSvc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service2") -Sku $sku -Location $loc $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-NotNull $retrievedSvc Remove-AzSearchService -ResourceId $retrievedSvc.Id -Force $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-Null $retrievedSvc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service3") -Sku $sku -Location $loc $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-NotNull $retrievedSvc Remove-AzSearchService -ResourceGroupName $rgname -Name $retrievedSvc.Name -Force $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-Null $retrievedSvc } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmSearchService { $rgname = getAssetName $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $sku = "Standard" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service1") -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode $newSearchService | Set-AzSearchService -PartitionCount 2 -ReplicaCount 2 $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-AreEqual 2 $retrievedSvc.PartitionCount Assert-AreEqual 2 $retrievedSvc.ReplicaCount $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service2") -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode Set-AzSearchService -ResourceId $newSearchService.Id -PartitionCount 3 -ReplicaCount 3 $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-AreEqual 3 $retrievedSvc.PartitionCount Assert-AreEqual 3 $retrievedSvc.ReplicaCount $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $($rgname + "-service3") -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode Set-AzSearchService -ResourceGroupName $rgname -Name $newSearchService.Name -PartitionCount 2 -ReplicaCount 2 $retrievedSvc = Get-AzSearchService -ResourceId $newSearchService.Id Assert-AreEqual 2 $retrievedSvc.PartitionCount Assert-AreEqual 2 $retrievedSvc.ReplicaCount } finally { Clean-ResourceGroup $rgname } } function Test-ManageAzureRmSearchServiceAdminKey { $rgname = getAssetName $svcName = $rgname + "-service" $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $sku = "Standard" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode $adminKeyPair1 = $newSearchService | Get-AzSearchAdminKeyPair $adminKeyPair2 = Get-AzSearchAdminKeyPair -ParentResourceId $newSearchService.Id $adminKeyPair3 = Get-AzSearchAdminKeyPair -ResourceGroupName $rgname -ServiceName $svcName Assert-NotNull $adminKeyPair1 Assert-NotNull $adminKeyPair2 Assert-NotNull $adminKeyPair3 Assert-AreEqual $adminKeyPair1.Primary $adminKeyPair2.Primary Assert-AreEqual $adminKeyPair2.Primary $adminKeyPair3.Primary Assert-AreEqual $adminKeyPair1.Secondary $adminKeyPair2.Secondary Assert-AreEqual $adminKeyPair2.Secondary $adminKeyPair3.Secondary $newKeyPair1 = $newSearchService | New-AzSearchAdminKey -KeyKind Primary -Force $newKeyPair2 = New-AzSearchAdminKey -ParentResourceId $newSearchService.Id -KeyKind Secondary -Force $newKeyPair3 = New-AzSearchAdminKey -ResourceGroupName $rgname -ServiceName $svcName -KeyKind Primary -Force Assert-NotNull $newKeyPair1 Assert-AreNotEqual $newKeyPair1.Primary $adminKeyPair1.Primary Assert-AreEqual $newKeyPair1.Secondary $adminKeyPair1.Secondary Assert-NotNull $newKeyPair2 Assert-AreEqual $newKeyPair2.Primary $newKeyPair1.Primary Assert-AreNotEqual $newKeyPair2.Secondary $adminKeyPair1.Secondary Assert-AreNotEqual $newKeyPair2.Primary $adminKeyPair1.Primary Assert-NotNull $newKeyPair3 Assert-AreEqual $newKeyPair3.Secondary $newKeyPair2.Secondary Assert-AreNotEqual $newKeyPair3.Secondary $adminKeyPair3.Secondary Assert-AreNotEqual $newKeyPair3.Primary $adminKeyPair3.Primary } finally { Clean-ResourceGroup $rgname } } function Test-ManageAzureRmSearchServiceQueryKey { $rgname = getAssetName $svcName = $rgname + "-service" $loc = Get-Location -providerNamespace "Microsoft.Search" -resourceType "searchServices" -preferredLocation "West US" $sku = "Standard" $partitionCount = 1 $replicaCount = 1 $hostingMode = "Default" try { New-AzResourceGroup -Name $rgname -Location $loc $newSearchService = New-AzSearchService -ResourceGroupName $rgname -Name $svcName -Sku $sku -Location $loc -PartitionCount $partitionCount -ReplicaCount $replicaCount -HostingMode $hostingMode $queryKey1 = $newSearchService | Get-AzSearchQueryKey $queryKey2 = Get-AzSearchQueryKey -ParentResourceId $newSearchService.Id $queryKey3 = Get-AzSearchQueryKey -ResourceGroupName $rgname -ServiceName $svcName Assert-NotNull $queryKey1 Assert-NotNull $queryKey2 Assert-NotNull $queryKey3 Assert-AreEqual 1 $queryKey1.Count Assert-AreEqual $queryKey1.Count $queryKey2.Count Assert-AreEqual $queryKey2.Count $queryKey3.Count Assert-AreEqual $queryKey1[0].Name $queryKey2[0].Name Assert-AreEqual $queryKey2[0].Name $queryKey3[0].Name Assert-AreEqual $queryKey1[0].Key $queryKey2[0].Key Assert-AreEqual $queryKey2[0].Key $queryKey3[0].Key $newQueryKey1 = $newSearchService | New-AzSearchQueryKey -Name "newquerykey1" $newQueryKey2 = New-AzSearchQueryKey -ParentResourceId $newSearchService.Id -Name "newquerykey2" $newQueryKey3 = New-AzSearchQueryKey -ResourceGroupName $rgname -ServiceName $svcName -Name "newquerykey3" $allKeys = Get-AzSearchQueryKey -ParentResourceId $newSearchService.Id Assert-AreEqual 4 $allKeys.Count $newSearchService | Remove-AzSearchQueryKey -KeyValue $newQueryKey1.Key -Force Remove-AzSearchQueryKey -ParentResourceId $newSearchService.Id -KeyValue $newQueryKey2.Key -Force Remove-AzSearchQueryKey -ResourceGroupName $rgname -ServiceName $svcName -KeyValue $newQueryKey3.Key -Force $allKeys = Get-AzSearchQueryKey -ParentResourceId $newSearchService.Id Assert-AreEqual 1 $allKeys.Count } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/Read-HostWithPrompt_1.ps1
Read-HostWithPrompt_1.ps1
############################################################################# ## ## Read-HostWithPrompt ## ## From Windows PowerShell Cookbook (O'Reilly) ## by Lee Holmes (http://www.leeholmes.com/guide) ## ############################################################################## <# .SYNOPSIS Read user input, with choices restricted to the list of options you provide. .EXAMPLE PS >$caption = "Please specify a task" PS >$message = "Specify a task to run" PS >$option = "&Clean Temporary Files","&Defragment Hard Drive" PS >$helptext = "Clean the temporary files from the computer", >> "Run the defragment task" >> PS >$default = 1 PS >Read-HostWithPrompt $caption $message $option $helptext $default Please specify a task Specify a task to run [C] Clean Temporary Files [D] Defragment Hard Drive [?] Help (default is "D"):? C - Clean the temporary files from the computer D - Run the defragment task [C] Clean Temporary Files [D] Defragment Hard Drive [?] Help (default is "D"):C 0 #> param( ## The caption for the prompt $Caption = $null, ## The message to display in the prompt $Message = $null, ## Options to provide in the prompt [Parameter(Mandatory = $true)] $Option, ## Any help text to provide $HelpText = $null, ## The default choice $Default = 0 ) Set-StrictMode -Version Latest ## Create the list of choices $choices = New-GenericObject ` Collections.ObjectModel.Collection ` Management.Automation.Host.ChoiceDescription ## Go through each of the options, and add them to the choice collection for($counter = 0; $counter -lt $option.Length; $counter++) { $choice = New-Object Management.Automation.Host.ChoiceDescription ` $option[$counter] if($helpText -and $helpText[$counter]) { $choice.HelpMessage = $helpText[$counter] } $choices.Add($choice) } ## Prompt for the choice, returning the item the user selected $host.UI.PromptForChoice($caption, $message, $choices, $default)
combined_dataset/train/non-malicious/2283.ps1
2283.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$false, HelpMessage="Site server where the SMS Provider is installed")] [string]$SiteServer = "CAS01", [parameter(Mandatory=$false, HelpMessage="ResourceID of the device")] [string]$ResourceID = "16777224" ) Begin { try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode } } } catch [Exception] { Throw "Unable to determine SiteCode" } $IconExtractor = @" using System; using System.Drawing; using System.Runtime.InteropServices; namespace System { public class IconExtractor { public static Icon Extract(string file, int number, bool largeIcon) { IntPtr large; IntPtr small; ExtractIconEx(file, number, out large, out small, 1); try { return Icon.FromHandle(largeIcon ? large : small); } catch { return null; } } [DllImport("Shell32.dll", EntryPoint = "ExtractIconExW", CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)] private static extern int ExtractIconEx(string sFile, int iIndex, out IntPtr piLargeVersion, out IntPtr piSmallVersion, int amountIcons); } } "@ Add-Type -AssemblyName "System.Drawing" Add-Type -AssemblyName "System.Windows.Forms" Add-Type -TypeDefinition $IconExtractor -ReferencedAssemblies "System.Drawing" } Process { function Load-Form { $Form.Controls.AddRange(@( $TreeView, $GroupBox )) $Form.Add_Shown({ Build-TreeView -ResourceID $ResourceID $Form.Activate() }) [void]$Form.ShowDialog() } function Get-CollectionName { param( [parameter(Mandatory=$true)] [string]$CollectionID ) $Collection = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "CollectionID like '$($CollectionID)'" if ($Collection -ne $null) { return $Collection.Name } } function Set-NodeCollection { param( [parameter(Mandatory=$true)] [int]$ContainerNodeID, [parameter(Mandatory=$true)] $Node ) $NodeCollections = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_ObjectContainerItem -ComputerName $SiteServer -Filter "ContainerNodeID = $($ContainerNodeID) AND ObjectType = 5000" foreach ($NodeCollection in $NodeCollections) { if ($NodeCollection.InstanceKey -in $DeviceCollectionIDs) { $CollectionName = Get-CollectionName -CollectionID $NodeCollection.InstanceKey $CollNode = $Node.Nodes.Add($CollectionName) $CollNode.ImageIndex = 2 $CollNode.Expand() $Script:ExpandNode = $true } } } function Expand-TreeNode { param( [parameter(Mandatory=$true)] $ParentNode ) do { $Node = $ParentNode.Parent.Expand() Expand-TreeNode -ParentNode $Node } until ($Node.Parent -eq $null) } function Get-SubNode { param( [parameter(Mandatory=$true)] [int]$ParentContainerNodeID, [parameter(Mandatory=$true)] $ParentNode ) $SubNodes = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "ParentContainerNodeID = $($ParentContainerNodeID) AND ObjectType = 5000" if ($SubNodes -ne $null) { foreach ($SubNode in ($SubNodes | Sort-Object -Property Name)) { $Script:ExpandNode = $false $Node = $ParentNode.Nodes.Add($SubNode.Name) $Node.ImageIndex = 1 Get-SubNode -ParentContainerNodeID $SubNode.ContainerNodeID -ParentNode $Node Set-NodeCollection -ContainerNodeID $SubNode.ContainerNodeID -Node $Node if ($Script:ExpandNode -eq $true) { $Node.Expand() } } } } function Build-TreeView { param( [parameter(Mandatory=$true)] $ResourceID ) $TreeView.Nodes.Clear() $RootNode = $TreeView.Nodes.Add("Root") $RootNode.ImageIndex = 1 $DeviceCollectionIDs = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_FullCollectionMembership -ComputerName $SiteServer -Filter "ResourceID like '$($ResourceID)'" | Select-Object -ExpandProperty CollectionID $RootNodes = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "ParentContainerNodeID = 0 AND ObjectType = 5000" foreach ($Node in ($RootNodes | Sort-Object -Property Name)) { $CurrentNode = $RootNode.Nodes.Add($Node.Name) $CurrentNode.ImageIndex = 1 Set-NodeCollection -ContainerNodeID $Node.ContainerNodeID -Node $CurrentNode Get-SubNode -ParentContainerNodeID $Node.ContainerNodeID -ParentNode $CurrentNode } $RootNode.Expand() } $Script:ExpandNode = $false $BinaryFormatter = New-Object -TypeName System.Runtime.Serialization.Formatters.Binary.BinaryFormatter $MemoryStream = New-Object -TypeName System.IO.MemoryStream (,[byte[]][System.Convert]::FromBase64String( 'AAEAAAD/////AQAAAAAAAAAMAgAAAFdTeXN0ZW0uV2luZG93cy5Gb3JtcywgVmVyc2lvbj00LjAu MC4wLCBDdWx0dXJlPW5ldXRyYWwsIFB1YmxpY0tleVRva2VuPWI3N2E1YzU2MTkzNGUwODkFAQAA ACZTeXN0ZW0uV2luZG93cy5Gb3Jtcy5JbWFnZUxpc3RTdHJlYW1lcgEAAAAERGF0YQcCAgAAAAkD AAAADwMAAABwCgAAAk1TRnQBSQFMAgEBBAEAAUABAAFAAQABEAEAARABAAT/AQkBAAj/AUIBTQE2 AQQGAAE2AQQCAAEoAwABQAMAASADAAEBAQABCAYAAQgYAAGAAgABgAMAAoABAAGAAwABgAEAAYAB AAKAAgADwAEAAcAB3AHAAQAB8AHKAaYBAAEzBQABMwEAATMBAAEzAQACMwIAAxYBAAMcAQADIgEA AykBAANVAQADTQEAA0IBAAM5AQABgAF8Af8BAAJQAf8BAAGTAQAB1gEAAf8B7AHMAQABxgHWAe8B AAHWAucBAAGQAakBrQIAAf8BMwMAAWYDAAGZAwABzAIAATMDAAIzAgABMwFmAgABMwGZAgABMwHM AgABMwH/AgABZgMAAWYBMwIAAmYCAAFmAZkCAAFmAcwCAAFmAf8CAAGZAwABmQEzAgABmQFmAgAC mQIAAZkBzAIAAZkB/wIAAcwDAAHMATMCAAHMAWYCAAHMAZkCAALMAgABzAH/AgAB/wFmAgAB/wGZ AgAB/wHMAQABMwH/AgAB/wEAATMBAAEzAQABZgEAATMBAAGZAQABMwEAAcwBAAEzAQAB/wEAAf8B MwIAAzMBAAIzAWYBAAIzAZkBAAIzAcwBAAIzAf8BAAEzAWYCAAEzAWYBMwEAATMCZgEAATMBZgGZ AQABMwFmAcwBAAEzAWYB/wEAATMBmQIAATMBmQEzAQABMwGZAWYBAAEzApkBAAEzAZkBzAEAATMB mQH/AQABMwHMAgABMwHMATMBAAEzAcwBZgEAATMBzAGZAQABMwLMAQABMwHMAf8BAAEzAf8BMwEA ATMB/wFmAQABMwH/AZkBAAEzAf8BzAEAATMC/wEAAWYDAAFmAQABMwEAAWYBAAFmAQABZgEAAZkB AAFmAQABzAEAAWYBAAH/AQABZgEzAgABZgIzAQABZgEzAWYBAAFmATMBmQEAAWYBMwHMAQABZgEz Af8BAAJmAgACZgEzAQADZgEAAmYBmQEAAmYBzAEAAWYBmQIAAWYBmQEzAQABZgGZAWYBAAFmApkB AAFmAZkBzAEAAWYBmQH/AQABZgHMAgABZgHMATMBAAFmAcwBmQEAAWYCzAEAAWYBzAH/AQABZgH/ AgABZgH/ATMBAAFmAf8BmQEAAWYB/wHMAQABzAEAAf8BAAH/AQABzAEAApkCAAGZATMBmQEAAZkB AAGZAQABmQEAAcwBAAGZAwABmQIzAQABmQEAAWYBAAGZATMBzAEAAZkBAAH/AQABmQFmAgABmQFm ATMBAAGZATMBZgEAAZkBZgGZAQABmQFmAcwBAAGZATMB/wEAApkBMwEAApkBZgEAA5kBAAKZAcwB AAKZAf8BAAGZAcwCAAGZAcwBMwEAAWYBzAFmAQABmQHMAZkBAAGZAswBAAGZAcwB/wEAAZkB/wIA AZkB/wEzAQABmQHMAWYBAAGZAf8BmQEAAZkB/wHMAQABmQL/AQABzAMAAZkBAAEzAQABzAEAAWYB AAHMAQABmQEAAcwBAAHMAQABmQEzAgABzAIzAQABzAEzAWYBAAHMATMBmQEAAcwBMwHMAQABzAEz Af8BAAHMAWYCAAHMAWYBMwEAAZkCZgEAAcwBZgGZAQABzAFmAcwBAAGZAWYB/wEAAcwBmQIAAcwB mQEzAQABzAGZAWYBAAHMApkBAAHMAZkBzAEAAcwBmQH/AQACzAIAAswBMwEAAswBZgEAAswBmQEA A8wBAALMAf8BAAHMAf8CAAHMAf8BMwEAAZkB/wFmAQABzAH/AZkBAAHMAf8BzAEAAcwC/wEAAcwB AAEzAQAB/wEAAWYBAAH/AQABmQEAAcwBMwIAAf8CMwEAAf8BMwFmAQAB/wEzAZkBAAH/ATMBzAEA Af8BMwH/AQAB/wFmAgAB/wFmATMBAAHMAmYBAAH/AWYBmQEAAf8BZgHMAQABzAFmAf8BAAH/AZkC AAH/AZkBMwEAAf8BmQFmAQAB/wKZAQAB/wGZAcwBAAH/AZkB/wEAAf8BzAIAAf8BzAEzAQAB/wHM AWYBAAH/AcwBmQEAAf8CzAEAAf8BzAH/AQAC/wEzAQABzAH/AWYBAAL/AZkBAAL/AcwBAAJmAf8B AAFmAf8BZgEAAWYC/wEAAf8CZgEAAf8BZgH/AQAC/wFmAQABIQEAAaUBAANfAQADdwEAA4YBAAOW AQADywEAA7IBAAPXAQAD3QEAA+MBAAPqAQAD8QEAA/gBAAHwAfsB/wEAAaQCoAEAA4ADAAH/AgAB /wMAAv8BAAH/AwAB/wEAAf8BAAL/AgAD//8A/wD/AP8ABQAk/wL0Bv8D9AP/DPQD/wp0BHMC/wp0 BHMC/wPsAesBbQH3Av8BBwLsAesBcgFtAfQC/wwqA/8BdAGaA3kBegd5AXMC/wF0AZoDeQF6B3kB cwL/AfcBBwGYATQBVgH3Av8BvAHvAQcBVgE5AXIB9AL/AVEBHAF0A3MFUQEqA/8BeQKaBUsFmgF0 Av8BeQyaAXQC/wHvAQcB7wJ4AZIC8QMHAXgBWAHrAfQC/wF0ApkCeQN0A1IBKgP/AXkCmgFLA1EB KgWaAXQC/wF5DJoBdAL/Ae8CBwHvAZIC7AFyAe0CBwLvAewB9AL/AZkCGgGgBJoCegF5AVID/wF5 AaABmgF5AZkCeQFRBZoBdAL/AXkBoAuaAXQC/wEHAe8C9wLtAXgBNQF4Ae8D9wHsAfQC/wGZAhoB oASaAnoBeQFSA/8BeQGgAZoCmQGgAXkBUgWaAXQC/wF5AaALmgF0Av8BBwPvAfcB7QGYAXgBmQEH A+8B7AP/AZkCGgGgBJoCegF5AVID/wGZAaABmgGZAXkBmgF5AVIFmgF0Av8BmQGgC5oBdAL/AbwD 8wG8AZIBBwHvAQcB8QLzAfIB7QP/AZkCGgGgBJoCegF5AVID/wGZAaABmgJ5AXQCUgWaAXQC/wGZ AaALmgF0Av8BvAEHAu8B9wPtAe8CBwLvAe0D/wGZARoBmgKZBnkBUgP/AZkBwwGaBHQBeQGgBJoB dAL/AZkBwwaaAaAEmgF0Av8CvAIHAvcCBwO8AgcBkgP/AZkBGgGZAxoDmgFSAXkBUgP/AZkBwwOa AqABmQWaAXQC/wGZAcMDmgKgAZkFmgF0Av8CvAHrAewCBwLzAfABvAHtAW0BBwH3A/8BmQEaAZkC 9gTDAVIBeQFSA/8BmQWgAZoCdAV5Av8BmQWgAZoCdAV5Av8BvAEHApIB7wH3ApIB7wG8Ae8BkgHv AfcD/wGZAhoC9gTDAVgBeQFSA/8BmQGaBBoBdAOaApkBmgF5Av8BeQGaBBoBdAOaApkBmgF5Av8D 9AHyAbwB8QK8Ae8B8AT0A/8BmQMaApkDeQFYAXkBUgP/ARsGeQGaAvYB1gG0AZoBmQL/AZkGeQGa AvYB1gG0AZoBeQX/AfQBvAH3ARIB7AHvAfAH/wFRARwBeQN0AVIEUQEqCf8BwwZ5AcMI/wGaBnkB mgX/AfQBvAEHAu8B9wHxB/8MUUL/AUIBTQE+BwABPgMAASgDAAFAAwABIAMAAQEBAAEBBgABARYA A///AAIACw==' )) $Form = New-Object -TypeName System.Windows.Forms.Form $Form.Size = New-Object -TypeName System.Drawing.Size(350,450) $Form.MinimumSize = New-Object -TypeName System.Drawing.Size(350,450) $Form.MaximumSize = New-Object -TypeName System.Drawing.Size([System.Int32]::MaxValue,[System.Int32]::MaxValue) $Form.SizeGripStyle = "Show" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "Collection Membership" $Form.ControlBox = $true $Form.TopMost = $true $ImageList = New-Object -TypeName System.Windows.Forms.ImageList $ImageList.ImageStream = $BinaryFormatter.Deserialize($MemoryStream) $ImageList.Images $BinaryFomatter = $null $MemoryStream = $null $TreeView = New-Object -TypeName System.Windows.Forms.TreeView $TreeView.Location = New-Object -TypeName System.Drawing.Size(20,25) $TreeView.Size = New-Object -TypeName System.Drawing.Size(290,355) $TreeView.Anchor = "Top, Left, Bottom, Right" $TreeView.ImageList = $ImageList $GroupBox = New-Object -TypeName System.Windows.Forms.GroupBox $GroupBox.Location = New-Object -TypeName System.Drawing.Size(10,5) $GroupBox.Size = New-Object -TypeName System.Drawing.Size(310,385) $GroupBox.Anchor = "Top, Left, Bottom, Right" $GroupBox.Text = "Collections" Load-Form }
combined_dataset/train/non-malicious/ConvertFrom-Property_1.ps1
ConvertFrom-Property_1.ps1
<# .SYNOPSIS Converts data from flat or single-level property files into PSObjects .DESCRIPTION Converts delimited string data into objects .PARAMETER PropertyText The text to be parsed .PARAMETER Separator The value separator string used between name=value pairs. Allows regular expressions. Defaults to "=" and is usually either "=" or ":" or ";" .PARAMETER Delimiter The property separator string used between sets of name=value pairs. Allows regular expressions. Defaults to "\\n\\s*\\n?" and is usually either "`n" or "`n`n" or "\\n\\s*\\n" .PARAMETER RecordSeparator The record separator string is used between records or sections in a text file. Defaults to "\\n\\[(.+)\\]\\s*\\n" for ini files, and is usually either "\\n\\s*\\n" or "\\n\\[(.*)\\]\\s*\\n" To support named sections or records, make sure to use a regular expression here that has a capture group defined. .EXAMPLE ConvertFrom-PropertyString config.ini Reads in an ini file (which has key=value pairs), using the default settings .EXAMPLE @" ID:3468 Type:Developer StartDate:1998-02-01 Code:SWENG3 Name:Baraka ID:11234 Type:Management StartDate:2005-05-21 Code:MGR1 Name:Jax "@ |ConvertFrom-PropertyString -sep ":" -RecordSeparator "\\r\\n\\s*\\r\\n" | Format-Table Code StartDate Name ID Type ---- --------- ---- -- ---- SWENG3 1998-02-01 Baraka 3468 Developer MGR1 2005-05-21 Jax 11234 Management Reads records from a key:value property file with records separated by blank lines. .EXAMPLE ConvertFrom-PropertyString data.txt -Separator ":" Reads in a property file which has key:value pairs .EXAMPLE Get-Content data.txt -Delimiter "`r`n`r`n" | ConvertFrom-PropertyString -Separator ";" Reads in a property file with key;value pairs, and sections separated by blank lines, and converts it to objects .EXAMPLE ConvertFrom-PropertyString data.txt -delimiter '\\r\\n\\r\\n' -Separator ";" Reads in a property file with key;value pairs, and sections separated by blank lines, and converts it to objects .EXAMPLE ConvertFrom-PropertyString data.txt -RecordSeparator "^;(.*?)\\r*\\n" -Separator ";" Reads in a property file with key:value pairs, and sections with a header that starts with the comment character ';' .NOTES v2 changes the output so that if there are multiple instances of the same key, we collect the values in an array #> #function ConvertFrom-PropertyString { [CmdletBinding(DefaultParameterSetName="Data")] param( [Parameter(Position=99, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Data")] [Alias("Data","Content")] [string]$RecordText , [Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName="File")] [Alias("PSPath","FileName")] [string]$InputFile , [Parameter()][Alias("ValueSeparator")] [String]$Separator='=' , [Parameter()][Alias("PropertySeparator")] [String]$Delimiter='(?:\\s*\\n+\\s*)+' , [Parameter()] [String]$RecordSeparator='(?:\\n|^)\\[([^\\]]+)\\]\\s*\\n' , [Parameter(ParameterSetName="Data")] [Alias("MultiRecords","MR")] [Switch]$MultipleRecords ) begin { $Splitter = New-Object System.Text.RegularExpressions.Regex ([System.String]$RecordSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } process { Write-Verbose "ParameterSet: $($PSCmdlet.ParameterSetName)" $InputData = @{} if($PSCmdlet.ParameterSetName -eq "File") { $MultipleRecords = $true $RecordText = Get-Content $InputFile -Delimiter ([char]0) } if($PsBoundParameters.ContainsKey("RecordSeparator")) { $MultipleRecords = $true } if($MultipleRecords) { $Records = $splitter.Split( $RecordText ) | ? { $_ } if($Splitter.GetGroupNumbers().Count -gt 1) { while($Records) { $key,$value,$Records = $Records $InputData.$Key += @($value) } } else { $InputData."" = $Records } } else { $InputData."" = @($RecordText) } foreach($key in $InputData.Keys) { foreach($record in $InputData.$key) { Write-Verbose "Record: $record" if($Key) { $output = @{"PSName"=$key} } elseif($InputFile) { $output = @{"PSName"=((get-item $InputFile).PSChildName)} } else{ $output = @{} } foreach($line in $record -split $Delimiter) { [string[]]$data = $line -split $Separator,2 | foreach { $_.Trim() } | where { $_ } Write-Verbose "Line: $Line | Data: $($data -join '--')" switch($data.Count) { 1 { $output.($Data[0]) += @($null) } 2 { $output.($Data[0]) += @($Data[1]) } } } foreach($key in $Output.Keys | Where { $Output.$_.Count -eq 1 } ) { $Output.$key = $Output.$key[0] } if($output.Count) { New-Object PSObject -Property $output } } } } #}
combined_dataset/train/non-malicious/721.ps1
721.ps1
function New-RsSubscription { [cmdletbinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium', DefaultParameterSetName='FileShare')] param( [string] $ReportServerUri, [System.Management.Automation.PSCredential] $Credential, $Proxy, [Alias('ReportPath','ItemPath','Path')] [Parameter(Mandatory=$True)] [string] $RsItem, [string] $Description, [ValidateSet('TimedSubscription','SnapshotUpdated')] [string] $EventType = 'TimedSubscription', [Parameter(Mandatory=$True)] [string] $Schedule, [Parameter(Mandatory=$True)] [ValidateSet('Email','FileShare')] [string] $DeliveryMethod, [Parameter(Mandatory=$True)] [ValidateSet('PDF','MHTML','IMAGE','CSV','XML','EXCELOPENXML','ATOM','PPTX','WORDOPENXML')] [string] $RenderFormat = 'PDF', [Parameter(ParameterSetName='Email',Mandatory=$True)] [string] $To, [Parameter(ParameterSetName='Email')] [string] $CC, [Parameter(ParameterSetName='Email')] [string] $BCC, [Parameter(ParameterSetName='Email')] [string] $ReplyTo, [Parameter(ParameterSetName='Email')] [switch] $ExcludeReport, [Parameter(ParameterSetName='Email',Mandatory=$True)] [string] $Subject, [Parameter(ParameterSetName='Email')] [string] $Comment, [Parameter(ParameterSetName='Email')] [switch] $ExcludeLink, [Parameter(ParameterSetName='Email')] [ValidateSet('LOW', 'NORMAL', 'HIGH')] [string] $Priority = 'NORMAL', [Alias('DestinationPath')] [Parameter(ParameterSetName='FileShare',Mandatory=$True)] [string] $FileSharePath, [Parameter(ParameterSetName='FileShare')] [System.Management.Automation.PSCredential] $FileShareCredentials, [Parameter(ParameterSetName='FileShare',Mandatory=$True)] [string] $Filename, [Parameter(ParameterSetName='FileShare')] [ValidateSet('None','Overwrite','AutoIncrement')] [string] $FileWriteMode = 'Overwrite' ) Begin { $Proxy = New-RsWebServiceProxyHelper -BoundParameters $PSBoundParameters } Process { if ([System.String]::IsNullOrEmpty($RsItem)) { throw 'No report path was specified! You need to specify -RsItem variable.' } try { Write-Verbose "Validating if target report exists..." if (((Get-RsFolderContent -Proxy $Proxy -RsFolder ((Split-Path $RsItem -Parent).Replace('\','/')) | Where-Object Path -eq $RsItem).Count) -eq 0) { Write-Warning "Can't find the report $RsItem. Skipping." Continue } $Namespace = $Proxy.GetType().NameSpace switch ($DeliveryMethod) { 'Email' { $Params = @{ TO = $To CC = $CC BCC = $BCC ReplyTo = $ReplyTo IncludeReport = (-not $ExcludeReport) IncludeLink = (-not $ExcludeLink) Subject = $Subject Comment = $Comment RenderFormat = $RenderFormat Priority = $Priority } } 'FileShare' { $Params = @{ PATH = $FileSharePath FILENAME = $Filename RENDER_FORMAT = $RenderFormat WRITEMODE = $FileWriteMode } if ($FileShareCredentials -ne $null) { $Params.USERNAME = $FileShareCredentials.UserName $Params.PASSWORD = $FileShareCredentials.GetNetworkCredential().Password $Params.DEFAULTCREDENTIALS = $false } else { $Params.DEFAULTCREDENTIALS = $true } } } $ParameterValues = @() $Params.GetEnumerator() | ForEach-Object { $ParameterValues = $ParameterValues + (New-Object "$Namespace.ParameterValue" -Property @{ Name = $_.Name; Value = $_.Value }) } $ExtensionSettings = New-Object "$Namespace.ExtensionSettings" -Property @{ Extension = "Report Server $DeliveryMethod"; ParameterValues = $ParameterValues } $MatchData = $Schedule $ReportParameters = $Null if ($PSCmdlet.ShouldProcess($RsItem, "Creating new subscription")) { Write-Verbose "Creating Subscription..." $subscriptionId = $Proxy.CreateSubscription($RsItem, $ExtensionSettings, $Description, $EventType, $MatchData, $ReportParameters) [pscustomobject]@{ NewSubscriptionId = $subscriptionId } Write-Verbose "Subscription created successfully! Generated subscriptionId: $subscriptionId" } } catch { throw (New-Object System.Exception("Exception occurred while creating subscription! $($_.Exception.Message)", $_.Exception)) } } }
combined_dataset/train/non-malicious/mklink.ps1
mklink.ps1
using System; using System.Text; using System.IO; using System.Runtime.InteropServices; namespace mklink { class mklink { [DllImport("kernel32.dll")] static extern bool CreateSymbolicLink(string lpSymlinkFileName, string lpTargetFileName, int dwFlags); static void Main(string[] args) { int dirlink = 0; int c = 0; string[] paths = new string[0]; Console.WriteLine("MKLINK - Create a symbolic or directory link. MKLINK -help for usage. Created in 2010 by James Gentile."); foreach (string a in args) { if ((System.String.Compare(a, "-help", true) == 0) || (System.String.Compare(a, "-H", true) == 0)) { Console.WriteLine("MKLINK [/D] <Symbolic Link> <file or directory source>"); return; } if (System.String.Compare(a, @"/d", true) == 0) { dirlink = 1; continue; } Array.Resize(ref paths, paths.Length + 1); paths[c] = a; c++; } if (paths.Length != 2) { Console.WriteLine("Requires a <symbolic link> and <file or directory> source."); return; } try { if (CreateSymbolicLink(paths[0], paths[1], dirlink)) Console.WriteLine("Symblic link created for " + paths[0] + " <<===>> " + paths[1]); } catch (Exception e) { Console.WriteLine("Error creating symbolic link: " + e.Message); } } } }
combined_dataset/train/non-malicious/sample_52_78.ps1
sample_52_78.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Deletes a namespace authorization rule. .Description Deletes a namespace authorization rule. .Example {{ Add code here }} .Example {{ Add code here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IRelayIdentity>: Identity Parameter [AuthorizationRuleName <String>]: The authorization rule name. [HybridConnectionName <String>]: The hybrid connection name. [Id <String>]: Resource identity path [NamespaceName <String>]: The namespace name [PrivateEndpointConnectionName <String>]: The PrivateEndpointConnection name [PrivateLinkResourceName <String>]: The PrivateLinkResource name [RelayName <String>]: The relay name. [ResourceGroupName <String>]: Name of the Resource group within the Azure subscription. [SubscriptionId <String>]: Subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. .Link https://learn.microsoft.com/powershell/module/az.relay/remove-azrelayauthorizationrule #> function Remove-AzRelayAuthorizationRule { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Delete', Mandatory)] [Parameter(ParameterSetName='Delete1', Mandatory)] [Parameter(ParameterSetName='Delete2', Mandatory)] [Alias('AuthorizationRuleName')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The authorization rule name. ${Name}, [Parameter(ParameterSetName='Delete', Mandatory)] [Parameter(ParameterSetName='Delete1', Mandatory)] [Parameter(ParameterSetName='Delete2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The namespace name ${Namespace}, [Parameter(ParameterSetName='Delete', Mandatory)] [Parameter(ParameterSetName='Delete1', Mandatory)] [Parameter(ParameterSetName='Delete2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # Name of the Resource group within the Azure subscription. ${ResourceGroupName}, [Parameter(ParameterSetName='Delete')] [Parameter(ParameterSetName='Delete1')] [Parameter(ParameterSetName='Delete2')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # Subscription credentials which uniquely identify the Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(ParameterSetName='Delete1', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The hybrid connection name. ${HybridConnection}, [Parameter(ParameterSetName='Delete2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The relay name. ${WcfRelay}, [Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if (('Delete', 'Delete1', 'Delete2') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } $parameterSet = $PSCmdlet.ParameterSetName if ($parameterSet -eq 'Delete') { Az.Relay.private\Remove-AzRelayAuthorizationRule_Delete @PSBoundParameters } if ($parameterSet -eq 'Delete1') { Az.Relay.private\Remove-AzRelayAuthorizationRule_Delete1 @PSBoundParameters } if ($parameterSet -eq 'Delete2') { Az.Relay.private\Remove-AzRelayAuthorizationRule_Delete2 @PSBoundParameters } if ($parameterSet -eq 'DeleteViaIdentity') { if ($InputObject.Id -ilike '*hybridConnections*') { Az.Relay.private\Remove-AzRelayAuthorizationRule_DeleteViaIdentity1 @PSBoundParameters } elseif ($InputObject.Id -ilike '*wcfRelays*') { Az.Relay.private\Remove-AzRelayAuthorizationRule_DeleteViaIdentity2 @PSBoundParameters } else { Az.Relay.private\Remove-AzRelayAuthorizationRule_DeleteViaIdentity @PSBoundParameters } } } catch { throw } } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB95QPAAGJ3Y9kh # PMKcJ6fSokT8MWzZok5qSso4BR0Z1aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkZyim4IrJxhuz+puOz0lKt # l6wYrcsvwKwLtBa2hsnWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhOJpdsDfpn8dbniA/ywyq4ggj2HH0r76XYf6mC4m43dRJE0Ae0msYefU # 3C5kKowpZSpeHDen7tso8g6Svu9bAGmPSvCnHsaUY+QQSnThf1z7YI1/tOBVJ9gB # SKBGkVHcrOkYlaVEfbssHT1hVg+8tQINpn9CE+TeuWM9bPyzwvljuK2+s8WD6O7w # 1iOx7SRMrqlCty/1KIdWZbOJUnDuRpj5IxpPPu1xlSLe8ibXXFI7bG/c3H/QV3sF # i2JmvJ1pMJxXLECPj/j9KzLdwGIcnvV4yjhKneeoseGPexYdXZG2wJ1KBoN2MvVZ # czB5XqLWWBFMFOezrMiOKJ5OD6RNpKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAM8Gppg+oyqF8D/IJKQ4b+d6ZzgBYBaFmiB7bm1LWuwAIGZhgdT/UX # GBMyMDI0MDQyMzEzMTUxMS45OTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dHEjzAiGA8yMDI0MDQyMzA1MjQz # MVoYDzIwMjQwNDI0MDUyNDMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp0cSP # AgEAMAcCAQACAgHvMAcCAQACAhMVMAoCBQDp0xYPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAH5nR6bjBMgAFWKW1b/lYZ8ns1USd9OrwFGO8CX1+QbLybQK # U2xx7Op/dHp5bkpiEko5Xo7Bi8U6lw0+7HbdzitpMl8DiORCL2J0ZTXlO71dyQ/p # t0DFsi4dNTfF1IIRZymxccGfIQgcsb9D6wMy8YBZvhdO7nWQiNI6w3KXI1ACkZVZ # Y1KDzqAYo3i3ACb74aDZUnmPh9h9Ttmm+sXjRVIrO0BkL8nsQ/ZNR5m183BI10gW # STzS+bH0WpArCvBY5qb7slTvMOBfp/07LwWyQ5QlEC1Uv1/FdSPudicLnF5BKXMi # Amn1emixMTnYAUhg7hK+6lnMBhlr0mYMqkFQNa0xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBwbGjWALAlQs4niRyr8pGDlTi9oSqWNeJWy1FBrPFySDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgYeN1jrveaiQ/GOoPV9CAFdRUaoVl # B5V8/kbyKJQ+4sgwDQYJKoZIhvcNAQELBQAEggIAUbMF+8qKxhBAO64GgW9+coaB # uQqzjagdUAF16obFvWk7dVsqjCd1Li+ZUlVd+gSnHZORlRFIgPcgoi+g/uUsAJYY # CvKyuIr/EZtAzZYMzJ+sfa9mocP6khOxW+P/ILtAjyx3SH7K2RN/XwREU5fEWfbj # H7Qg+1p0ZSCrXCpeC2lTzl0WHn1K+BQc/5zjEMP27BA4EPghxCQ79KFLlTyJqJmz # cP6TdjGzGnNoPCnjPVipT5Ndw2q+Sx03CDVc8C8gljH4AhGJlxHomEoM/dw6Yge1 # IploQcEy4lRo7W4oo2OsWueW5uQ/Gu3ZqdELr3141QkKCeXE0K+m84LBOZz9P9pj # tHu1RgDDzbkmAbgquvcvaw/jSB7yThtL0KlpxSETXPjl6/7CBwaZWDsRalPGjAgL # aps/0vdnEnInjEVDkxVw87c4n6WWofET330e5iB5BE5z6Jf8dUIR7waxi5gxDv+U # 6obVSZz4U5ae0xHyOVimOtDP7MQgmk+GR1MtFgIcK+WRfSfEn1dZtZG1pX3lZg05 # v15Dwh77BL+KPaaqbQJm5aTVr44W2sCxXrqFwkpXYcPET/MhkJ6Wn1wvgG9f7Lmi # ZN2gEqFF+DhkRWj/X5Xq4QJa3WdoEALnzEny3sfKIfjHy/5qATg/Caz4cGw1URTd # hNBxF9iZiTK9lWb93ns= # SIG # End signature block
combined_dataset/train/non-malicious/2921.ps1
2921.ps1
task default -depends test task test { Push-Location 'legacy_and_default_build_file' $result = invoke-psake -Docs | Out-String -Width 120 Pop-Location Assert ($result -match 'adefaulttask') 'Default build file should a task called adefaulttask' }
combined_dataset/train/non-malicious/Prompt _for ISE_.ps1
Prompt _for ISE_.ps1
# just to know which file is invoked by my profile write-host "loaded . $($MyInvocation.MyCommand.Path)" if(!$global:WindowTitlePrefix) { # But if you're running "elevated" on vista, we want to show that ... if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( [Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { ##$Isadmin = $True $global:WindowTitlePrefix = "PoSh V2 (CTP3) (ADMIN)" #(get-host).UI.RawUI.Backgroundcolor="DarkRed" $psise.options.CommandPaneBackground = 'pink' clear-host } else { ##$Isadmin = $False $global:WindowTitlePrefix = "PoSh V2 (CTP3)" } } function prompt { # FIRST, make a note if there was an error in the previous command $err = !$? # Make sure Windows and .Net know where we are (they can only handle the FileSystem) [Environment]::CurrentDirectory = (Get-Location -PSProvider FileSystem).ProviderPath # Also, put the path in the title ... (don't restrict this to the FileSystem $Host.UI.RawUI.WindowTitle = "{0} - {1}/{2}@{3}" -f $global:WindowTitlePrefix, $env:USERDOMAIN, $env:USERNAME, $env:COMPUTERNAME # Determine what nesting level we are at (if any) $Nesting = "$([char]0xB7)" * $NestedPromptLevel # Generate PUSHD(push-location) Stack level string $Stack = "+" * (Get-Location -Stack).count # my New-Script and Get-PerformanceHistory functions use history IDs # So, put the ID of the command in, so we can get/invoke-history easier # eg: "r 4" will re-run the command that has [4]: in the prompt $nextCommandId = (Get-History -count 1).Id + 1 # Output prompt string # If there's an error, set the prompt foreground to "Red", otherwise, "DarkBlue" if($err) { $fg = "Red" } else { $fg = "DarkBlue" } # Notice: no angle brackets, makes it easy to paste my buffer to the web Write-Host "[${Nesting}${nextCommandId}${Stack}]" -NoNewLine -Fore $fg # "{0} - {1}/{2}@{3} {4} ({5})`n" -f $global:WindowTitlePrefix, $env:USERDOMAIN, $env:USERNAME, $env:COMPUTERNAME, $pwd.Path, $pwd.Provider.Name "{0} ({1})`n" -f $pwd.Path, $pwd.Provider.Name }
combined_dataset/train/non-malicious/Get-ComputerSession.ps1
Get-ComputerSession.ps1
Function Get-ComputerSession { <# .SYNOPSIS Retrieves all user sessions from local or remote server/s .DESCRIPTION Retrieves all user sessions from local or remote server/s. Requires query.exe in order to run properly. .PARAMETER computer Name of computer/s to run session query against. .NOTES Name: Get-ComputerSession Author: Boe Prox DateCreated: 01Nov2010 .LINK https://boeprox.wordpress.org .EXAMPLE Get-ComputerSessions -computer "server1" Description ----------- This command will query all current user sessions on 'server1'. #> [cmdletbinding( DefaultParameterSetName = 'session', ConfirmImpact = 'low' )] Param( [Parameter( Mandatory = $True, Position = 0, ValueFromPipeline = $True)] [string[]]$computer ) Begin { $report = @() } Process { ForEach($c in $computer) { # Parse 'query session' and store in $sessions: $sessions = query session /server:$c 1..($sessions.count -1) | % { $temp = "" | Select Computer,SessionName, Username, Id, State, Type, Device $temp.Computer = $c $temp.SessionName = $sessions[$_].Substring(1,18).Trim() $temp.Username = $sessions[$_].Substring(19,20).Trim() $temp.Id = $sessions[$_].Substring(39,9).Trim() $temp.State = $sessions[$_].Substring(48,8).Trim() $temp.Type = $sessions[$_].Substring(56,12).Trim() $temp.Device = $sessions[$_].Substring(68).Trim() $report += $temp } } } End { $report } }
combined_dataset/train/non-malicious/2243.ps1
2243.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [ValidateSet("Save","Revert")] [string]$Mode ) Begin { try { $TSEnvironment = New-Object -ComObject Microsoft.SMS.TSEnvironment -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "Unable to construct Microsoft.SMS.TSEnvironment object" ; exit 1 } } Process { function Write-CMLogEntry { param( [parameter(Mandatory=$true, HelpMessage="Value added to the smsts.log file.")] [ValidateNotNullOrEmpty()] [string]$Value, [parameter(Mandatory=$true, HelpMessage="Severity for the log entry. 1 for Informational, 2 for Warning and 3 for Error.")] [ValidateNotNullOrEmpty()] [ValidateSet("1", "2", "3")] [string]$Severity, [parameter(Mandatory=$false, HelpMessage="Name of the log file that the entry will written to.")] [ValidateNotNullOrEmpty()] [string]$FileName = "SaveTPMOwnerPassword.log" ) $LogFilePath = Join-Path -Path $Script:TSEnvironment.Value("_SMSTSLogPath") -ChildPath $FileName $Time = -join @((Get-Date -Format "HH:mm:ss.fff"), "+", (Get-WmiObject -Class Win32_TimeZone | Select-Object -ExpandProperty Bias)) $Date = (Get-Date -Format "MM-dd-yyyy") $Context = $([System.Security.Principal.WindowsIdentity]::GetCurrent().Name) $LogText = "<![LOG[$($Value)]LOG]!><time=""$($Time)"" date=""$($Date)"" component=""SaveTPMOwnerPassword"" context=""$($Context)"" type=""$($Severity)"" thread=""$($PID)"" file="""">" try { Add-Content -Value $LogText -LiteralPath $LogFilePath -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "Unable to append log entry to SaveTPMOwnerPassword.log file" } } function Test-RegistryValue { param( [parameter(Mandatory=$true, HelpMessage="Path to key where value to test exists")] [ValidateNotNullOrEmpty()] [string]$Path, [parameter(Mandatory=$true, HelpMessage="Name of the value")] [ValidateNotNullOrEmpty()] [string]$Name ) try { $Existence = Get-ItemProperty -Path $Path | Select-Object -ExpandProperty $Name -ErrorAction Stop if ($Existence -ne $null) { return $true } } catch [System.Exception] { return $false } } Write-CMLogEntry -Value "Invoking TPM Owner Password control" -Severity 1 switch ($Mode) { "Save" { $OAFTSVariable = $TSEnvironment.Value("_OSDOAF") if ($OAFTSVariable -ne $null) { try { New-ItemProperty -Path "HKLM:\SYSTEM\ControlSet001\Services\TPM\WMI\Admin" -Name OwnerAuthFull -Value "$($OAFTSVariable)" -Force -ErrorAction Stop Write-CMLogEntry -Value "Successfully set OwnerAuthFull value with TPM Owner Password" -Severity 1 } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when attempting to create the OwnerAuthFull value in the registry. Error message: $($_.Exception.Message)" -Severity 3 } try { $TPMKeyPath = "HKLM:\Software\Policies\Microsoft\TPM" if (Test-Path -Path $TPMKeyPath) { New-Item -Path $TPMKeyPath -Force -ErrorAction Stop } Write-CMLogEntry -Value "Successfully validated TPM key location" -Severity 1 } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when attempting to create the TPM key in the registry. Error message: $($_.Exception.Message)" -Severity 3 } try { New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\TPM" -Name OSManagedAuthLevel -Value 4 -Force -ErrorAction Stop Write-CMLogEntry -Value "Successfully set OSManagedAuthLevel value with data value of 4 (old TPM Owner Password behavior)" -Severity 1 } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when attempting to create the OSManagedAuthLevel value in the registry. Error message: $($_.Exception.Message)" -Severity 3 } } } "Revert" { try { New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\TPM" -Name OSManagedAuthLevel -Value 2 -Force -ErrorAction Stop Write-CMLogEntry -Value "Successfully reverted OSManagedAuthLevel value with data value of 2 (new TPM Owner Password behavior)" -Severity 1 } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when attempting to revert the OSManagedAuthLevel value in the registry. Error message: $($_.Exception.Message)" -Severity 3 } try { $TPMOwnerAuthPath = "HKLM:\SYSTEM\ControlSet001\Services\TPM\WMI\Admin" if (Test-RegistryValue -Path $TPMOwnerAuthPath -Name OwnerAuthFull) { Remove-ItemProperty -Path $TPMOwnerAuthPath -Name OwnerAuthFull -Force -ErrorAction Stop Write-CMLogEntry -Value "Successfully removed OwnerAuthFull value from registry" -Severity 1 } } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when attempting to remove the OwnerAuthFull value in the registry. Error message: $($_.Exception.Message)" -Severity 3 } } } }
combined_dataset/train/non-malicious/2418.ps1
2418.ps1
Function Get-SccmClientLog ($ComputerName,$LogName) { try { Write-Debug "Initiating the $($MyInvocation.MyCommand.Name) function..."; $output_properties = @{'ComputerName'=$ComputerName;'Log'=$LogName} if ($LogName -ne 'setup') { $sPath = "\\$ComputerName\admin$\ccmlogs"; $aLogData = @(); $aDir = Get-ChildItem $sPath | where { !$_.PsIsContainer }; foreach ($sLog in $aDir) { if ($sLog -match $LogName) { $aLogData += Get-Content "$sPath\$sLog"; } } if ($LogName -eq 'smsts') { if (Test-Path "$sPath\SMSTSLog\smsts.log") { $aLogData += Get-Content "$sPath\SMSTSLog\smsts.log"; } } if ($LogName -eq 'smsts') { $log_data = Format-SccmClientLogData $aLogData | Format-SccmClientSmsTsLog; $output_properties.Add('LogData',$log_data) New-Object –TypeName PSObject –Prop $output_properties } else { $log_data = Format-SccmClientLogData $aLogData; $output_properties.Add('LogData',$log_data) New-Object –TypeName PSObject –Prop $output_properties } } else { $sPath = "\\$ComputerName\admin$\ccmsetup\logs"; $aLogData = Get-Content "$sPath\ccmsetup.log"; $log_data = Format-SccmClientLogData $aLogData; $output_properties.Add('LogData',$log_data) New-Object –TypeName PSObject –Prop $output_properties } } catch [System.Exception] { Write-Warning "$($MyInvocation.MyCommand.Name): $($_.Exception.Message)"; return $false; } } Filter Format-SccmClientLogData ($aLogData) { try { Write-Debug "Initiating the $($MyInvocation.MyCommand.Name) function..."; $aFilteredLog = @(); foreach ($sLine in $aLogData) { $reLine = ([regex]'<time="(.+)" date="(.+)" component').matches($sLine); foreach ($oLine in $reLine) { $aSplit = ($oLine.Groups[2].Value).Split('.'); [datetime]$sDateTime = "$($oLine.Groups[3].Value) $($aSplit[0])"; $oLog = New-Object System.Object; $oLog | Add-Member -type NoteProperty -name DateTime -value $sDateTime; $oLog | Add-Member -type NoteProperty -name Message -value $oLine.Groups[1].Value; $oLog = $oLog | Sort-Object 'DateTime' $oLog; } } } catch [System.Exception] { Write-Debug "$($MyInvocation.MyCommand.Name): $($_.Exception.Message)"; return $false; } } Filter Format-SccmClientSmsTsLog ($oTsLogLine) { try { Write-Debug "Initiating the $($MyInvocation.MyCommand.Name) function..."; $aInterestingLines = @('Successfully complete the action', 'The action (', 'System shutdown request is received', 'Waiting for installation job to complete', 'Installing software for PackageID', 'Successfully connected to', 'Installation completed with exit code', 'The condition for the action', 'The group (', 'Task Sequence Manager ServiceMain finished execution', 'Waiting for CcmExec service to be fully operational', 'Waiting for job status notification'); $aInterestingData = @(); foreach ($sLine in $aInterestingLines) { if ($oTsLogLine.Message -like "$sLine*") { $oLog = New-Object System.Object; $oLog | Add-Member -type NoteProperty -name DateTime -value $oTsLogLine.DateTime; $oLog | Add-Member -type NoteProperty -name Message -value $oTsLogLine.Message; if ($oTsLogLine.Message -like '*Error*') { $oLog | Add-Member -type NoteProperty -name LineResult -value 'Red'; } else { $oLog | Add-Member -type NoteProperty -name LineResult -value 'Green'; } $oLog; } } } catch [System.Exception] { Write-Debug "$($MyInvocation.MyCommand.Name): $($_.Exception.Message)"; return $false; } }
combined_dataset/train/non-malicious/2845.ps1
2845.ps1
function CleanupEnvironment { if ($psake.context.Count -gt 0) { $currentContext = $psake.context.Peek() [System.Diagnostics.CodeAnalysis.SuppressMessage('PSUseDeclaredVarsMoreThanAssigments', '')] $env:PATH = $currentContext.originalEnvPath Set-Location $currentContext.originalDirectory $global:ErrorActionPreference = $currentContext.originalErrorActionPreference $psake.LoadedTaskModules = @{} $psake.ReferenceTasks = @{} [void] $psake.context.Pop() } }
combined_dataset/train/non-malicious/Experimental.IO 1.0.ps1
Experimental.IO 1.0.ps1
## Requires the Experimental.IO "LongPath" library from the BCL team: http://bcl.codeplex.com/ ## Compile it against .Net 3.5 (for PowerShell's sake) and place it the module folder with this psm1 if(!("Microsoft.Experimental.IO.LongPathDirectory" -as [type])) { Add-Type -Path $PSScriptRoot\\Microsoft.Experimental.IO.dll } function Get-LongPath { [CmdletBinding(DefaultParameterSetName="AllItems")] param( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true)] [string]$Path = $pwd , [Parameter(ParameterSetName="DirectoriesOnly")] [Alias("od","do")] [switch]$DirectoriesOnly , [Parameter(ParameterSetName="FilesOnly")] [Alias("of","fo")] [switch]$FilesOnly , [switch]$Recurse , [switch]$Indent ) begin { if($Recurse -and $Indent -and (Test-Path variable:script:pad)) { $script:pad += " " } else { $script:pad = "" } $null = $PSBoundParameters.Remove("Path") if($PSCmdlet.ParameterSetName -eq "FilesOnly") { Write-Verbose $Path } } process { switch($PSCmdlet.ParameterSetName) { "FilesOnly" { if($Recurse) { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateFileSystemEntries( $Path ) | %{ if( [Microsoft.Experimental.IO.LongPathDirectory]::Exists( $_ ) ) { Get-LongPath $_ @PSBoundParameters } else { $script:pad + $_ } } } else { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateFiles( $Path ) } } "DirectoriesOnly" { if($Recurse) { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateDirectories( $Path ) | %{ $script:pad + $_ + "\\" if($recurse) { Get-LongPath $_ @PSBoundParameters } } } else { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateDirectories( $Path ) } } "AllItems" { if($recurse) { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateFileSystemEntries( $Path ) | %{ if( [Microsoft.Experimental.IO.LongPathDirectory]::Exists( $_ ) ) { $script:pad + $_ + "\\" Get-LongPath $_ @PSBoundParameters } else { $script:pad + $_ } } } else { [Microsoft.Experimental.IO.LongPathDirectory]::EnumerateFileSystemEntries( $Path ) } } } } end { if($Indent) { if($script:pad.Length -gt 0) { $script:pad = $script:pad.SubString(0, $script:pad.Length - 2) } else { remove-item variable:script:pad -EA 0 } } } }
combined_dataset/train/non-malicious/sample_34_39.ps1
sample_34_39.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnP1N0u4LwBxwF # d9zywYPVxne8txtxEVOGYYLvtsP2kKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGtXwxaSFm/q6+cno4VBehNB # vmK+diKl8nUYKDwtGhdvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAU/RnO9liMF0jRywxM9lLN22HHrk334l1nKT9cRhmwFqpjsP76Yvtzvqr # Y3yYanHsqJNxDr88ddr4IhoyUMD5YAD2s+FNuBJuRl6geGZ9Q6k4muODd1XireuI # 2S3X6piklPPKZf+XnVpx2okM1TXFAqqgsMRGQLN35qGXkZRwgS/FrvUr6UZCcAfQ # GYUTeo6Pwlygh7cvRitE+Owq0VSAMR7DfbVAUg6hfP7SYLWVEH7ZAWGthP/oXmt9 # mL4Q6G0Gnnr/Q6iNsFv8UCAd1GURzfBa71luJ+BUtFoANk0r8o4ol+lXysqRII0I # dP2DjCBaCNVOdfNaBBsWhBZLdapLeKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA41kjdloAEqBWlUqIE+49nXrcyMLXNeg4lsXqL8RwhZwIGZfxjjUQh # GBMyMDI0MDQwOTIzMzYzNi45NDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6b/tmTAiGA8yMDI0MDQwOTE2Mzg0 # OVoYDzIwMjQwNDEwMTYzODQ5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpv+2Z # AgEAMAcCAQACAguuMAcCAQACAhLyMAoCBQDpwT8ZAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHTfZDbBd2Y3uT6i1ZnVNOAEKSq0RL9PWGiTvgKajWiAYHpe # 7RjMgAPfTHVMJ5P5hxK8SkMG4GWBuVzTtJ8/FcbDyN3IWmGduRUVCZGz0jQqFHwv # ManCFRc/Af/IybEC66bDWrhfsLuSSlLXhI2e+IqAI5LG57Cs9D5nRXsk8ucfrJqh # lvHGeFwXdWkVl9xk/qmsIvTVcdZwK55RS42E15nlYpaS3DbP5Z2oy4o4SAEw2zqL # I3R2Rpc0edG8lQhdcT0cfFLtIhERmYqJH8e2Mn770tNBkahwznh/3756k+A20iOI # a808+594ZPwoXrNEyUzcEEX2sK2R19DYiq+t0gcxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDGsEU7K9RbXDm0culfK6zcwTv2xkjGUB+9Lai2DHrEYDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib # t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgY0h1ZqKek6VivPD+UBOV85MMdfI3 # VSzxh5S73N4LKkgwDQYJKoZIhvcNAQELBQAEggIAKKHGHoM501/lMFgIQYu/HWEE # bu4biJDc+/pTYTfd75A3I6aYo5ApEsBON52UKQ/4o1wJ2iKs4uaprm3fTw5J+0yB # 4lAWal71OP0E65IKxk44BWW/H0d2k6I00cs/yEuMDEYliveHXV20HbTpFUR7AuCA # HqfTvr+Mtob0Q4PVvFKiAPQxm3VOCSznH0kM05lC3r7w98kfYgVNoBt7SK5J0Rbm # ctHumz7H4uGAEG3pgMGtMnTXRU8tbUZ2Sxm6lXWk1XmA1hR0NSgHDhyFmxVWEdsm # 0+tFMXuQD1ooYmshxBggb6rVRGjh8Dfz2R/Mvnaq9hi5GQiZFTOwBKNBtYDI2N4f # h8wYaRPDKsA77+G2xXQ1cALnZj37MkrHhuixB4JvaA/gTAIjFe/mOEUqGizd9cy9 # Sc8MiWBdvvm3JLPerklGFLbE+02gE8N8gIvyaEPQ6iAFgLbTcsGKsRs7UE0eAT6H # v4Jv0YUKa/Ec+lSjreo1D8Z+9KB4YBYAilMoC0dF/QWeBJVCQux/EcTXg2tSbw9K # nhKU/WdiKSybkQsgpHegOCgHYRrH3UemD3Uls2GELDbY1KrQpuLotf2mQV9qKCRa # 6QLfZgIdtn62V8FOIK3HVTXwrPupvX+qoh8XIWS501uj8SmjP/mlMvqqBF/uzGXi # pGsVqJvQn7+Ac33ljFk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_25.ps1
sample_9_25.ps1
########################################## # Set Variables ########################################## $ComputerName = $ENV:COMPUTERNAME $windir = $Env:windir $ProgFiles64 = $ENV:ProgramFiles $ProgFiles86 = ${Env:ProgramFiles(x86)} $system32 = $windir + "\system32" $SystemRoot = $Env:SystemRoot $OS = Get-CimInstance Win32_OperatingSystem ########################################## # DirectoryOutput #----------------- # Gets directory output and copies to SDP ########################################## function DirectoryOutput ($dir, $fDesc, $sDesc) { $CommandLineToExecute = "cmd.exe /c dir /s $dir > $OutputFile" RunCMD -commandToRun $CommandLineToExecute -filesToCollect $OutputFile -fileDescription $fDesc -sectionDescription $sDesc } ########################################## # CopyDeploymentFile #----------------- # Copies specified file to SDP ########################################## Function CopyDeploymentFile ($sourceFileName, $destinationFileName, $fileDescription) { if (test-path $sourceFileName) { $sourceFile = Get-Item $sourceFileName #copy the file only if it is not a 0KB file. if ($sourceFile.Length -gt 0) { $CommandLineToExecute = "cmd.exe /c copy `"$sourceFileName`" `"$destinationFileName`"" "Collecting " + $sourceFileName | WriteTo-StdOut RunCmD -commandToRun $CommandLineToExecute -sectionDescription $sectionDescription -filesToCollect $destinationFileName -fileDescription $fileDescription } } } ########################################## # query_registry #----------------- # Runs reg.exe to query the registry ########################################## function query_registry ($key) { $CommandLineToExecute = "cmd.exe /c reg.exe query $key >> $OutputFile" $Header = "Querying Registry: " + $key + ":" $Header | Out-File $OutputFile $Header | WriteTo-StdOut RunCMD -commandToRun $CommandLineToExecute } ########################################## # logCmdToExecute #----------------- # Logs $CommandLineToExecute ########################################## function logCmdToExecute() { $CommandLineToExecute | WriteTo-StdOut } ########################################## # logStart, logStop #----------------- # Adds start/finish in StdOut ########################################## function logStart() { "Start collecting " + $OutputFile | WriteTo-StdOut } function logStop() { "Stop collecting " + $OutputFile | WriteTo-StdOut } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDCGUdSP2OJCEA5 # 9gI+mK334+eLt3kCw6uj01tGCYi2TqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBRm # Cu3Mo+UpnxRJl04IyTVePoQjdfzxtLYb9AZJpqPoMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAlbC95YkKewZYURzakWIOK3jnwEWXFoLWw1Z/ # HcfgUkVr4zT7VPPfHXJI0B+D5TbeK21rtlDBgJvvSKt5f1o5atgBS94bVX1V6Q+N # Hp3z010kkuybzHFEF9lWzl3rsp4fKCNx8xhWPqI4HfDLwzU6B0eG1PoPYXGeO61X # rsrefTb4FWWOy+UMoa74/MyuAwN+NhMQYeC1g6UhjZr9MQAvA6wirSd1VYdkPn0p # D6Zavjha7AfWB9FOYKKTPm/+GSrN0h1o3wmPM1oablGB1TMGjUFVuXBsltR+mGsX # irP3+5rwwkACgLp63uF26RGFiLhRbIjlVPGwx2lTKjjeZiiDxKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDt0zI34uuK/8v7CDSmIYAZ/2z1QFoe/77D # /WeVn4ngBAIGZxpym1wRGBMyMDI0MTAyODExNDA0Mi43NzNaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAAB # AAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22 # uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKR # SOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7 # S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWX # t4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAi # nb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQ # HrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0H # dOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDH # EzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wC # bwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgR # o/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgM # GJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1 # whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDP # ag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbF # Tr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO # 1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhB # Ntu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJV # vfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedL # Qf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe7 # 6iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd0 # 71bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla # 7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQ # CTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJ # FeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAi # GA8yMDI0MTAyODA0MTQxN1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyY4ZAgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlm # EUSqsB1JFEW74Yh1oAnUZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apW # F7OLJj+IzfERluG9wFcnKZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2J # A5g0hP9oaR70WD/wOq0PR+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1v # NThkBK0cQg8uhyBgCm7AsGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHS # lmMTGuAFMVHbFFtVtBr3X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezg # K6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCALPH6e1AhSKey4JWTZIPvY55WF # MR61UBIIB5abrBKKvzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVq # fTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5Tm # SmMHedwiqAcbeNSpfnbye1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAXaGZ # gWRK9c4yWl6EdJ4zn54TE+mwf34GFBTwcggcwAeBXbPX5ASHWgSh5VTjw4ZpTXh1 # 9Aw7EYvLmJEaL9Va6dUrw2QOzS0xSH82PJ3ZpX5taxVQkhsV7J3y/XbitPTKcbQg # 86lMzTdubynCX0Q6pc2/HjmKKw2ZMWiVnXkWM+VdEXm08uNi1stAUNCVH8y8+u0Q # 3uB3QKhzZH5dv+fmJuSgXsaQ2V1cnW+q9bbKIaj5oOhCFvAkcsbSx89pwpuILpMV # Op2fO4pRGR8/bB0g3h4jMfm2dfTtmkamNPctiT/uyUKkyy7OKw6APXY50hxwbEqt # OfhB6cqFwc8A9FY/qAJpZzSueFJfSnG9y4052FbVNi8xS+biEjHIvzfqwpC2fdam # LhAweAGfkCmmf59gxppVTwx4/Tcx+1hNPqXnrfezBINXvXrz62ZrhekRNbUHkObT # LUOowy1ENWXLaPNdT6bEGgSQb4R/N2t3u1E8d3w+JsTlSF3RUlWksZsH/TVCYZIK # KIQ/JWkEDKVEjOVFXFi9J2CLZ6hSCkzyswf/i2aq4oyHMkBbeSxFcAQDdbH7GxLK # EoaE9zcy46QmjcL2f2uTfnunBpJKQi3Q1fZS5U6D5+08g9Yn3MCqo4J+WRkCUNEF # x+dGhL6kEN6VUThNvU7wVbulPMzbF82CNBKlIHU= # SIG # End signature block
combined_dataset/train/non-malicious/ConvertTo-Module_1.ps1
ConvertTo-Module_1.ps1
function ConvertTo-Module { <# .SYNOPSIS Quickly convert a .NET type's static methods into functions .DESCRIPTION Quickly convert a .NET type's static methods into functions. This function returns a PSModuleInfo, so you should pipe its output to Import-Module to use the exported functions. .PARAMETER Type The type from which to import static methods. .INPUTS System.String, System.Type .OUTPUTS PSModuleInfo .EXAMPLE ConvertTo-Module System.Math | Import-Module -Verbose .EXAMPLE [math] | ConvertTo-Module | Import-Module -Verbose #> [outputtype([psmoduleinfo])] param( [parameter( position=0, valuefrompipeline=$true, mandatory=$true)] [validatenotnull()] [type]$Type ) new-module { param($type) ($exports = $type.getmethods("static,public").Name | sort -uniq) | ` % { $func = $_ new-item "function:script:$($_)" ` -Value { # look mom! no [scriptblock]::create! @@ ($type.FullName -as [type])::$func.invoke($args) }.GetNewClosure() # capture the value of $func } export-modulemember -function $exports } -name $type.Name -ArgumentList $type }
combined_dataset/train/non-malicious/844.ps1
844.ps1
$resourceGroupName = "<Azure resource group name>" $dataFactoryName = "<Data factory name>" $dataFactoryRegion = "East US" $storageAccountName = "<Az.Storage account name>" $storageAccountKey = "<Az.Storage account key>" $sourceBlobPath = "<Azure blob container name>/<Azure blob input folder name>" $sinkBlobPath = "<Azure blob container name>/<Azure blob output folder name>" $pipelineName = "CopyPipeline" New-AzResourceGroup -Name $resourceGroupName -Location $dataFactoryRegion $df = Set-AzDataFactory -ResourceGroupName $resourceGroupName -Location $dataFactoryRegion -Name $dataFactoryName $storageLinkedServiceDefinition = @" { "name": "AzureStorageLinkedService", "properties": { "type": "AzureStorage", "typeProperties": { "connectionString": { "value": "DefaultEndpointsProtocol=https;AccountName=$storageAccountName;AccountKey=$storageAccountKey", "type": "SecureString" } } } } "@ $storageLinkedServiceDefinition | Out-File c:\StorageLinkedService.json Set-AzDataFactoryLinkedService -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "AzureStorageLinkedService" -File c:\StorageLinkedService.json $datasetDefiniton = @" { "name": "BlobDataset", "properties": { "type": "AzureBlob", "typeProperties": { "folderPath": { "value": "@{dataset().path}", "type": "Expression" } }, "linkedServiceName": { "referenceName": "AzureStorageLinkedService", "type": "LinkedServiceReference" }, "parameters": { "path": { "type": "String" } } } } "@ $datasetDefiniton | Out-File c:\BlobDataset.json Set-AzDataFactoryDataset -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "BlobDataset" -File "c:\BlobDataset.json" $pipelineDefinition = @" { "name": "$pipelineName", "properties": { "activities": [ { "name": "CopyFromBlobToBlob", "type": "Copy", "inputs": [ { "referenceName": "BlobDataset", "parameters": { "path": "@pipeline().parameters.inputPath" }, "type": "DatasetReference" } ], "outputs": [ { "referenceName": "BlobDataset", "parameters": { "path": "@pipeline().parameters.outputPath" }, "type": "DatasetReference" } ], "typeProperties": { "source": { "type": "BlobSource" }, "sink": { "type": "BlobSink" } } } ], "parameters": { "inputPath": { "type": "String" }, "outputPath": { "type": "String" } } } } "@ $pipelineDefinition | Out-File c:\CopyPipeline.json Set-AzDataFactoryPipeline -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name $pipelineName -File "c:\CopyPipeline.json" $pipelineParameters = @" { "inputPath": "$sourceBlobPath", "outputPath": "$sinkBlobPath" } "@ $pipelineParameters | Out-File c:\PipelineParameters.json $runId = Invoke-AzDataFactoryPipeline -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -PipelineName $pipelineName -ParameterFile c:\PipelineParameters.json while ($True) { $result = Get-AzDataFactoryActivityRun -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -PipelineRunId $runId -RunStartedAfter (Get-Date).AddMinutes(-30) -RunStartedBefore (Get-Date).AddMinutes(30) if (($result | Where-Object { $_.Status -eq "InProgress" } | Measure-Object).count -ne 0) { Write-Host "Pipeline run status: In Progress" -foregroundcolor "Yellow" Start-Sleep -Seconds 30 } else { Write-Host "Pipeline '$pipelineName' run finished. Result:" -foregroundcolor "Yellow" $result break } } $result = Get-AzDataFactoryActivityRun -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName ` -PipelineRunId $runId ` -RunStartedAfter (Get-Date).AddMinutes(-10) ` -RunStartedBefore (Get-Date).AddMinutes(10) ` -ErrorAction Stop $result if ($result.Status -eq "Succeeded") {` $result.Output -join "`r`n"` }` else {` $result.Error -join "`r`n"` }
combined_dataset/train/non-malicious/1778.ps1
1778.ps1
return function IsWin10OrHigher { $version = [system.environment]::osversion.version return ($version.Major -ge 10) } function RemoveTestUsers { param([string] $basename) $results = Get-LocalUser $basename* foreach ($element in $results) { Remove-LocalUser -SID $element.SID } } function RemoveTestGroups { param([string] $basename) $results = Get-LocalGroup $basename* foreach ($element in $results) { Remove-LocalGroup -SID $element.SID } } function VerifyFailingTest { param( [scriptblock] $sb, [string] $expectedFqeid ) $backupEAP = $script:ErrorActionPreference $script:ErrorActionPreference = "Stop" try { & $sb throw "Expected error: $expectedFqeid" } catch { $_.FullyQualifiedErrorId | Should Be $expectedFqeid } finally { $script:ErrorActionPreference = $backupEAP } } try { $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $IsNotSkipped = ($IsWindows -eq $true); $PSDefaultParameterValues["it:skip"] = !$IsNotSkipped Describe "Verify Expected LocalGroupMember Cmdlets are present" -Tags "CI" { It "Test command presence" { $result = Get-Command -Module Microsoft.PowerShell.LocalAccounts | ForEach-Object Name $result -contains "Add-LocalGroupMember" | Should Be $true $result -contains "Get-LocalGroupMember" | Should Be $true $result -contains "Remove-LocalGroupMember" | Should Be $true } } Describe "Validate simple Add-LocalGroupMember" -Tags @('CI', 'RequireAdminOnWindows') { BeforeEach { if ($IsNotSkipped) { $user1sid = [String](New-LocalUser TestUser1 -NoPassword).SID $group1sid = [String](New-LocalGroup TestGroup1).SID } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroup RemoveTestUsers -basename TestUser } } It "Can add local user to group by name" { Add-LocalGroupMember TestGroup1 -Member TestUser1 $result = Get-LocalGroupMember TestGroup1 $result.Name.EndsWith("TestUser1") | Should Be $true $result.SID | Should Be $user1sid } } Describe "Validate Add-LocalGroupMember cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') { BeforeAll { $OptDomainPrefix="(.+\\)?" } BeforeEach { if ($IsNotSkipped) { $user1sid = [String](New-LocalUser TestUser1 -NoPassword).SID $user2sid = [String](New-LocalUser TestUser2 -NoPassword).SID $group1sid = [String](New-LocalGroup TestGroup1).SID $group2sid = [String](New-LocalGroup TestGroup2).SID } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroup RemoveTestUsers -basename TestUser } } It "Can add user to group using SID" { Add-LocalGroupMember -SID $group1sid -Member TestUser1 $result = Get-LocalGroupMember TestGroup1 $result.Name.EndsWith("TestUser1") | Should Be $true $result.SID | Should Be $user1sid } It "Can add user to group using group object" { $groupObject = Get-LocalGroup TestGroup1 Add-LocalGroupMember -Group $groupObject -Member TestUser1 $result = Get-LocalGroupMember TestGroup1 $result.Name.EndsWith("TestUser1") | Should Be $true $result.SID | Should Be $user1sid } It "Can add user to group using pipeline" { Get-LocalUser TestUser1 | Add-LocalGroupMember -Name TestGroup1 $result = Get-LocalGroupMember TestGroup1 $result.Name.EndsWith("TestUser1") | Should Be $true $result.SID | Should Be $user1sid } It "Errors on missing group parameter value missing" { $sb = { Add-LocalGroupMember -Member TestUser1 } VerifyFailingTest $sb "AmbiguousParameterSet,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" } It "Errors on missing user parameter value missing" { $sb = { Add-LocalGroupMember TestGroup1 -Member } VerifyFailingTest $sb "MissingArgument,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" } It "Errors on adding group to group" { $sb = { Add-LocalGroupMember TestGroup1 TestGroup2 } VerifyFailingTest $sb "Internal,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" } It "Can add array of members to group" { Add-LocalGroupMember TestGroup1 -Member @("TestUser1", "TestUser2") $result = Get-LocalGroupMember TestGroup1 $result[0].Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true $result[1].Name -match ($OptDomainPrefix + "TestUser2") | Should Be $true } It "Can add array of user SIDs to group" { Add-LocalGroupMember TestGroup1 -Member @($user1sid, $user2sid) $result = Get-LocalGroupMember TestGroup1 $result[0].Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true $result[1].Name -match ($OptDomainPrefix + "TestUser2") | Should Be $true } It "Can add array of users names or SIDs to group" { Add-LocalGroupMember TestGroup1 -Member @($user1sid, "TestUser2") $result = Get-LocalGroupMember TestGroup1 $result[0].Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true $result[1].Name -match ($OptDomainPrefix + "TestUser2") | Should Be $true } It "Can add array of user names using pipeline" { @("TestUser1", "TestUser2") | Add-LocalGroupMember TestGroup1 $result = Get-LocalGroupMember TestGroup1 $result[0].Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true $result[1].Name -match ($OptDomainPrefix + "TestUser2") | Should Be $true } It "Can add array of existent and nonexistent users names to group" { $sb = { Add-LocalGroupMember TestGroup1 -Member @("TestUser1", "TestNonexistentUser", "TestUser2") } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" $result = Get-LocalGroupMember TestGroup1 $result.Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true $result.Name -match ($OptDomainPrefix + "TestUser2") | Should Be $false } It "Errors on adding user to group by name twice" { $sb = { Add-LocalGroupMember TestGroup1 -Member TestUser1 Add-LocalGroupMember TestGroup1 -Member TestUser1 } VerifyFailingTest $sb "MemberExists,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" $result = Get-LocalGroupMember TestGroup1 $result.Name.EndsWith("TestUser1") | Should Be $true $result.SID | Should Be $user1sid } It "Errors on adding nonexistent user to group" { $sb = { Add-LocalGroupMember -name TestGroup1 -Member TestNonexistentUser1 } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" } It "Errors on adding user to nonexistent group" { $sb = { Add-LocalGroupMember TestNonexistentGroup1 -Member TestUser1 -ErrorAction Stop } VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" } It "Can respond to -ErrorAction Stop" { $sb = { Add-LocalGroupMember TestGroup1 -Member @("TestUser1", "TestNonexistentUser1", "TestNonexistentUser2") -ErrorAction Stop -ErrorVariable OutputError | Out-Null } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.AddLocalGroupMemberCommand" $result = Get-LocalGroupMember TestGroup1 $result.Name -match ($OptDomainPrefix + "TestUser1") | Should Be $true } } Describe "Validate simple Get-LocalGroupMember" -Tags @('CI', 'RequireAdminOnWindows') { BeforeEach { if ($IsNotSkipped) { $user1 = New-LocalUser TestUserGet1 -NoPassword $group1 = New-LocalGroup TestGroupGet1 Add-LocalGroupMember TestGroupGet1 -Member TestUserGet1 $user1sid = [String]($user1.SID) $group1sid = [String]($group1.SID) } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroupGet RemoveTestUsers -basename TestUserGet } } It "Can get a local group member by name" { $result = Get-LocalGroupMember TestGroupGet1 $result.Name.EndsWith("TestUserGet1") | Should Be $true $result.SID | Should Be $user1sid if (IsWin10OrHigher) { $result.PrincipalSource | Should Be Local } $result.ObjectClass | Should Be User } } Describe "Validate Get-LocalGroupMember cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') { BeforeAll { $OptDomainPrefix="(.+\\)?" } BeforeEach { if ($IsNotSkipped) { $user1 = New-LocalUser TestUserGet1 -NoPassword $user2 = New-LocalUser TestUserGet2 -NoPassword $group1 = New-LocalGroup TestGroupGet1 $group2 = New-LocalGroup TestGroupGet2 Add-LocalGroupMember TestGroupGet1 -Member TestUserGet1 Add-LocalGroupMember TestGroupGet1 -Member TestUserGet2 $user1sid = [String]($user1.SID) $user2sid = [String]($user2.SID) $group1sid = [String]($group1.SID) $group2sid = [String]($group2.SID) } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroupGet RemoveTestUsers -basename TestUserGet } } It "Can get all group members by name" { $result = Get-LocalGroupMember TestGroupGet1 $result[0].Name.EndsWith("TestUserGet1") | Should Be $true $result[0].SID | Should Be $user1sid if (IsWin10OrHigher) { $result[0].PrincipalSource | Should Be Local } $result[0].ObjectClass | Should Be User $result[1].Name.EndsWith("TestUserGet2") | Should Be $true $result[1].SID | Should Be $user2sid if (IsWin10OrHigher) { $result[1].PrincipalSource | Should Be Local } $result[1].ObjectClass | Should Be User } It "Can get all group members by SID" { $result = Get-LocalGroupMember -SID $group1sid $result[0].Name.EndsWith("TestUserGet1") | Should Be $true $result[0].SID | Should Be $user1sid if (IsWin10OrHigher) { $result[0].PrincipalSource | Should Be Local } $result[0].ObjectClass | Should Be User $result[1].Name.EndsWith("TestUserGet2") | Should Be $true $result[1].SID | Should Be $user2sid if (IsWin10OrHigher) { $result[1].PrincipalSource | Should Be Local } $result[1].ObjectClass | Should Be User } It "Can get all group members by Group object" { $group = Get-LocalGroup TestGroupGet1 $result = Get-LocalGroupMember -Group $group $result[0].Name.EndsWith("TestUserGet1") | Should Be $true $result[0].SID | Should Be $user1sid if (IsWin10OrHigher) { $result[0].PrincipalSource | Should Be Local } $result[0].ObjectClass | Should Be User $result[1].Name.EndsWith("TestUserGet2") | Should Be $true $result[1].SID | Should Be $user2sid if (IsWin10OrHigher) { $result[1].PrincipalSource | Should Be Local } $result[1].ObjectClass | Should Be User } It "Can get all group members by pipeline" { $result = Get-LocalGroup TestGroupGet1 | Get-LocalGroupMember $result[0].Name.EndsWith("TestUserGet1") | Should Be $true $result[0].SID | Should Be $user1sid if (IsWin10OrHigher) { $result[0].PrincipalSource | Should Be Local } $result[0].ObjectClass | Should Be User $result[1].Name.EndsWith("TestUserGet2") | Should Be $true $result[1].SID | Should Be $user2sid if (IsWin10OrHigher) { $result[1].PrincipalSource | Should Be Local } $result[1].ObjectClass | Should Be User } It "Can get group members by wildcard" { $result = Get-LocalGroupMember TestGroupGet1 -Member TestUserGet* $result.Count -eq 2 | Should Be $true $result[0].Name -match ($OptDomainPrefix+"TestUserGet1") | Should Be $true $result[1].Name -match ($OptDomainPrefix + "TestUserGet2") | Should Be $true } It "Errors on group name being nonexistent" { $sb = { Get-LocalGroupMember NonexistentGroup } VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupMemberCommand" } It "Can get specific group member by name" { $result = Get-LocalGroupMember TestGroupGet1 -Member TestUserGet1 $result.Name.EndsWith("TestUserGet1") | Should Be $true $result.SID | Should Be $user1sid if (IsWin10OrHigher) { $result.PrincipalSource | Should Be Local } $result.ObjectClass | Should Be User } } Describe "Validate simple Remove-LocalGroupMember" -Tags @('CI', 'RequireAdminOnWindows') { BeforeEach { if ($IsNotSkipped) { $user1 = New-LocalUser TestUserRemove1 -NoPassword $group1 = New-LocalGroup TestGroupRemove1 Add-LocalGroupMember TestGroupRemove1 -Member TestUserRemove1 $user1sid = [String]($user1.SID) $group1sid = [String]($group1.SID) } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroupRemove RemoveTestUsers -basename TestUserRemove } } It "Can remove a local group member by name" { Remove-LocalGroupMember TestGroupRemove1 -Member TestUserRemove1 $result = Get-LocalGroupMember TestGroupRemove1 $result | Should Be $null } } Describe "Validate Remove-LocalGroupMember cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') { BeforeEach { if ($IsNotSkipped) { $user1 = New-LocalUser TestUserRemove1 -NoPassword $user2 = New-LocalUser TestUserRemove2 -NoPassword $group1 = New-LocalGroup TestGroupRemove1 $group2 = New-LocalGroup TestGroupRemove2 Add-LocalGroupMember TestGroupRemove1 -Member TestUserRemove1 Add-LocalGroupMember TestGroupRemove1 -Member TestUserRemove2 $user1sid = [String]($user1.SID) $user2sid = [String]($user2.SID) $group1sid = [String]($group1.SID) $group2sid = [String]($group2.SID) } } AfterEach { if ($IsNotSkipped) { RemoveTestGroups -basename TestGroupRemove RemoveTestUsers -basename TestUserRemove } } It "Can remove a group member by name" { Remove-LocalGroupMember TestGroupRemove1 -Member TestUserRemove2 $result = Get-LocalGroupMember TestGroupRemove1 $result.Name.EndsWith("TestUserRemove1") | Should Be $true } It "Can remove a group member by SID" { Remove-LocalGroupMember -SID $group1sid -Member TestUserRemove2 $result = Get-LocalGroupMember TestGroupRemove1 $result.Name.EndsWith("TestUserRemove1") | Should Be $true } It "Can remove a group member by Group object" { $group = Get-LocalGroup TestGroupRemove1 Remove-LocalGroupMember -Group $group -Member TestUserRemove2 $result = Get-LocalGroupMember TestGroupRemove1 $result.Name.EndsWith("TestUserRemove1") | Should Be $true } It "Can remove a group member by pipeline" { Get-LocalUser TestUserRemove2 | Remove-LocalGroupMember -Name TestGroupRemove1 $result = Get-LocalGroupMember TestGroupRemove1 $result.Name.EndsWith("TestUserRemove1") | Should Be $true } It "Errors on group argument missing" { $sb = { Remove-LocalGroupMember -Member TestUserRemove2 } VerifyFailingTest $sb "AmbiguousParameterSet,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Errors on member argument missing" { $sb = { Remove-LocalGroupMember TestGroupRemove1 -Member } VerifyFailingTest $sb "MissingArgument,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Errors on remove a group member not in the group" { $sb = { Remove-LocalGroupMember TestGroupRemove2 -Member TestUserRemove2 } VerifyFailingTest $sb "MemberNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Errors on remove group members by array of name" { $sb = { Remove-LocalGroupMember TestGroupRemove2 -Member TestUserRemove2 Get-LocalGroupMember TestGroupRemove1 } VerifyFailingTest $sb "MemberNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Can remove array of user names from group" { Remove-LocalGroupMember TestGroupRemove1 -Member @("TestUserRemove1", "TestUserRemove2") $result = Get-LocalGroupMember TestGroupRemove1 $result | Should Be $null } It "Can remove array of user SIDs from group" { Remove-LocalGroupMember TestGroupRemove1 -Member @($user1sid, $user2sid) $result = Get-LocalGroupMember TestGroupRemove1 $result | Should Be $null } It "Can remove array of users names or SIDs from group" { Remove-LocalGroupMember TestGroupRemove1 -Member @($user1sid, "TestUserRemove2") $result = Get-LocalGroupMember TestGroupRemove1 $result | Should Be $null } It "Can remove array of user names using pipeline" { $name1 = (Get-LocalUser "TestUserRemove1").Name $name2 = (Get-LocalUser "TestUserRemove2").Name @($name1, $name2) | Remove-LocalGroupMember TestGroupRemove1 $result = Get-LocalGroupMember TestGroupRemove1 $result | Should Be $null } It "Errors on remove nonexistent user from group" { $sb = { Remove-LocalGroupMember TestGroupRemove1 -Member TestNonexistentUser1 } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Errors on remove user from nonexistent group" { $sb = { Remove-LocalGroupMember TestNonexistentGroup1 -Member TestUserRemove1 -ErrorAction Stop } VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Can remove array of existent and nonexistent users names from group" { $sb = { Remove-LocalGroupMember TestGroupRemove1 -Member @("TestUserRemove1", "TestNonexistentUser", "TestUserRemove2") } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" $result = Get-LocalGroupMember TestGroupRemove2 $result | Should Be $null } It "Errors on remove user from nonexistent group" { $sb = { Remove-LocalGroupMember TestGroupRemove1 -Member TestGroupRemove2 -ErrorAction Stop } VerifyFailingTest $sb "MemberNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" } It "Can respond to -ErrorAction Stop" { $sb = { Remove-LocalGroupMember TestGroupRemove1 -Member @("TestUserRemove1", "TestNonexistentUser1", "TestUserRemove2") -ErrorAction Stop -ErrorVariable outError | Out-Null } VerifyFailingTest $sb "PrincipalNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupMemberCommand" $result = Get-LocalGroupMember TestGroupRemove1 2>&1 $result.Name -match ($OptDomainPrefix + "TestUserRemove2") | Should Be $true } } } finally { $global:PSDefaultParameterValues = $originalDefaultParameterValues }
combined_dataset/train/non-malicious/sample_45_76.ps1
sample_45_76.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTIDER { <# .Synopsis Lists the Intel Active Management Technology IDE redirection sessions .Description This CmdLet lists the Intel Active Management Technology (AMT) IDE redirection (IDER) sessions. .Notes Status: Status output designates whether or not the command was completed successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Get-AMTIDER ComputerName IDERSessionID IDERPath IDERState ------------ ------------- -------- --------- 192.168.1.100 1 boot.iso Disabled #> PROCESS { if (!$global:imrLib -or $AMTIDERSessions.Count -eq 0) { Write-Output "There are no open IDER sessions" return } $Results = @() ForEach ($session in $AMTIDERSessions) { $Obj = new-object psobject [Intel.Management.Redirection.IDERDeviceState]$state = new-object Intel.Management.Redirection.IDERDeviceState $output = $global:imrlib.IDERGetDeviceState($session.IDERSessionID, [ref]$state) [Intel.Management.Redirection.ClientInfo]$ci = new-object Intel.Management.Redirection.ClientInfo $output = $global:imrlib.GetClientInfo($session.IDERSessionID, [ref]$ci) $Comp = $ci.ip #Add Member to Object. Include Computer Name and Operation sucess $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name IDERSessionID -value $session.IDERSessionID $Obj | Add-Member -MemberType noteproperty -Name IDERPath -value $session.IDERPath $Obj | Add-Member -MemberType noteproperty -Name IDERState -value $state.pri_current $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBh00yPyjX38zgx # 9MqB3MsgJ9KRk9uJa9ISyhV3xuIKbKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg+1p8UygffytTPotp # C9enPwvD0Jy+LCwRN0LRuUokW6cwDQYJKoZIhvcNAQEBBQAEggGAmfiHnxr3f+wq # RCqLNHPqJDwqOPkaeTMaJmTYHc8i0/byVWCo6wDwgngcHKWqKTF9WTEcjKMlNltB # NT8lANutxZiTFInrC5iOAJgbR3GfqjuDXhqp+E93V7Zi9+IuJs2HXG+JA+TLwp5H # M4KE+JUVdOqONwuvxkPlQ2NOVDiadAWWZhin5f2YUjyskwihvPNU8j9C4vZXIbeK # JvsXjNUYuKXFHP+PxThpAsLaFe78n+SoAXlvUKPCSS/J0qXHO8DPQzD6RHJicFfT # CGRni+ykU+yZhwXdahIWsejzSUt/F74T94WH7D87/rSMrrKlBv8AlEDrITspb80c # sW94kohJXqM93TnIn0QzuDNU4hsrJgjzqE5cr805wXyNSAYhsv5mB56yibCyyWLv # 0V1R5sWJpvDW9nXBQI3tl+Iq653pXkRnKdJ2ikMD19GB6rgReikNc+0/Z+hmgAJY # m2jgIF0u8dWPgkzR3RrAvN9+437tE7PX+T2xD4BN9Z2dMyYOEynGoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIEgsUbqawuqSz8FHP7/WBdjlqfaS5gbwIaxX # epnVuye7AhR7Y2o3bR8qnyKgR2she1jCYTkqqxgPMjAyMTEwMjcxMjEwNTNaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjExMDI3MTIxMDUzWjA/BgkqhkiG9w0BCQQxMgQw8jvq5EEle7Gt # 9z07rq+ubDUEVUOfmPwEmDJjCqwCx2yTR4j+47Sq+2bO2WZNF+AXMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICAGik/LY7ih/P7b5mrtcA01Od1811NiKy7ykJ+DvM3+zVh9gp5JhI # e9DTW021akX8JGT5C194BDkjGELvN+xUZCS+KwE4iqLwOtZSFzFLYy+MvE7SM47j # g0RWyZMzNsDO7Nn28KaDkdR1OtadENhI7jKrlQC2MqscX9mbiHbd/kAu+6EBYcnt # 9hWJgDS+vy5Tu3mzBYIT6G6N2rM0mwYnBxRhuNgK35wtusSOqSojMoAq8BtLuk1V # PFkXPPrQDJiM0rp0dLSPL0THgf0Mhndph13/ZxK+8T+qf+WFsLwUD4DyMYv/u1ky # ITTzWgAwME4OZi5HLh3wUhCA0NvlaRyB5+uxDdgRIrN6VTG0zDZYoley0ufDMl1F # ugDC+yUvyeH5I7bk5brX7Y+rbviMWVotVo8CjOgM0cu+JsRKhZ36xVzcaFGilur9 # AxHdymICt+59x2M2/g1ScSzMdwUAYGXGuxxlDqCF42P6FN9kjbtLqZsXw5zAgsAj # 9tsqejgYx9DwAsVzRcODzjq0o3aM+ccASFNjzpcmOPluUrWNeXdLBltk/8wrdovL # G16Ar2sK019qcAB/JW8Ja6qUPpKMJLhrXrB7uQ03X08/YzB2pQmyZFlZfWEX2ACq # bPjzhFdqTTBpb6r7Ebzl1P+bGN0t0DKd7sqQYttFiMkXgeXTiLkM5Pxr # SIG # End signature block
combined_dataset/train/non-malicious/Get-RemoteRegistryKeyPro.ps1
Get-RemoteRegistryKeyPro.ps1
##############################################################################\n##\n## Get-RemoteRegistryKeyProperty\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nGet the value of a remote registry key property\n\n.EXAMPLE\n\nPS >$registryPath =\n "HKLM:\\software\\Microsoft\\PowerShell\\1\\ShellIds\\Microsoft.PowerShell"\nPS >Get-RemoteRegistryKeyProperty LEE-DESK $registryPath ExecutionPolicy\n\n#>\n\nparam(\n ## The computer that you wish to connect to\n [Parameter(Mandatory = $true)]\n $ComputerName,\n\n ## The path to the registry item to retrieve\n [Parameter(Mandatory = $true)]\n $Path,\n\n ## The specific property to retrieve\n $Property = "*"\n)\n\nSet-StrictMode -Version Latest\n\n## Validate and extract out the registry key\nif($path -match "^HKLM:\\\\(.*)")\n{\n $baseKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey(\n "LocalMachine", $computername)\n}\nelseif($path -match "^HKCU:\\\\(.*)")\n{\n $baseKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey(\n "CurrentUser", $computername)\n}\nelse\n{\n Write-Error ("Please specify a fully-qualified registry path " +\n "(i.e.: HKLM:\\Software) of the registry key to open.")\n return\n}\n\n## Open the key\n$key = $baseKey.OpenSubKey($matches[1])\n$returnObject = New-Object PsObject\n\n## Go through each of the properties in the key\nforeach($keyProperty in $key.GetValueNames())\n{\n ## If the property matches the search term, add it as a\n ## property to the output\n if($keyProperty -like $property)\n {\n $returnObject |\n Add-Member NoteProperty $keyProperty $key.GetValue($keyProperty)\n }\n}\n\n## Return the resulting object\n$returnObject\n\n## Close the key and base keys\n$key.Close()\n$baseKey.Close()
combined_dataset/train/non-malicious/sample_3_72.ps1
sample_3_72.ps1
ConvertFrom-StringData @' id_systemfiles_title=System Files id_systemfiles_status=Collecting System Files id_systemfilesdirectorylistings_title=System Files Directory Listings id_systemfilesdirectorylistings_status=Collecting System Files Directory Listings id_systemfilesacllistings_title=System Files ACL Listings id_systemfilesacllistings_status=Collecting System Files ACL Listings id_dcompermissions_title=DCOM Permissions id_dcompermissions_status=Collecting DCOM Permissions id_environmentvariables_title=Environment Variables id_environmentvariables_status=Collecting Environment Variables id_ipconfig_title=IPConfig id_ipconfig_status=Collecting IPConfig id_systempolicies_title=System Policies id_systempolicies_status=Collecting System Policies id_proxysettings_title=Proxy Settings id_proxysettings_status=Collecting Proxy Settings id_etllogs_title=ETL Logs id_etllogs_status=Collecting ETL Logs id_rootcertificates_title=Root Certificates id_rootcertificates_status=Collecting Root Certificates id_runningservices_title=Running Services id_runningservices_status=Collecting Running Services id_otherlogs_title=Other Logs id_otherlogs_status=Collecting Other Logs '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3Rq26OvTBcD52 # orzeRWGllCq2lvdJSTdxO5HlQFqAyaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBw+ # ricoCZSZIxSsTvnL3Jqxo/a7RHFjSVSgnlQaWNXEMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmxZ+xUkUqVIVWS/NwFW2RLUuHzYVXXquM4H8 # /1sYGKSydYc94/Gd2z+M6F454d8GO4J1v0bu2i+PH5PuQs82uJrAyUKJihTCmaFG # LP4RHW6ygJYnCdI82T356EduQ+CmuelWPmoRgDPbNcttcDMfYkKGncQ/Vmh9k3Ne # MWrrF8WTyw5qstdkmeucIyZj5QG2aXUHnePyW6YFTInXalgq9ngGX/YADJVTXtO4 # AxIkSp3c5IK1zea+tSwMFAazWVZ60ysgUeVPzIICHHSzMdgiOd9v8ZflS+E+JS9b # 0gwqkkX4T5zi5tGZa1qjlTplDvOsRa8dbkZyt5J8vOAd/j/XSaGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAvJDGWd0+kKOSmMEcaJwjiYYHUGtIMC1+S # SHqIVmBkqgIGZuto66IiGBMyMDI0MTAyODExNDA0MC40MTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgKZzcqM522l3FBq9x1Ba2q58RheWVN9erFiCsi+PaFTkwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAFN0vQT8CacdrHTsmRZv5aePx2grM1s0 # VmOBlVEKmnn4ieSlmNxAY4U9Jff2Kg23rNI015HozFGPCXhmcBOBPU64/2ecKLqt # UyKVEEYq2qk5JXeMchVSlTLNiioNSOuwBDk6e7bkoZ5w7f1xE/e+5kwB5Rq2oLpO # XGI7cSkWyLvRQSQvV7Bx7YqYCbhpP87R16BezTcpVSt2xGnIkpCD6GpEF1Yqz0go # wpaJERB7gRWQz1lkEwmMeiCW2TnEF7oKK6UJWxx7V5hjyolTWlG81R+8V37Lyjgw # IMhDk/4zm0grK8UxTVnB8SMWIfWhiHw/evX8oY6KRyhEatMiBi4wXVvGZN7WX4Sj # SvEH5KskA7ticB28azk4CbOPx4iZQM11uuVaik/pmXThMJ8Z2soF6qUl/VExxvvP # H6uoqcHoluTf238S7+fjKBcWvQRmKjp0Zw9p7h1yv8wGW3wqxgd9JPRasCl9sy5Y # D1zOMMg7USj/0L1uUm0aPJgHEFcuhjmLXfY5D0XyLXWo1sGUOA8hvH9VFdNbbXAH # 37YDA4/CW7cN8oj2neA19y1sjuU9MSLSjGERx2QmEZ20Dqe934+7Uh9108zdZBXY # B8X2CuTSBspQMId40SLZSRRvkv/CmjN2NXWkJerGxbeMWqMo7rSv+bavfO230IAK # bbLAEZiF8A1u # SIG # End signature block
combined_dataset/train/non-malicious/2467.ps1
2467.ps1
function Start-Log { [CmdletBinding()] param ( [ValidateScript({ Split-Path $_ -Parent | Test-Path })] [string]$FilePath ) try { if (!(Test-Path $FilePath)) { New-Item $FilePath -Type File | Out-Null } $global:ScriptLogFilePath = $FilePath } catch { Write-Error $_.Exception.Message } } function Write-Log { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string]$Message, [Parameter()] [ValidateSet(1, 2, 3)] [int]$LogLevel = 1 ) try { $TimeGenerated = "$(Get-Date -Format HH:mm:ss).$((Get-Date).Millisecond)+000" $Line = '<![LOG[{0}]LOG]!><time="{1}" date="{2}" component="{3}" context="" type="{4}" thread="" file="">' $LineFormat = $Message, $TimeGenerated, (Get-Date -Format MM-dd-yyyy), "$($MyInvocation.ScriptName | Split-Path -Leaf):$($MyInvocation.ScriptLineNumber)", $LogLevel $Line = $Line -f $LineFormat if (-not (Test-Path Variable:\ScriptLogFilePath)) { Write-Verbose $Message } else { Add-Content -Value $Line -Path $ScriptLogFilePath } } catch { Write-Error $_.Exception.Message } }
combined_dataset/train/non-malicious/sample_23_23.ps1
sample_23_23.ps1
# # Module manifest for module 'OCI.PSModules.Waas' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waas.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0ab649a-b33b-4925-a05c-7520554bdad9' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waas Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waas.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaasAccessRulesList', 'Get-OCIWaasAddressList', 'Get-OCIWaasAddressListsList', 'Get-OCIWaasCachingRulesList', 'Get-OCIWaasCaptchasList', 'Get-OCIWaasCertificate', 'Get-OCIWaasCertificatesList', 'Get-OCIWaasCustomProtectionRule', 'Get-OCIWaasCustomProtectionRulesList', 'Get-OCIWaasDeviceFingerprintChallenge', 'Get-OCIWaasEdgeSubnetsList', 'Get-OCIWaasGoodBotsList', 'Get-OCIWaasHttpRedirect', 'Get-OCIWaasHttpRedirectsList', 'Get-OCIWaasHumanInteractionChallenge', 'Get-OCIWaasJsChallenge', 'Get-OCIWaasPoliciesList', 'Get-OCIWaasPolicy', 'Get-OCIWaasPolicyConfig', 'Get-OCIWaasPolicyCustomProtectionRulesList', 'Get-OCIWaasProtectionRule', 'Get-OCIWaasProtectionRulesList', 'Get-OCIWaasProtectionSettings', 'Get-OCIWaasRecommendationsList', 'Get-OCIWaasThreatFeedsList', 'Get-OCIWaasWafAddressRateLimiting', 'Get-OCIWaasWafBlockedRequestsList', 'Get-OCIWaasWafConfig', 'Get-OCIWaasWafLogsList', 'Get-OCIWaasWafRequestsList', 'Get-OCIWaasWafTrafficList', 'Get-OCIWaasWhitelistsList', 'Get-OCIWaasWorkRequest', 'Get-OCIWaasWorkRequestsList', 'Invoke-OCIWaasPurgeCache', 'Move-OCIWaasAddressListCompartment', 'Move-OCIWaasCertificateCompartment', 'Move-OCIWaasCustomProtectionRuleCompartment', 'Move-OCIWaasHttpRedirectCompartment', 'Move-OCIWaasPolicyCompartment', 'New-OCIWaasAddressList', 'New-OCIWaasCertificate', 'New-OCIWaasCustomProtectionRule', 'New-OCIWaasHttpRedirect', 'New-OCIWaasPolicy', 'Receive-OCIWaasRecommendations', 'Remove-OCIWaasAddressList', 'Remove-OCIWaasCertificate', 'Remove-OCIWaasCustomProtectionRule', 'Remove-OCIWaasHttpRedirect', 'Remove-OCIWaasPolicy', 'Stop-OCIWaasWorkRequest', 'Update-OCIWaasAccessRules', 'Update-OCIWaasAddressList', 'Update-OCIWaasCachingRules', 'Update-OCIWaasCaptchas', 'Update-OCIWaasCertificate', 'Update-OCIWaasCustomProtectionRule', 'Update-OCIWaasDeviceFingerprintChallenge', 'Update-OCIWaasGoodBots', 'Update-OCIWaasHttpRedirect', 'Update-OCIWaasHumanInteractionChallenge', 'Update-OCIWaasJsChallenge', 'Update-OCIWaasPolicy', 'Update-OCIWaasPolicyConfig', 'Update-OCIWaasPolicyCustomProtectionRules', 'Update-OCIWaasProtectionRules', 'Update-OCIWaasProtectionSettings', 'Update-OCIWaasThreatFeeds', 'Update-OCIWaasWafAddressRateLimiting', 'Update-OCIWaasWafConfig', 'Update-OCIWaasWhitelists' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waas' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Networker - Delete ssids_1.ps1
Networker - Delete ssids_1.ps1
Write-Host "" Write-Host "This is dangerous - beware!" Write-Host "Type: delssids client.domain.com to DELETE ALL it's SAVESETS!!" function delssids { ## warning - no checks on first arg, security hole! ;) $client = $args[0] $ssids = (mminfo -av -q "client=$client" -r ssid) $ssids | ForEach-Object { nsrmm -d -S $_ -y } Write-Host "Removed SSID $_ " }
combined_dataset/train/non-malicious/sample_42_79.ps1
sample_42_79.ps1
$timestamp = get-date -uformat %Y%m%d-%k%M%S $transcriptPath = "$($env:temp)\StorageSyncAgent-SetRegPIIAclSettings-$($timestamp).log" Start-Transcript -Path $transcriptPath # The following script removes read permissions from registry key locations which may contain PII information. $regPaths = 'HKLM:\Software\Microsoft\Azure\StorageSync\SyncShare','HKLM:\Software\Microsoft\Azure\StorageSync\SyncFolder','HKLM:\Software\Microsoft\Azure\StorageSync\ProxySettings','HKLM:\Software\Microsoft\Azure\StorageSync\ServerRegistration','HKLM:\Software\Microsoft\Azure\StorageSync\ServerSetting' # The SDDL Below sets full access for Admins, Creator/Owners, and Local System. Permissions will be inherited by subkeys # The effect is of this is to effectively remove read permissions from regular users $sddl = 'O:BAG:SYD:P(A;CI;KA;;;CO)(A;CI;KA;;;SY)(A;CI;KA;;;BA)' try { foreach ($path in $regPaths) { Write-Output "Setting SDDL for registry entry $path" $acl = Get-Acl $path if($acl.Sddl -ieq $sddl) { Write-Output "Skipping as SDDL already configured for registry entry $path" } else { Write-Output "Configuring SDDL for registry entry $path" $acl.SetSecurityDescriptorSddlForm($sddl) $acl | Set-Acl } } } catch { Write-Output "Exception encountered while setting up ACLs: $_.Exception.Message" #add the error detail $registryPath="HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\AutoUpdate" $registryName="UpdateError" $registryValue="-2134359807" #ECS_E_INSTALLER_UNABLE_TO_SETUP_ACLS (hResult=80c84101) if(Test-Path $registryPath) #path exist for agent with auto-update configured { New-ItemProperty -Path $registryPath -Name $registryName -Value $registryValue ` -PropertyType String -Force | Out-Null } throw } #Write transcript out to console. Stop-Transcript # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChmIxCG5rJ1awC # JcJipaJYLEPkaLaxTm0j5MCf1IKPc6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMiwoSZFFHkQly6AE2bvY9I4 # cavW2zJvdxuArJGHkArmMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEzu0yVcV8yu+7vmlFQiMcxg+b0gIIhYuBqG5c15OopjDh2jarRj3XpCl # 4z6CGDehwD90IdQDWzVbMK3fU3yyBTOIYQIdze5ykP6w40Py2lRvXyeSVDqb9GKp # i1kZKjWdudIgBshGZFAjsTQsEvKFFxVC6CkATIi7ONi+eIkfGiReg3Vapp15RrhT # aY0IHOEAvhc4KBOPiNVk78yuIn9XcXJoQ5FytgDPaH0XXbT+f256CE8ZLA77Zb1x # THbEEFSK+eho8dbCT6VdluZ9dSBEiSVbBdF4aaUfdKaWQCVXrTFu/SvZpqFMqjkt # MlKGdidkl8dT2wUa5f5mzO3vRv8rRKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAMbNJGiKR68vK5I2TGW8tafVq0TsdhhoQwNVhB6P9/1QIGZbwTJSB7 # GBMyMDI0MDIxMjE4MjU0MC4xNzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRonjAiGA8yMDI0MDIxMjA5NTEy # NloYDzIwMjQwMjEzMDk1MTI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGie # AgEAMAoCAQACAgMnAgH/MAcCAQACAhNFMAoCBQDpdboeAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKfv5dhYXkA6efPrtGrMbMo3KAIpl9Y3V7aM2NbOA0JN # vyahMXSDO+clRlqce2s5XHJ2suOm2rKjsHJiLNCAI4AYwPDqlIOuHsLhbB3Fk7hy # tdGXQ0wu3HpQ6k7OJKTjsHem4Na5A2zPKvOQ5nY/fYn0qcPopQg7v7/FMA+gDVN9 # cNUojZ0tE5xYrZJnkPSYvl0WU6w48Myq2xUeqeSw22ZePCU+vVylco3InKHDLsq5 # sNpYNmlljw9N9bm+CBI64w48gKsePPtGZb4dD7gL5vAm4FvZO8pNHBUlwPEc5Avz # 82M/F4k6SEm5zRahP8pJ4Waeeq236bCuSmwWOFweJ8UxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB # 6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBueYieNGA/yS0dxSzAIuDQoSS/yiilrKNJ55Mg2ayk # ADCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige # 0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgUEd+d9bssJXfNMINf28J/AP/ # YL00XyhSwVtD+0g3F6EwDQYJKoZIhvcNAQELBQAEggIApdpLzzBOZ2Quk/ExifBo # zz4dJEXleqOG2FbGgHRbz/ym+iRuPO9Dryu2mVa1HpHLnuIfoc2FFbK0xuDIKa7N # uzMstd5/W7QsTYByOLe5MUDiRutbiOt/qa/3w4HUrvKpmwJXSshNbZ8UEQ2Q/Vop # 0pkUn7kc5pmaP5bxHI5LBMvJsAeQxk2Z4niJn+7Btj55v6BMlB0cSn7hRHsKYd0e # 0O7IjPW+cl7X4G10y//QZJTIk7brZXn3SjF/iSv/y2od1IU8OxzrpB7RR9xTD5PY # ZK6E127SEsim/sWY593r3UnHwAb3IVPJMhHc/aQ/X22cUaQelTU4T08RSqGTg+4z # WNDmI7iUBM31byfgGyae/4Mqi9TKR0hWwlBJ5MTC63JekKTWtFweTO4LJNxkdNyt # ma2IYrMy/2zz83kxvvJFFSZzVjzkvfUAGZDSS4PX0JV2scFcKsOroRmiT05jN/Jr # A5A2V3RwkYzNEsS3GyicynMXPxEmuG256XpziFK9sddXsBNbKFulz28DmYGs5FsV # 1QzLeZTJGZe+M3k8u6Ufs13MvTcHO4uvKcbtcI+v72wrYQ17UEmjvHyl19fWwI1Q # qfHTh1a9qK0G8KSvdiWH9GugYiGa9Zp+EqiH1rD7wTENyy6mLdk6maUkAF63maGz # LOI66vYpQukZlwIRrRF15Eo= # SIG # End signature block
combined_dataset/train/non-malicious/Start-Verify_3.ps1
Start-Verify_3.ps1
# Author: Steven Murawski http://www.mindofroot.com # This script creates two functions (and a helper function). One starts logging all commands entered, # and the second removes the logging. # This script is similar to the Start-Transcript, but only logs the command line and not the output. # Modified to add the logging at the beginning of the Prompt function, otherwise it appeared to # impact some functions display options. I also added some verification to see that the log directory # exists and to create it if not. # The format operator doesn't like scriptblocks in the string it is doing the replacement into # .. should be the last for a while. function New-ScriptBlock() { param ([string]$scriptblock) $executioncontext.InvokeCommand.NewScriptBlock($scriptblock.trim()) } function Start-Verify () { param ($logfile = 'c:\\scripts\\powershell\\logs\\verify.txt') #if the log folder does not exist, create one if (-not (test-path (split-path $logfile))) { mkdir (Split-Path $logfile) | Out-Null } $lastcmd = 'get-history | select -Last 1 | Foreach-Object { $_.CommandLine.ToString() } | Out-File -Append ' + $logfile Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ("$lastcmd;`n" + $_.toString()) } | Out-Null } function Stop-Verify () { $lastcmd = '^get-history.*;' Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ($_.tostring() -replace "$lastcmd")} | Out-Null }
combined_dataset/train/non-malicious/sample_3_63.ps1
sample_3_63.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoQgYJKoZIhvcNAQcCoIIoMzCCKC8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K # unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3 # 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASIcmXCBALoNe/avgvwl2HpthBc/SiY8m/rzqXEwEKwAzl54H99ciSlHc # +uwBQSFy9SbgdkckDCehiupMXdREIZemJkQ2pACuJGAlU37QYrEbxFYkl/a+OCR0 # w+zy3LwLziDvB+C7MbA2TwMW1e2YwezpUK3GlZbAgiASaXMhrNsc3OHnY67poo5j # 6eR3/j1PewX7gvoOxEqYJ1UZr7OUCuxkUNYYD0GbXuzusSvAEQ0/fQ7b9tBqygbb # 5zQSDL8hMo1fvHgXwesVgHUKo8RYUbl/oGAP63rjmnXrx+gyjxOkqjI7lkMuFBVg # gxWyVOItt744aIaR1aZQ+TvyPhT6eKGCF6wwgheoBgorBgEEAYI3AwMBMYIXmDCC # F5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBnNvz1I03TtFMida7uuSAHili1HQ3ZndrM6c6/HpjUFgIGZutKcsLi # GBIyMDI0MTAxNjE4MzQyOS44OVowBIACAfSggdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjQw # NzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NEMxQS0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ6JXSkHtuDz+pz+aSIN0l # efMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1ThUKQBkReq+TE/lA1O0Eb # kil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGHF8cVXu+G2aocsIKYPGFk # +YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCedxR22nXGMaYKl0EzKCT8r # SHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9MwqNgPqkt4E/SFkOHk/d/jG # EYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvRJ1HupCW/mnAM16tsrdhI # QMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v398gSk8CULxiKzFdoZfhG # kMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G5bN1SKvRneOI461oOrtd # 3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJpuiLXa6xXxrG2VP90J48L # id1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0DjLezob6BDfmj3SPaLpqZp # rwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj212xZMiBlZU5JL25QeFJiR # uAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMP6leT+tP93 # sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA5I03kykuLK6eb # zrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCnpa2CiUitq2K9eM4bWUiN # rIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86J699uwjNOT8bnX66JQmT # vvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZmOr87hn89yZUa2MamzZMK # 0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ3w3nqOmX2Si0uF293z1F # s6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd0thMAj3WBM1QXsED2rUS # 9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPLQ8PzdoK3v1FrQh0MgxK7 # BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52BF7y1d0auAOgF65U4r5xE # KVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K266VhhxEr3mqKEXSKtCzr9 # Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDddFE7AC/TXogK5PyFjUifJ # buPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJjg4a4ZTVJdofj0lI/e3zI # ZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVyc+TBEsVE9cWymaCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6roIZjAiGA8yMDI0MTAxNjA5Mzk1MFoYDzIwMjQxMDE3MDkzOTUwWjB0MDoG # CisGAQQBhFkKBAExLDAqMAoCBQDqughmAgEAMAcCAQACAjUGMAcCAQACAhQ8MAoC # BQDqu1nmAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAElmjNbXXThdgTnP # 36yp2VicynxgPeGVon0CAHQwphP3CTPHEC5YIfRgKv/VP4O9k0e9oEYrO2T5pTlZ # cTRRubSCgSEJ4R5kVedYylGCXxuEnOMBjgWaEH8ZtVjVAOMaHflBM969QjwE2lwU # DZ9zpxXQSOz5EF6NR/734xiGquLRlU9G7OppKqHMEGybgprSSr2ShmH1PbLdaHfa # IYn3lyB7BNjXiqJ8nwqOFfZegawI43WrwLtuwWIgjTMUbwQ3VF5z1LnHIvUiSRc3 # 1yl1dzIU6+z7PyByssEhMamA6Vk9Tsa3ruNo5KRUHuMYX2ev76oijTSVd6JiAvYl # PO17VwQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI # hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC5o4AEpXKM7s+K # pI/L/kKutiuNslaw4deVB7ypnZnSkTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw # gb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONIRXy6nKf9MIGYMIGApH4wfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8w # IgQgtLBsquE36QnSwchOAEzNvJ0xb6IQ0RCiY6oqs//iEN8wDQYJKoZIhvcNAQEL # BQAEggIAx5vZtvTDVMCe84RF+rU+8Hjn6TnXqGGB2/v935l2SlhRqp1qP2uNO0iJ # GMyH3qxgg2U1B2jYsi+Z60EezHL+Rup32RR1LSNtq8vAhmCKXRCPNXUdjYgpB32A # AaCCeKl/knf+3F/wLiEBhg4U4ZvabRfJJ5eofJxkaQiAGZDn6AdGrb4zQIXIWpLp # iKWa5d6cn4iJ+eXktfwaRs2UK4hf0JTy9x3Uu/d7/cxsQcmBVnNLj9kKKfsHeQa6 # zYyodKz8gwon5gF+b6Wcr+fklJyrGL7eSqZtCtu7N3nD4Xr1x0VjAuQuF5S60y0d # iTZp3vyMpz1cqN0CZZ69Ay+rvN51TT4Tb506Z7W3MnD9oYOHZ/YfaNKqs0tS+rDp # wpJ3zMhkyROuae94lhYFVaDzdXCODUh+38bVHadCyYrWSSFDpD+aVQYbuaBUKo7c # wQwlDNIHSxbpBTGo+Dkn5+jrWMYh8MAhrQ7U11Bd1VgSPyvk8fvpkynB6EmJPgiT # DjCDzffIP1L2a18MPOBFATNJqHSxA3oU/UzvQFDS9Q5uHSpjZfo4yqeFGLsahoIY # rjeLmIZniSbHu/oCxFDtvBalf+wQmm1WfxVffopgsympxj7gn5xypdTPu+aE09f4 # caragt9ts/cqnlIkAa+BWCc/jeR8H2XthcZi5R09bD9ziczUjnM= # SIG # End signature block
combined_dataset/train/non-malicious/4261.ps1
4261.ps1
$Global:ExploitTable = $null function Get-FileVersionInfo ($FilePath) { $VersionInfo = (Get-Item $FilePath).VersionInfo $FileVersion = ( "{0}.{1}.{2}.{3}" -f $VersionInfo.FileMajorPart, $VersionInfo.FileMinorPart, $VersionInfo.FileBuildPart, $VersionInfo.FilePrivatePart ) return $FileVersion } function Get-InstalledSoftware($SoftwareName) { $SoftwareVersion = Get-WmiObject -Class Win32_Product | Where { $_.Name -eq $SoftwareName } | Select-Object Version $SoftwareVersion = $SoftwareVersion.Version return $SoftwareVersion } function Get-Architecture { $CPUArchitecture = (Get-WmiObject Win32_OperatingSystem).OSArchitecture $ProcessArchitecture = $env:PROCESSOR_ARCHITECTURE return $CPUArchitecture, $ProcessArchitecture } function Get-CPUCoreCount { $CoreCount = (Get-WmiObject Win32_Processor).NumberOfLogicalProcessors return $CoreCount } function New-ExploitTable { $Global:ExploitTable = New-Object System.Data.DataTable $Global:ExploitTable.Columns.Add("Title") $Global:ExploitTable.Columns.Add("MSBulletin") $Global:ExploitTable.Columns.Add("CVEID") $Global:ExploitTable.Columns.Add("Link") $Global:ExploitTable.Columns.Add("VulnStatus") $Global:ExploitTable.Rows.Add("User Mode to Ring (KiTrap0D)","MS10-015","2010-0232","https://www.exploit-db.com/exploits/11199/") $Global:ExploitTable.Rows.Add("Task Scheduler .XML","MS10-092","2010-3338, 2010-3888","https://www.exploit-db.com/exploits/19930/") $Global:ExploitTable.Rows.Add("NTUserMessageCall Win32k Kernel Pool Overflow","MS13-053","2013-1300","https://www.exploit-db.com/exploits/33213/") $Global:ExploitTable.Rows.Add("TrackPopupMenuEx Win32k NULL Page","MS13-081","2013-3881","https://www.exploit-db.com/exploits/31576/") $Global:ExploitTable.Rows.Add("TrackPopupMenu Win32k Null Pointer Dereference","MS14-058","2014-4113","https://www.exploit-db.com/exploits/35101/") $Global:ExploitTable.Rows.Add("ClientCopyImage Win32k","MS15-051","2015-1701, 2015-2433","https://www.exploit-db.com/exploits/37367/") $Global:ExploitTable.Rows.Add("Font Driver Buffer Overflow","MS15-078","2015-2426, 2015-2433","https://www.exploit-db.com/exploits/38222/") $Global:ExploitTable.Rows.Add("'mrxdav.sys' WebDAV","MS16-016","2016-0051","https://www.exploit-db.com/exploits/40085/") $Global:ExploitTable.Rows.Add("Secondary Logon Handle","MS16-032","2016-0099","https://www.exploit-db.com/exploits/39719/") $Global:ExploitTable.Rows.Add("Win32k Elevation of Privilege","MS16-135","2016-7255","https://github.com/FuzzySecurity/PSKernel-Primitives/tree/master/Sample-Exploits/MS16-135") $Global:ExploitTable.Rows.Add("Nessus Agent 6.6.2 - 6.10.3","N/A","2017-7199","https://aspe1337.blogspot.co.uk/2017/04/writeup-of-cve-2017-7199.html") } function Set-ExploitTable ($MSBulletin, $VulnStatus) { if ( $MSBulletin -like "MS*" ) { $Global:ExploitTable | Where { $_.MSBulletin -eq $MSBulletin } | ForEach-Object { $_.VulnStatus = $VulnStatus } } else { $Global:ExploitTable | Where { $_.CVEID -eq $MSBulletin } | ForEach-Object { $_.VulnStatus = $VulnStatus } } } function Get-Results { $Global:ExploitTable } function Find-AllVulns { if ( !$Global:ExploitTable ) { $null = New-ExploitTable } Find-MS10015 Find-MS10092 Find-MS13053 Find-MS13081 Find-MS14058 Find-MS15051 Find-MS15078 Find-MS16016 Find-MS16032 Find-MS16135 Find-CVE20177199 Get-Results } function Find-MS10015 { $MSBulletin = "MS10-015" $Architecture = Get-Architecture if ( $Architecture[0] -eq "64-bit" ) { $VulnStatus = "Not supported on 64-bit systems" } Else { $Path = $env:windir + "\system32\ntoskrnl.exe" $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "20591" ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS10092 { $MSBulletin = "MS10-092" $Architecture = Get-Architecture if ( $Architecture[1] -eq "AMD64" -or $Architecture[0] -eq "32-bit" ) { $Path = $env:windir + "\system32\schedsvc.dll" } ElseIf ( $Architecture[0] -eq "64-bit" -and $Architecture[1] -eq "x86" ) { $Path = $env:windir + "\sysnative\schedsvc.dll" } $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "20830" ] } default { $VulnStatus = "Not Vulnerable" } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS13053 { $MSBulletin = "MS13-053" $Architecture = Get-Architecture if ( $Architecture[0] -eq "64-bit" ) { $VulnStatus = "Not supported on 64-bit systems" } Else { $Path = $env:windir + "\system32\win32k.sys" $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -ge "17000" ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "22348" ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "20732" ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS13081 { $MSBulletin = "MS13-081" $Architecture = Get-Architecture if ( $Architecture[0] -eq "64-bit" ) { $VulnStatus = "Not supported on 64-bit systems" } Else { $Path = $env:windir + "\system32\win32k.sys" $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -ge "18000" ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "22435" ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "20807" ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS14058 { $MSBulletin = "MS14-058" $Architecture = Get-Architecture if ( $Architecture[1] -eq "AMD64" -or $Architecture[0] -eq "32-bit" ) { $Path = $env:windir + "\system32\win32k.sys" } ElseIf ( $Architecture[0] -eq "64-bit" -and $Architecture[1] -eq "x86" ) { $Path = $env:windir + "\sysnative\win32k.sys" } $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -ge "18000" ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "22823" ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "21247" ] } 9600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "17353" ] } default { $VulnStatus = "Not Vulnerable" } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS15051 { $MSBulletin = "MS15-051" $Architecture = Get-Architecture if ( $Architecture[1] -eq "AMD64" -or $Architecture[0] -eq "32-bit" ) { $Path = $env:windir + "\system32\win32k.sys" } ElseIf ( $Architecture[0] -eq "64-bit" -and $Architecture[1] -eq "x86" ) { $Path = $env:windir + "\sysnative\win32k.sys" } $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "18000" ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "22823" ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "21247" ] } 9600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "17353" ] } default { $VulnStatus = "Not Vulnerable" } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS15078 { $MSBulletin = "MS15-078" $Path = $env:windir + "\system32\atmfd.dll" $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(" ") $Revision = $VersionInfo[2] switch ( $Revision ) { 243 { $VulnStatus = "Appears Vulnerable" } default { $VulnStatus = "Not Vulnerable" } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS16016 { $MSBulletin = "MS16-016" $Architecture = Get-Architecture if ( $Architecture[0] -eq "64-bit" ) { $VulnStatus = "Not supported on 64-bit systems" } Else { $Path = $env:windir + "\system32\drivers\mrxdav.sys" $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = $VersionInfo[2] $Revision = $VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "16000" ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "23317" ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "21738" ] } 9600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "18189" ] } 10240 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "16683" ] } 10586 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le "103" ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-MS16032 { $MSBulletin = "MS16-032" $CPUCount = Get-CPUCoreCount if ( $CPUCount -eq "1" ) { $VulnStatus = "Not Supported on single-core systems" } Else { $Architecture = Get-Architecture if ( $Architecture[1] -eq "AMD64" -or $Architecture[0] -eq "32-bit" ) { $Path = $env:windir + "\system32\seclogon.dll" } ElseIf ( $Architecture[0] -eq "64-bit" -and $Architecture[1] -eq "x86" ) { $Path = $env:windir + "\sysnative\seclogon.dll" } $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = [int]$VersionInfo[2] $Revision = [int]$VersionInfo[3].Split(" ")[0] switch ( $Build ) { 6002 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revison -lt 19598 -Or ( $Revision -ge 23000 -And $Revision -le 23909 ) ] } 7600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 19148 ] } 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -lt 19148 -Or ( $Revision -ge 23000 -And $Revision -le 23347 ) ] } 9200 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revison -lt 17649 -Or ( $Revision -ge 21000 -And $Revision -le 21767 ) ] } 9600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revison -lt 18230 ] } 10240 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -lt 16724 ] } 10586 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 161 ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $MSBulletin $VulnStatus } function Find-CVE20177199 { $CVEID = "2017-7199" $SoftwareVersion = Get-InstalledSoftware "Nessus Agent" if ( !$SoftwareVersion ) { $VulnStatus = "Not Vulnerable" } else { $SoftwareVersion = $SoftwareVersion.Split(".") $Major = [int]$SoftwareVersion[0] $Minor = [int]$SoftwareVersion[1] $Build = [int]$SoftwareVersion[2] switch( $Major ) { 6 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Minor -eq 10 -and $Build -le 3 -Or ( $Minor -eq 6 -and $Build -le 2 ) -Or ( $Minor -le 9 -and $Minor -ge 7 ) ] } default { $VulnStatus = "Not Vulnerable" } } } Set-ExploitTable $CVEID $VulnStatus } function Find-MS16135 { $MSBulletin = "MS16-135" $Architecture = Get-Architecture if ( $Architecture[1] -eq "AMD64" -or $Architecture[0] -eq "32-bit" ) { $Path = $env:windir + "\system32\win32k.sys" } ElseIf ( $Architecture[0] -eq "64-bit" -and $Architecture[1] -eq "x86" ) { $Path = $env:windir + "\sysnative\win32k.sys" } $VersionInfo = Get-FileVersionInfo($Path) $VersionInfo = $VersionInfo.Split(".") $Build = [int]$VersionInfo[2] $Revision = [int]$VersionInfo[3].Split(" ")[0] switch ( $Build ) { 7601 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -lt 23584 ] } 9600 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 18524 ] } 10240 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 16384 ] } 10586 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 19 ] } 14393 { $VulnStatus = @("Not Vulnerable","Appears Vulnerable")[ $Revision -le 446 ] } default { $VulnStatus = "Not Vulnerable" } } Set-ExploitTable $MSBulletin $VulnStatus }
combined_dataset/train/non-malicious/3940.ps1
3940.ps1
function Test-CortexCRUD { $rgName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement "East US" $virtualWanName = Get-ResourceName $virtualHubName = Get-ResourceName $vpnSiteName = Get-ResourceName $vpnGatewayName = Get-ResourceName $remoteVirtualNetworkName = Get-ResourceName $vpnConnectionName = Get-ResourceName $hubVnetConnectionName = Get-ResourceName $vpnSite2Name = Get-ResourceName $vpnSiteLink1Name = Get-ResourceName $vpnSiteLink2Name = Get-ResourceName $vpnConnection2Name = Get-ResourceName $vpnLink1ConnectionName = Get-ResourceName $vpnLink2ConnectionName = Get-ResourceName $storeName = 'blob' + $rgName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $rglocation $createdVirtualWan = New-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Location $rglocation -AllowVnetToVnetTraffic -AllowBranchToBranchTraffic $createdVirtualWan = Update-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -AllowVnetToVnetTraffic $false -AllowBranchToBranchTraffic $false $virtualWan = Get-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName Assert-AreEqual $rgName $virtualWan.ResourceGroupName Assert-AreEqual $virtualWanName $virtualWan.Name Assert-AreEqual $false $virtualWan.AllowVnetToVnetTraffic Assert-AreEqual $false $virtualWan.AllowBranchToBranchTraffic $virtualWans = Get-AzureRmVirtualWan -ResourceGroupName $rgName Assert-NotNull $virtualWans $virtualWansAll = Get-AzureRmVirtualWan Assert-NotNull $virtualWansAll Assert-NotNull $virtualWansAll[0].ResourceGroupName $virtualWansAll = Get-AzVirtualWan -ResourceGroupName "*" Assert-NotNull $virtualWansAll $virtualWansAll = Get-AzVirtualWan -Name "*" Assert-NotNull $virtualWansAll $virtualWansAll = Get-AzVirtualWan -ResourceGroupName "*" -Name "*" Assert-NotNull $virtualWansAll $createdVirtualHub = New-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -Location $rglocation -AddressPrefix "192.168.1.0/24" -VirtualWan $virtualWan $virtualHub = Get-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName Assert-AreEqual $rgName $virtualHub.ResourceGroupName Assert-AreEqual $virtualHubName $virtualHub.Name Assert-AreEqual "192.168.1.0/24" $virtualHub.AddressPrefix $virtualHubs = Get-AzureRmVirtualHub -ResourceGroupName $rgName Assert-NotNull $virtualHubs $virtualHubsAll = Get-AzureRmVirtualHub Assert-NotNull $virtualHubsAll Assert-NotNull $virtualHubsAll[0].ResourceGroupName $virtualHubsAll = Get-AzureRmVirtualHub -ResourceGroupName "*" Assert-NotNull $virtualHubsAll $virtualHubsAll = Get-AzureRmVirtualHub -Name "*" Assert-NotNull $virtualHubsAll $virtualHubsAll = Get-AzureRmVirtualHub -ResourceGroupName "*" -Name "*" Assert-NotNull $virtualHubsAll $route1 = New-AzVirtualHubRoute -AddressPrefix @("10.0.0.0/16", "11.0.0.0/16") -NextHopIpAddress "12.0.0.5" $route2 = New-AzVirtualHubRoute -AddressPrefix @("13.0.0.0/16") -NextHopIpAddress "14.0.0.5" $routeTable = New-AzVirtualHubRouteTable -Route @($route1, $route2) Update-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -RouteTable $routeTable $virtualHub = Get-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName Assert-AreEqual $rgName $virtualHub.ResourceGroupName Assert-AreEqual $virtualHubName $virtualHub.Name $routes = $virtualHub.RouteTable.Routes Assert-AreEqual 2 @($routes).Count $vpnSiteAddressSpaces = New-Object string[] 1 $vpnSiteAddressSpaces[0] = "192.168.2.0/24" $createdVpnSite = New-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName -Location $rglocation -VirtualWan $virtualWan -IpAddress "1.2.3.4" -AddressSpace $vpnSiteAddressSpaces -DeviceModel "SomeDevice" -DeviceVendor "SomeDeviceVendor" -LinkSpeedInMbps 10 $createdVpnSite = Update-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName -IpAddress "2.3.4.5" $vpnSite = Get-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName Assert-AreEqual $rgName $vpnSite.ResourceGroupName Assert-AreEqual $vpnSiteName $vpnSite.Name Assert-AreEqual "2.3.4.5" $vpnSite.IpAddress $vpnSite2AddressSpaces = New-Object string[] 2 $vpnSite2AddressSpaces[0] = "192.169.2.0/24" $vpnSite2AddressSpaces[1] = "192.169.3.0/24" $vpnSiteLink1 = New-AzVpnSiteLink -Name $vpnSiteLink1Name -IpAddress "5.5.5.5" -LinkProviderName "SomeTelecomProvider1" -LinkSpeedInMbps "10" $vpnSiteLink2 = New-AzVpnSiteLink -Name $vpnSiteLink2Name -IpAddress "5.5.5.6" -LinkProviderName "SomeTelecomProvider2" -LinkSpeedInMbps "10" $createdVpnSite2 = New-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -Location $rglocation -VirtualWan $virtualWan -AddressSpace $vpnSite2AddressSpaces -DeviceModel "SomeDevice" -DeviceVendor "SomeDeviceVendor" -VpnSiteLink @($vpnSiteLink1, $vpnSiteLink2) $vpnSite2 = Get-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name Assert-AreEqual $rgName $vpnSite2.ResourceGroupName Assert-AreEqual $vpnSite2Name $vpnSite2.Name Assert-AreEqual 2 $vpnSite2.VpnSiteLinks.Count $vpnSiteLink1.IpAddress = "7.3.4.5" $vpnSite2AddressSpaces = New-Object string[] 2 $vpnSite2AddressSpaces[0] = "192.170.2.0/24" $vpnSite2AddressSpaces[1] = "192.170.3.0/24" Update-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -VpnSiteLink @($vpnSiteLink1) -AddressSpace $vpnSite2AddressSpaces $updatedVpnSite2 = Get-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name Assert-AreEqual 1 $updatedVpnSite2.VpnSiteLinks.Count Assert-AreEqual "7.3.4.5" $updatedVpnSite2.VpnSiteLinks[0].IpAddress Update-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -VpnSiteLink @($vpnSiteLink1, $vpnSiteLink2) $vpnSites = Get-AzureRmVpnSite -ResourceGroupName $rgName Assert-NotNull $vpnSites $vpnSitesAll = Get-AzVpnSite Assert-NotNull $vpnSitesAll Assert-NotNull $vpnSitesAll[0].ResourceGroupName $vpnSitesAll = Get-AzVpnSite -ResourceGroupName "*" Assert-NotNull $vpnSitesAll $vpnSitesAll = Get-AzVpnSite -Name "*" Assert-NotNull $vpnSitesAll $vpnSitesAll = Get-AzVpnSite -ResourceGroupName "*" -Name "*" Assert-NotNull $vpnSitesAll $createdVpnGateway = New-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName -VirtualHub $virtualHub -VpnGatewayScaleUnit 3 $createdVpnGateway = Update-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName -VpnGatewayScaleUnit 4 $vpnGateway = Get-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName Assert-AreEqual $rgName $vpnGateway.ResourceGroupName Assert-AreEqual $vpnGatewayName $vpnGateway.Name Assert-AreEqual 4 $vpnGateway.VpnGatewayScaleUnit $vpnGateways = Get-AzVpnGateway Assert-NotNull $vpnGateways Assert-NotNull $vpnGateways[0].ResourceGroupName $vpnGateways = Get-AzureRmVpnGateway -ResourceGroupName $rgName Assert-NotNull $vpnGateways $vpnGatewaysAll = Get-AzureRmVpnGateway -ResourceGroupName "*" Assert-NotNull $vpnGatewaysAll $vpnGatewaysAll = Get-AzureRmVpnGateway -Name "*" Assert-NotNull $vpnGatewaysAll $vpnGatewaysAll = Get-AzureRmVpnGateway -ResourceGroupName "*" -Name "*" Assert-NotNull $vpnGatewaysAll $vpnGatewaysAll = Get-AzureRmVpnGateway Assert-NotNull $vpnGatewaysAll $createdVpnConnection = New-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName -VpnSite $vpnSite -ConnectionBandwidth 20 -UseLocalAzureIpAddress Assert-AreEqual $true $createdVpnConnection.UseLocalAzureIpAddress $createdVpnConnection = Update-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName -ConnectionBandwidth 30 -UseLocalAzureIpAddress $false $vpnConnection = Get-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName Assert-AreEqual $vpnConnectionName $vpnConnection.Name Assert-AreEqual 30 $vpnConnection.ConnectionBandwidth Assert-AreEqual $false $vpnConnection.UseLocalAzureIpAddress $vpnSiteLinkConnection1 = New-AzVpnSiteLinkConnection -Name $vpnLink1ConnectionName -VpnSiteLink $vpnSite2.VpnSiteLinks[0] -ConnectionBandwidth 100 $vpnSiteLinkConnection2 = New-AzVpnSiteLinkConnection -Name $vpnLink2ConnectionName -VpnSiteLink $vpnSite2.VpnSiteLinks[1] -ConnectionBandwidth 10 $createdVpnConnection2 = New-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name -VpnSite $vpnSite2 -VpnSiteLinkConnection @($vpnSiteLinkConnection1, $vpnSiteLinkConnection2) $vpnConnection2 = Get-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name Assert-AreEqual $vpnConnection2Name $vpnConnection2.Name Assert-AreEqual 2 $vpnConnection2.VpnLinkConnections.Count $vpnSiteLinkConnection1.RoutingWeight = 10 Update-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name -VpnSiteLinkConnection @($vpnSiteLinkConnection1) $vpnConnection2 = Get-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name Assert-AreEqual $vpnConnection2Name $vpnConnection2.Name Assert-AreEqual 1 $vpnConnection2.VpnLinkConnections.Count Assert-AreEqual 10 $vpnConnection2.VpnLinkConnections[0].RoutingWeight $vpnConnections = Get-AzureRmVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName Assert-NotNull $vpnConnections $vpnConnections = Get-AzureRmVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name "*" Assert-NotNull $vpnConnections $remoteVirtualNetwork = New-AzVirtualNetwork -ResourceGroupName $rgName -Name $remoteVirtualNetworkName -Location $rglocation -AddressPrefix "10.0.1.0/24" $createdHubVnetConnection = New-AzVirtualHubVnetConnection -ResourceGroupName $rgName -VirtualHubName $virtualHubName -Name $hubVnetConnectionName -RemoteVirtualNetwork $remoteVirtualNetwork $hubVnetConnection = Get-AzVirtualHubVnetConnection -ResourceGroupName $rgName -VirtualHubName $virtualHubName -Name $hubVnetConnectionName Assert-AreEqual $hubVnetConnectionName $hubVnetConnection.Name $hubVnetConnections = Get-AzureRmVirtualHubVnetConnection -ResourceGroupName $rgName -VirtualHubName $virtualHubName Assert-NotNull $hubVnetConnections $hubVnetConnections = Get-AzureRmVirtualHubVnetConnection -ResourceGroupName $rgName -VirtualHubName $virtualHubName -Name "*" Assert-NotNull $hubVnetConnections $delete = Remove-AzVirtualHubVnetConnection -ResourceGroupName $rgName -ParentResourceName $virtualHubName -Name $hubVnetConnectionName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Force -PassThru Assert-AreEqual $True $delete } finally { Clean-ResourceGroup $rgname } } function Test-CortexDownloadConfig { $rgName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement "East US" $virtualWanName = Get-ResourceName $virtualHubName = Get-ResourceName $vpnSiteName = Get-ResourceName $vpnSite2Name = Get-ResourceName $vpnSiteLink1Name = Get-ResourceName $vpnSiteLink2Name = Get-ResourceName $vpnGatewayName = Get-ResourceName $remoteVirtualNetworkName = Get-ResourceName $vpnConnectionName = Get-ResourceName $vpnConnection2Name = Get-ResourceName $vpnLink1ConnectionName = Get-ResourceName $vpnLink2ConnectionName = Get-ResourceName $hubVnetConnectionName = Get-ResourceName $storeName = 'blob' + $rgName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $rglocation $createdVirtualWan = New-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Location $rglocation -AllowVnetToVnetTraffic -AllowBranchToBranchTraffic $virtualWan = Get-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName Assert-AreEqual $rgName $virtualWan.ResourceGroupName Assert-AreEqual $virtualWanName $virtualWan.Name $createdVirtualHub = New-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -Location $rglocation -AddressPrefix "192.168.1.0/24" -VirtualWan $virtualWan $virtualHub = Get-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName Assert-AreEqual $rgName $virtualHub.ResourceGroupName Assert-AreEqual $virtualHubName $virtualHub.Name Assert-AreEqual "192.168.1.0/24" $virtualHub.AddressPrefix $vpnSiteAddressSpaces = New-Object string[] 1 $vpnSiteAddressSpaces[0] = "192.168.2.0/24" $createdVpnSite = New-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName -Location $rglocation -VirtualWan $virtualWan -IpAddress "1.2.3.4" -AddressSpace $vpnSiteAddressSpaces -DeviceModel "SomeDevice" -DeviceVendor "SomeDeviceVendor" -LinkSpeedInMbps 10 $vpnSite = Get-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName Assert-AreEqual $rgName $vpnSite.ResourceGroupName Assert-AreEqual $vpnSiteName $vpnSite.Name $vpnSite2AddressSpaces = New-Object string[] 2 $vpnSite2AddressSpaces[0] = "192.169.2.0/24" $vpnSite2AddressSpaces[1] = "192.169.3.0/24" $vpnSiteLink1 = New-AzVpnSiteLink -Name $vpnSiteLink1Name -IpAddress "5.5.5.5" -LinkProviderName "SomeTelecomProvider1" -LinkSpeedInMbps "10" $vpnSiteLink2 = New-AzVpnSiteLink -Name $vpnSiteLink2Name -IpAddress "5.5.5.6" -LinkProviderName "SomeTelecomProvider2" -LinkSpeedInMbps "100" $createdVpnSite2 = New-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -Location $rglocation -VirtualWan $virtualWan -AddressSpace $vpnSite2AddressSpaces -DeviceModel "SomeDevice" -DeviceVendor "SomeDeviceVendor" -VpnSiteLink @($vpnSiteLink1, $vpnSiteLink2) $vpnSite2 = Get-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name Assert-AreEqual $rgName $vpnSite2.ResourceGroupName Assert-AreEqual $vpnSite2Name $vpnSite2.Name Assert-AreEqual 2 $vpnSite2.VpnSiteLinks.Count $createdVpnGateway = New-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName -VirtualHub $virtualHub -VpnGatewayScaleUnit 3 $vpnGateway = Get-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName Assert-AreEqual $rgName $vpnGateway.ResourceGroupName Assert-AreEqual $vpnGatewayName $vpnGateway.Name $createdVpnConnection = New-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName -VpnSite $vpnSite -ConnectionBandwidth 20 $vpnConnection = Get-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName Assert-AreEqual $vpnConnectionName $vpnConnection.Name $vpnSiteLinkConnection1 = New-AzVpnSiteLinkConnection -Name $vpnLink1ConnectionName -VpnSiteLink $vpnSite2.VpnSiteLinks[0] -ConnectionBandwidth 100 $vpnSiteLinkConnection2 = New-AzVpnSiteLinkConnection -Name $vpnLink2ConnectionName -VpnSiteLink $vpnSite2.VpnSiteLinks[1] -ConnectionBandwidth 10 $createdVpnConnection2 = New-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name -VpnSite $vpnSite2 -VpnSiteLinkConnection @($vpnSiteLinkConnection1, $vpnSiteLinkConnection2) $vpnConnection2 = Get-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name Assert-AreEqual $vpnConnection2Name $vpnConnection2.Name Assert-AreEqual 2 $vpnConnection2.VpnLinkConnections.Count $storetype = 'Standard_GRS' $containerName = "cont$($rgName)" New-AzStorageAccount -ResourceGroupName $rgName -Name $storeName -Location $rglocation -Type $storetype $key = Get-AzStorageAccountKey -ResourceGroupName $rgName -Name $storeName $context = New-AzStorageContext -StorageAccountName $storeName -StorageAccountKey $key[0].Value New-AzStorageContainer -Name $containerName -Context $context $container = Get-AzStorageContainer -Name $containerName -Context $context New-Item -Name EmptyFile.txt -ItemType File -Force Set-AzStorageBlobContent -File "EmptyFile.txt" -Container $containerName -Blob "emptyfile.txt" -Context $context $now=get-date $blobSasUrl = New-AzStorageBlobSASToken -Container $containerName -Blob emptyfile.txt -Context $context -Permission "rwd" -StartTime $now.AddHours(-1) -ExpiryTime $now.AddDays(1) -FullUri $vpnSitesForConfig = New-Object Microsoft.Azure.Commands.Network.Models.PSVpnSite[] 2 $vpnSitesForConfig[0] = $vpnSite $vpnSitesForConfig[1] = $vpnSite2 Get-AzVirtualWanVpnConfiguration -VirtualWan $virtualWan -StorageSasUrl $blobSasUrl -VpnSite $vpnSitesForConfig $delete = Remove-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnectionName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnConnection -ResourceGroupName $rgName -ParentResourceName $vpnGatewayName -Name $vpnConnection2Name -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnGateway -ResourceGroupName $rgName -Name $vpnGatewayName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnSite -ResourceGroupName $rgName -Name $vpnSiteName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVpnSite -ResourceGroupName $rgName -Name $vpnSite2Name -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Force -PassThru Assert-AreEqual $True $delete } finally { Clean-ResourceGroup $rgname } } function Test-CortexExpressRouteCRUD { $rgName = Get-ResourceGroupName $hubRgName = Get-ResourceGroupName $rglocation = Get-ProviderLocation "ResourceManagement" "westcentralus" $virtualWanName = Get-ResourceName $virtualHubName = Get-ResourceName $expressRouteGatewayName = Get-ResourceName $circuitName = Get-ResourceName $expressRouteConnectionName = Get-ResourceName try { $resourceGroup = New-AzureRmResourceGroup -Name $rgName -Location $rglocation $resourceGroup = New-AzureRmResourceGroup -Name $hubRgName -Location $rglocation $createdVirtualWan = New-AzureRmVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Location $rglocation -AllowVnetToVnetTraffic -AllowBranchToBranchTraffic $virtualWan = Get-AzureRmVirtualWan -ResourceGroupName $rgName -Name $virtualWanName Write-Debug "Created Virtual WAN $virtualWan.Name successfully" $createdVirtualHub = New-AzureRmVirtualHub -ResourceGroupName $hubRgName -Name $virtualHubName -Location $rglocation -AddressPrefix "10.8.0.0/24" -VirtualWan $virtualWan $virtualHub = Get-AzureRmVirtualHub -ResourceGroupName $hubRgName -Name $virtualHubName Write-Debug "Created Virtual Hub virtualHub.Name successfully" $createdExpressRouteGateway = New-AzureRmExpressRouteGateway -ResourceGroupName $rgName -Name $expressRouteGatewayName -VirtualHub $virtualHub -MinScaleUnits 2 Write-Debug "Created ExpressRoute Gateway $expressRouteGatewayName successfully" $expressRouteGateway = Get-AzureRmExpressRouteGateway -ResourceGroupName $rgName -Name $expressRouteGatewayName Assert-NotNull $expressRouteGateway Write-Debug "Retrieved ExpressRoute Gateway $expressRouteGatewayName successfully" $expressRouteGateways = Get-AzureRmExpressRouteGateway Assert-NotNull $expressRouteGateways Assert-True { $expressRouteGateways.Count -gt 0 } $expressRouteGateways = Get-AzureRmExpressRouteGateway -ResourceGroupName "*" Assert-NotNull $expressRouteGateways Assert-True { $expressRouteGateways.Count -gt 0 } $expressRouteGateways = Get-AzureRmExpressRouteGateway -Name "*" Assert-NotNull $expressRouteGateways Assert-True { $expressRouteGateways.Count -gt 0 } $expressRouteGateways = Get-AzureRmExpressRouteGateway -ResourceGroupName "*" -Name "*" Assert-NotNull $expressRouteGateways Assert-True { $expressRouteGateways.Count -gt 0 } $expressRouteGateways = Get-AzureRmExpressRouteGateway -ResourceGroupName $rgName Assert-NotNull $expressRouteGateways Assert-True { $expressRouteGateways.Count -gt 0 } $peering = New-AzureRmExpressRouteCircuitPeeringConfig -Name AzurePrivatePeering -PeeringType AzurePrivatePeering -PeerASN 100 -PrimaryPeerAddressPrefix "10.2.3.4/30" -SecondaryPeerAddressPrefix "11.2.3.4/30" -VlanId 22 $circuit = New-AzureRmExpressRouteCircuit -Name $circuitName -Location $rglocation -ResourceGroupName $rgname -SkuTier Premium -SkuFamily MeteredData -ServiceProviderName "Zayo" -PeeringLocation "Denver" -BandwidthInMbps 200 -Peering $peering Write-Debug "Created ExpressRoute Circuit with Private Peering $circuitName successfully" $circuitResult = Get-AzureRmExpressRouteCircuit -Name $circuitName -ResourceGroupName $rgname $peeringResult = Get-AzureRmExpressRouteCircuitPeeringConfig -Name AzurePrivatePeering -ExpressRouteCircuit $circuitResult Write-Debug "Created ExpressRoute Circuit with Private Peering $circuitName successfully" $createdExpressRouteConnection = New-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name $expressRouteConnectionName -ExpressRouteCircuitPeeringId $peeringResult.Id -RoutingWeight 10 Write-Debug "Created ExpressRoute Connection with Private Peering $expressRouteConnectionName successfully" $createdExpressRouteConnection = Set-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name $expressRouteConnectionName -RoutingWeight 30 Write-Debug "Updated ExpressRoute Connection with Private Peering $expressRouteConnectionName successfully" $expressRouteConnection = Get-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name $expressRouteConnectionName Assert-NotNull $expressRouteConnection Write-Debug "Retrieved ExpressRoute Connection with Private Peering $expressRouteConnectionName successfully" Assert-AreEqual $expressRouteConnectionName $expressRouteConnection.Name Assert-AreEqual 30 $expressRouteConnection.RoutingWeight $expressRouteConnection = Get-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName Assert-NotNull $expressRouteConnection Assert-True { $expressRouteConnection.Count -ge 0} $expressRouteConnection = Get-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name "*" Assert-NotNull $expressRouteConnection Assert-True { $expressRouteConnection.Count -ge 0} Remove-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name $expressRouteConnectionName -Force Assert-ThrowsLike { Get-AzureRmExpressRouteConnection -ResourceGroupName $rgName -ExpressRouteGatewayName $expressRouteGatewayName -Name $expressRouteConnectionName } "*Not*Found*" Remove-AzureRmExpressRouteGateway -ResourceGroupName $rgName -Name $expressRouteGatewayName -Force Assert-ThrowsLike { Get-AzureRmExpressRouteGateway -ResourceGroupName $rgName -Name $expressRouteGatewayName } "*Not*Found*" Remove-AzureRmVirtualHub -ResourceGroupName $hubRgName -Name $virtualHubName -Force Remove-AzureRmVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Force Assert-ThrowsLike { Get-AzureRmVirtualWan -ResourceGroupName $rgName -Name $virtualWanName } "*Not*Found*" } finally { Clean-ResourceGroup $rgname } } function Test-P2SCortexCRUD { param ( $basedir = ".\" ) $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation "Microsoft.Network/VirtualWans" $virtualWanName = Get-ResourceName $virtualHubName = Get-ResourceName $VpnServerConfiguration1Name = Get-ResourceName $VpnServerConfiguration2Name = Get-ResourceName $P2SVpnGatewayName = Get-ResourceName $vpnclientAuthMethod = "EAPTLS" $storeName = 'blob' + $rgName try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation $createdVirtualWan = New-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName -Location $rglocation $virtualWan = Get-AzVirtualWan -ResourceGroupName $rgName -Name $virtualWanName Assert-AreEqual $rgName $virtualWan.ResourceGroupName Assert-AreEqual $virtualWanName $virtualWan.Name $createdVirtualHub = New-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName -Location $rglocation -AddressPrefix "192.168.1.0/24" -VirtualWan $virtualWan $virtualHub = Get-AzVirtualHub -ResourceGroupName $rgName -Name $virtualHubName Assert-AreEqual $rgName $virtualHub.ResourceGroupName Assert-AreEqual $virtualHubName $virtualHub.Name Assert-AreEqual $virtualWan.Id $virtualhub.VirtualWan.Id $VpnServerConfigCertFilePath = Join-Path -Path $basedir -ChildPath "\ScenarioTests\Data\ApplicationGatewayAuthCert.cer" $listOfCerts = New-Object "System.Collections.Generic.List[String]" $listOfCerts.Add($VpnServerConfigCertFilePath) $vpnclientipsecpolicy1 = New-AzVpnClientIpsecPolicy -IpsecEncryption AES256 -IpsecIntegrity SHA256 -SALifeTime 86471 -SADataSize 429496 -IkeEncryption AES256 -IkeIntegrity SHA384 -DhGroup DHGroup14 -PfsGroup PFS14 New-AzVpnServerConfiguration -Name $VpnServerConfiguration1Name -ResourceGroupName $rgName -VpnProtocol IkeV2 -VpnAuthenticationType Certificate -VpnClientRootCertificateFilesList $listOfCerts -VpnClientRevokedCertificateFilesList $listOfCerts -VpnClientIpsecPolicy $vpnclientipsecpolicy1 -Location $rglocation $vpnServerConfig1 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration1Name Assert-NotNull $vpnServerConfig1 Assert-AreEqual $rgName $vpnServerConfig1.ResourceGroupName Assert-AreEqual $VpnServerConfiguration1Name $vpnServerConfig1.Name $protocols = $vpnServerConfig1.VpnProtocols Assert-AreEqual 1 @($protocols).Count Assert-AreEqual "IkeV2" $protocols[0] $authenticationTypes = $vpnServerConfig1.VpnAuthenticationTypes Assert-AreEqual 1 @($authenticationTypes).Count Assert-AreEqual "Certificate" $authenticationTypes[0] $vpnClientAddressSpaces = New-Object string[] 2 $vpnClientAddressSpaces[0] = "192.168.2.0/24" $vpnClientAddressSpaces[1] = "192.168.3.0/24" $createdP2SVpnGateway = New-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName -VirtualHub $virtualHub -VpnGatewayScaleUnit 1 -VpnClientAddressPool $vpnClientAddressSpaces -VpnServerConfiguration $vpnServerConfig1 Assert-AreEqual "Succeeded" $createdP2SVpnGateway.ProvisioningState $P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName Assert-AreEqual $rgName $P2SVpnGateway.ResourceGroupName Assert-AreEqual $P2SvpnGatewayName $P2SVpnGateway.Name Assert-AreEqual $vpnServerConfig1.Id $P2SVpnGateway.VpnServerConfiguration.Id Assert-AreEqual "Succeeded" $P2SVpnGateway.ProvisioningState $associatedVpnServerConfigs = Get-AzVirtualWanVpnServerConfiguration -Name $virtualWanName -ResourceGroupName $rgName Assert-NotNull $associatedVpnServerConfigs Assert-AreEqual 1 @($associatedVpnServerConfigs.VpnServerConfigurationResourceIds).Count Assert-AreEqual $vpnServerConfig1.Id $associatedVpnServerConfigs.VpnServerConfigurationResourceIds[0] $vpnServerConfig1 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration1Name Assert-NotNull $vpnServerConfig1 Assert-AreEqual $vpnServerConfig1.P2sVpnGateways[0].Id $P2SVpnGateway.Id $vpnServerConfigs = Get-AzVpnServerConfiguration -ResourceGroupName $rgName Assert-NotNull $vpnServerConfigs Assert-AreEqual 1 @($vpnServerConfigs).Count $vpnProfileResponse = Get-AzP2sVpnGatewayVpnProfile -Name $P2SVpnGatewayName -ResourceGroupName $rgName -AuthenticationMethod $vpnclientAuthMethod Assert-NotNull $vpnProfileResponse.ProfileUrl Assert-AreEqual True ($vpnProfileResponse.ProfileUrl -Match "zip") $vpnProfileWanResponse = Get-AzVirtualWanVpnServerConfigurationVpnProfile -Name $virtualWanName -ResourceGroupName $rgName -AuthenticationMethod $vpnclientAuthMethod -VpnServerConfiguration $vpnServerConfig1 Assert-NotNull $vpnProfileWanResponse.ProfileUrl Assert-AreEqual True ($vpnProfileWanResponse.ProfileUrl -Match "zip") $Secure_String_Pwd = ConvertTo-SecureString "TestRadiusServerPassword" -AsPlainText -Force New-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName -VpnProtocol IkeV2 -VpnAuthenticationType Radius -RadiusServerAddress "TestRadiusServer" -RadiusServerSecret $Secure_String_Pwd -RadiusServerRootCertificateFilesList $listOfCerts -RadiusClientRootCertificateFilesList $listOfCerts -Location $rglocation $vpnServerConfig2 = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name Assert-AreEqual "Succeeded" $vpnServerConfig2.ProvisioningState Assert-AreEqual "TestRadiusServer" $vpnServerConfig2.RadiusServerAddress $vpnServerConfigs = Get-AzVpnServerConfiguration -ResourceGroupName $rgName Assert-NotNull $vpnServerConfigs Assert-AreEqual 2 @($vpnServerConfigs).Count Update-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName -RadiusServerAddress "TestRadiusServer1" $VpnServerConfig2 = Get-AzVpnServerConfiguration -Name $VpnServerConfiguration2Name -ResourceGroupName $rgName Assert-AreEqual $VpnServerConfiguration2Name $VpnServerConfig2.Name Assert-AreEqual "TestRadiusServer1" $VpnServerConfig2.RadiusServerAddress Update-AzVpnServerConfiguration -ResourceId $VpnServerConfig2.Id -RadiusServerAddress "TestRadiusServer2" $VpnServerConfig2Get = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name Assert-AreEqual "TestRadiusServer2" $VpnServerConfig2Get.RadiusServerAddress Update-AzVpnServerConfiguration -InputObject $VpnServerConfig2Get -RadiusServerAddress "TestRadiusServer3" $VpnServerConfig2Get = Get-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration2Name Assert-AreEqual "TestRadiusServer3" $VpnServerConfig2Get.RadiusServerAddress $vpnClientAddressSpaces[1] = "192.168.4.0/24" $updatedP2SVpnGateway = Update-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName -VpnClientAddressPool $vpnClientAddressSpaces $P2SVpnGateway = Get-AzP2sVpnGateway -ResourceGroupName $rgName -Name $P2SvpnGatewayName Assert-AreEqual $P2SvpnGatewayName $P2SVpnGateway.Name Assert-AreEqual "Succeeded" $P2SVpnGateway.ProvisioningState Assert-AreEqual $vpnServerConfig1.Id $P2SVpnGateway.VpnServerConfiguration.Id $setVpnClientAddressSpacesString = [system.String]::Join(" ", $vpnClientAddressSpaces) Assert-AreEqual $setVpnClientAddressSpacesString $P2SVpnGateway.P2SConnectionConfigurations[0].VpnClientAddressPool.AddressPrefixes $associatedVpnServerConfigs = Get-AzVirtualWanVpnServerConfiguration -ResourceId $virtualWan.Id Assert-NotNull $associatedVpnServerConfigs Assert-AreEqual 1 @($associatedVpnServerConfigs.VpnServerConfigurationResourceIds).Count Assert-AreEqual $vpnServerConfig1.Id $associatedVpnServerConfigs.VpnServerConfigurationResourceIds[0] $delete = Remove-AzVpnServerConfiguration -InputObject $VpnServerConfig2Get -Force -PassThru Assert-AreEqual $True $delete $vpnServerConfigs = Get-AzVpnServerConfiguration -ResourceGroupName $rgName Assert-NotNull $vpnServerConfigs Assert-AreEqual 1 @($vpnServerConfigs).Count $storetype = 'Standard_GRS' $containerName = "cont$($rgName)" New-AzStorageAccount -ResourceGroupName $rgName -Name $storeName -Location $rglocation -Type $storetype $key = Get-AzStorageAccountKey -ResourceGroupName $rgName -Name $storeName $context = New-AzStorageContext -StorageAccountName $storeName -StorageAccountKey $key[0].Value New-AzStorageContainer -Name $containerName -Context $context $container = Get-AzStorageContainer -Name $containerName -Context $context New-Item -Name EmptyFile.txt -ItemType File -Force Set-AzStorageBlobContent -File "EmptyFile.txt" -Container $containerName -Blob "emptyfile.txt" -Context $context $now=get-date $blobSasUrl = New-AzStorageBlobSASToken -Container $containerName -Blob emptyfile.txt -Context $context -Permission "rwd" -StartTime $now.AddHours(-1) -ExpiryTime $now.AddDays(1) -FullUri $detailedConnectionHealth = Get-AzP2sVpnGatewayDetailedConnectionHealth -Name $P2SvpnGatewayName -ResourceGroupName $rgName -OutputBlobSasUrl $blobSasUrl Assert-NotNull $detailedConnectionHealth Assert-NotNull $detailedConnectionHealth.SasUrl Assert-AreEqual $blobSasUrl $detailedConnectionHealth.SasUrl } finally { $delete = Remove-AzP2sVpnGateway -Name $P2SVpnGatewayName -ResourceGroupName $rgName -Force -PassThru Assert-AreEqual $True $delete $associatedVpnServerConfigs = Get-AzVirtualWanVpnServerConfiguration -Name $virtualWanName -ResourceGroupName $rgName Assert-NotNull $associatedVpnServerConfigs Assert-AreEqual 0 @($associatedVpnServerConfigs.VpnServerConfigurationResourceIds).Count $delete = Remove-AzVpnServerConfiguration -ResourceGroupName $rgName -Name $VpnServerConfiguration1Name -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualHub -ResourceGroupName $rgname -Name $virtualHubName -Force -PassThru Assert-AreEqual $True $delete $delete = Remove-AzVirtualWan -InputObject $virtualWan -Force -PassThru Assert-AreEqual $True $delete Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/1173.ps1
1173.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1') $groupName = 'TestGroupMember01' $userName = 'TestGroupMemberUser' $userPass = 'P@ssw0rd!' $description = 'Used by Test-GroupMember.Tests.ps1' describe Test-GroupMember { BeforeAll { Install-Group -Name $groupName -Description $description $testUserCred = New-Credential -UserName $userName -Password $userPass Install-User -Credential $testUserCred -Description $description Add-GroupMember -Name $groupName -Member $userName } AfterAll { Uninstall-User -Username $userName Uninstall-Group -Name $groupName } BeforeEach { $Global:Error.Clear() } It 'should find a group member' { $result = Test-GroupMember -GroupName $groupName -Member $userName $result | Should Be $true $Global:Error.Count | Should Be 0 } It 'should not find a group member' { $user = Get-User | Select-Object -First 1 $User | Should Not BeNullOrEmpty Test-GroupMember -GroupName $groupName -Member $user | Should Be $false $Global:Error.Count | Should Be 0 } It 'should not find a non existent user' { $result = Test-GroupMember -GroupName $groupName -Member 'nonExistantUser' -ErrorAction SilentlyContinue $result | Should BeNullOrEmpty $Global:Error[0] | Should Match 'identity.*not found' } It 'should write an error if group does not exist' { $result = Test-GroupMember -GroupName 'oiuewldsanfds' -Member 'snafufubar' -ErrorAction SilentlyContinue $result | Should BeNullOrEmpty $Global:Error[0] | Should Match 'group.*not found' } }
combined_dataset/train/non-malicious/sample_18_17.ps1
sample_18_17.ps1
# # Module manifest for module 'OCI.PSModules.Osubsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osubsubscription.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '93431fa6-8de9-47fd-bff2-7f03f5335df2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osubsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osubsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsubsubscriptionCommitment', 'Get-OCIOsubsubscriptionCommitmentsList', 'Get-OCIOsubsubscriptionRateCardsList', 'Get-OCIOsubsubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osubsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_1_50.ps1
sample_1_50.ps1
#************************************************ # DC_CollectSqlErrorlogs.ps1 # Version 1.0.0 # Date: 8-19-2011 # Author: Shon Hauck - Shonh@Microsoft.com # Description: Collects OS Performance Related Information # Processor Information # Operating System Performance Information # # NOTE: # #************************************************ # Copyright ?2008, Microsoft Corporation. All rights reserved. # You may use this code and information and create derivative works of it, # provided that the following conditions are met: # 1. This code and information and any derivative works may only be used for # troubleshooting a) Windows and b) products for Windows, in either case using # the Windows Troubleshooting Platform # 2. Any copies of this code and information # and any derivative works must retain the above copyright notice, this list of # conditions and the following disclaimer. # 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND, # WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND # INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION # WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER. if($debug -eq $true){[void]$shell.popup("DC_SQL_Misc_OS_Perf_Data.ps1")} Import-LocalizedData -BindingVariable SQLMiscOSPerfData #Import-LocalizedData -BindingVariable SQLMiscOSPerfData -FileName SQL_OS_Perf_Info -UICulture en-us ## CPU_PV.VBS Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description $sectionDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info $OutputFile = $ComputerName + "_Processor_Details.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe CPU_PL.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription ##SYSINFO.vbs Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description $OutputFile = $ComputerName + "_OS_Perf_Details.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe SYSINFO.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription ##PerfOS_Stats.vbs Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description $OutputFile = $ComputerName + "_OS_Perf_Statistics.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe PerfOS_Stats.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Statistic_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMMEu9A8ptIJZE # HuGiUjtiK9ToFjTJ43P2mqmzWTXDQqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG+oRd3LuEb8wNAJ8F+9PTJ8 # K4H8wVUmC6z5PhNb19mXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAnmDC1pFm/kFRlhGgHKKZVKBnqx9eemD+/O8aEjDcP52Is5Uabvkk86GW # Eu2TAXuFm8QDqXD2BIPNdpbQQEU/uOEY7ejl4xMOmuOPh033Nx+DlMZzupq84hok # eYwfXpKyGLXGk+2wCyZFTk8ZD6S+Q+VFNcm3ZxxSLRepiEp00Pu40krVJ46Ds39g # U1exChtk6GeJIIIrIDQfaaw5FDO9KoGNlz3UmbegLbWj7//pLWS1dMgACO2icLoL # QJHCthCawr4IYM+2eqj1jCxrmXiDpqbg1fDCALcpm2PfWlvSWfN9e1q4FyN22X4P # 6OMS4cLbHrGLoBtkySM9tramKPPZ9aGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBpvuYSFj2VDdt0MPBVsKAfe0hOFY7fNYlyGIMjsvtm6AIGZxp+Oc3T # GBIyMDI0MTAyODExNDA0Mi45OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EeowggcgMIIFCKADAgECAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU1 # NVoXDTI1MDMwNTE4NDU1NVowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBALG6UJm20h/xf3utb38n5DhWD0+K6AHXJrX8NHHEtbaH # DLhCC1TePl9XvlkprpdNNCFbkKWQaXqCnWd3lUGzHglv6hTg+wwDZ+h7yA/1tA09 # XEgcwm7pNhyuuff0d1163bGR2pSHPPJJdo8WoUyTZWJ8R+P4dHomF42zYsvObwUM # mb6kF108MtqD9H4A8hYfJ+2r2K3AzRY/lnR19DIjhaVV5RL6+i2w9tab5EqwfgVA # 2HNvS38PiK61x8Irf8sr7EuZLp2YCHsAwq4RSXyLaR1YENFxz4lZrbVIJ5/HlI+E # kQWBiF0Y8CincbWXxPfdyqtsu1wUmrDDhNCJiIKR3KwJycgXRmpI0Adx8j1IC/eB # +TLGpA0knexOyDkY9EX3maqBt9BuQWdTXuJhtEg8mrCBIuHIHzfdkOCbPFsqYmZ0 # NptvNLTIaGeAdrr6DBVo5Spwd/3DqTDEyj46obdBkhzB3nAcQKzmsAlno8jIUzsB # 3aFFQUdFOLfncjtXjESBga5lvqoXHo9/jiLsCNdum1SiUNxXNgR2AtBJaK4VqNLp # eDeTsLLxOIzkc9Qr0tkieWhPG5QtLEmYnudONSM6PnHBGYLvHZL+bGqXye8dII3U # 4QPb/AQI6i3owR71svefOgrA7xM2URK2rmxx3bkYDSAxA76o1dX/FMM4FMnzMFwZ # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUvLbF7n2wITRKPJyoTkStvhitLWAwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAOFISNIEVIJsnKXdT9CYUxbZ4s8GSeeWx8gP # /uBMy8A0SeGrTwj0cdtuqLCoMQdK8BG8q0vuPTOcgJgFsytVKa+APFTyMAaozKIu # gzzTvzxKjf5PohlX/9RlEmoGXigzdsIhCAUajRVN5DpHNgv63XMJReaak+YzjFxJ # xUUBNePlPHsHLhKFZQLtWGbumJwOJTmKAaO6K9GHE+9ul+VuH9uyITm3Hly44kQl # Ib65ZyoHJHtMLhwa+5q8dKOTWJFdP9CNo4R4mg6d96xs528msl1ub6V5gtEjrs3d # x3wH+y5TbW1F2DA6dOTaE65kqz+QvBpfo2wBtTL2kqwOZPKhacabJNYE+JNvaunm # iCjxjyExTVhCzusdHmGqKUSrzyMX70fwpxxv/WKyYlMacGdEy/rxR3aXksWE5nid # G2XiUeuL43UvwQGDtoTwS897wJr2DPyyHYXgI5Nh3U8dx7W6Au+9ZbX5o5Kl3w2f # ASJ3jOAPv1lDGKwmrI7iUxYzMCAR4WFSbjQWyG3Ne50CxfkugKKXistsd/Bi0Y6n # D0NVfeNcBX3S0b2JFtyqO23e+Fb1P4vd8BmUx6tpZ+Ht5SY+W0xTyURA4x6Wj/V6 # GQgY7thk4fFSp4qmYX1BpbwtdNPT3QAdniTqD612lkV8Iyi3Ib4Theo3pla0oQFC # ITfEvbsEMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w # ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAPuf # sGTiCwza1tT+L4zcG1GcuPT3oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZm6MCIYDzIwMjQxMDI4MDUwMzU0 # WhgPMjAyNDEwMjkwNTAzNTRaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOrJmboC # AQAwBwIBAAICBrEwBwIBAAICE8YwCgIFAOrK6zoCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEADQFoqwC10NBMfWZDUBhSj8rGVLhG0W664/iA/K8jrYkYrvoo # OjVLocz5y1oDDy611QnEPF0EhPthW1/cSwHpqEX13JUgjRMkWNI/xwIk5MLmNEaU # KJ864nMIOHHBBACFJd5YCQ7hWETuANk8/yIoBDVLp5ejTGcWa5XMpgZZEZSs7sfE # /mdLyDhxlGJlpASIwdF0HwYkMktXZNR93oe63TeZPbP5EuiCs2QAXEr/qs2y7Je7 # 4UXLzVdu94eDIaMPpyFgTcC5QHKzAqtb9JFWbMysZUP9CHBogMOmSmvdc0z038sy # uZWg/jL0lDiGFtWPnBnpcvmsJ7k5jW/zpAkB3DGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIFf5kNT91HPx8ZdFZn1vP4PRFU4a98IQ7E317JEpmfLfMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg1Xf9PmFLuKPBqjjrpGiwHvDASJu3 # RrU/kSojASP2EXgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAfGzRfUn6MAW1gABAAAB8TAiBCDw+5yKJVhDzmzZ6Fvv/5KkhKRqFulI # H9UmAbxHsgZ0CTANBgkqhkiG9w0BAQsFAASCAgCcEeRsh+9HJbb8byRrl6PXpNeC # 5E8kxrVPy9SB7jT/z0d8xdHiC5rdNzFC3dHTtI4vO9QjLr+gwSOTLAGcwAYtaWPY # ym0WcLQiMrGUsUs9GqHTR4itGGHGNR1qCWAp6KPb1pLrrXzSVluREzlAIngAK7wp # J0tRwgp6qBaNYE18XVYcYl48/I/+k6rMrQXoZx8sO2RAQwebLloPG7LhGBmu8Erp # f8tckyG/NSDVyawhVKwx0KhkjWiAbl89/XLhnIV/9UJZKB0epOaYkqQ+g+N9+Br5 # ikPnq9w174A6smwtW83HqR+f7wlPrQI7DiMAbRv4lz7VwhulhZpXQrV9zP3pt/lP # 889jMSEEgKL2kFHkOuOqz1nZSPt9eVjLDrndVx3LZwlIoPmDCza+n0OxL03Dj/Vb # QSWbHBdnXbMhAk8yDlGPmHijKGHbEZoyeJ8/TD0rwI9YYAWig2ptR1ek5eZiH+vW # h6eFnJNfvlkSxZLt8vzHlZdD0x9SncttQolAy/F0wyjvoeDGnZB2c7DEk4qpHtUv # tvNVrc2brO4FgPDgcLW/VR3hjSvLiN8ViPYqFLLVAH5m0dsHrn0buO74lTewG98v # 1dkAs8FiqfxEstogLXbWo8DFW7bs2z+Cx59bA3HZGbFR/jXJwZBBN8vPyoh7vgVW # qO/1RtdwDte7dAbLSA== # SIG # End signature block
combined_dataset/train/non-malicious/4426.ps1
4426.ps1
function Find-Script { [CmdletBinding(HelpUri = 'https://go.microsoft.com/fwlink/?LinkId=619785')] [outputtype("PSCustomObject[]")] Param ( [Parameter(ValueFromPipelineByPropertyName = $true, Position = 0)] [ValidateNotNullOrEmpty()] [string[]] $Name, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $MinimumVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $MaximumVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $RequiredVersion, [Parameter()] [switch] $AllVersions, [Parameter()] [switch] $IncludeDependencies, [Parameter()] [ValidateNotNull()] [string] $Filter, [Parameter()] [ValidateNotNull()] [string[]] $Tag, [Parameter()] [ValidateNotNull()] [ValidateSet('Function', 'Workflow')] [string[]] $Includes, [Parameter()] [ValidateNotNull()] [string[]] $Command, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNullOrEmpty()] [Uri] $Proxy, [Parameter(ValueFromPipelineByPropertyName = $true)] [PSCredential] $ProxyCredential, [Parameter()] [ValidateNotNullOrEmpty()] [string[]] $Repository, [Parameter(ValueFromPipelineByPropertyName = $true)] [PSCredential] $Credential, [Parameter()] [switch] $AllowPrerelease ) Begin { Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -Proxy $Proxy -ProxyCredential $ProxyCredential } Process { $ValidationResult = Validate-VersionParameters -CallerPSCmdlet $PSCmdlet ` -Name $Name ` -MinimumVersion $MinimumVersion ` -MaximumVersion $MaximumVersion ` -RequiredVersion $RequiredVersion ` -AllVersions:$AllVersions ` -AllowPrerelease:$AllowPrerelease if (-not $ValidationResult) { return } $PSBoundParameters['Provider'] = $script:PSModuleProviderName $PSBoundParameters[$script:PSArtifactType] = $script:PSArtifactTypeScript if ($AllowPrerelease) { $PSBoundParameters[$script:AllowPrereleaseVersions] = $true } $null = $PSBoundParameters.Remove("AllowPrerelease") if ($PSBoundParameters.ContainsKey("Repository")) { $PSBoundParameters["Source"] = $Repository $null = $PSBoundParameters.Remove("Repository") $ev = $null $repositories = Get-PSRepository -Name $Repository -ErrorVariable ev -verbose:$false if ($ev) { return } $RepositoriesWithoutScriptSourceLocation = $false foreach ($repo in $repositories) { if (-not $repo.ScriptSourceLocation) { $message = $LocalizedData.ScriptSourceLocationIsMissing -f ($repo.Name) Write-Error -Message $message ` -ErrorId 'ScriptSourceLocationIsMissing' ` -Category InvalidArgument ` -TargetObject $repo.Name ` -Exception 'System.ArgumentException' $RepositoriesWithoutScriptSourceLocation = $true } } if ($RepositoriesWithoutScriptSourceLocation) { return } } $PSBoundParameters["MessageResolver"] = $script:PackageManagementMessageResolverScriptBlockForScriptCmdlets $scriptsFoundInPSGallery = @() $isRepositoryNullOrPSGallerySpecified = $false if ($Repository -and ($Repository -Contains $Script:PSGalleryModuleSource)) { $isRepositoryNullOrPSGallerySpecified = $true } elseif (-not $Repository) { $psgalleryRepo = Get-PSRepository -Name $Script:PSGalleryModuleSource ` -ErrorAction SilentlyContinue ` -WarningAction SilentlyContinue if ($psgalleryRepo) { $isRepositoryNullOrPSGallerySpecified = $true } } PackageManagement\Find-Package @PSBoundParameters | Microsoft.PowerShell.Core\ForEach-Object { $psgetItemInfo = New-PSGetItemInfo -SoftwareIdentity $_ -Type $script:PSArtifactTypeScript if ($psgetItemInfo.Type -eq $script:PSArtifactTypeScript) { if ($AllVersions -and -not $AllowPrerelease) { if ($psgetItemInfo.AdditionalMetadata -and $psgetItemInfo.AdditionalMetadata.IsPrerelease -eq $false) { $psgetItemInfo } } else { $psgetItemInfo } } elseif ($PSBoundParameters['Name'] -and -not (Test-WildcardPattern -Name ($Name | Microsoft.PowerShell.Core\Where-Object { $psgetItemInfo.Name -like $_ }))) { $message = $LocalizedData.MatchInvalidType -f ($psgetItemInfo.Name, $psgetItemInfo.Type, $script:PSArtifactTypeScript) Write-Error -Message $message ` -ErrorId 'MatchInvalidType' ` -Category InvalidArgument ` -TargetObject $Name } if ($psgetItemInfo -and $isRepositoryNullOrPSGallerySpecified -and $script:TelemetryEnabled -and ($psgetItemInfo.Repository -eq $Script:PSGalleryModuleSource)) { $scriptsFoundInPSGallery += $psgetItemInfo.Name } } if ($isRepositoryNullOrPSGallerySpecified) { Log-ArtifactNotFoundInPSGallery -SearchedName $Name -FoundName $scriptsFoundInPSGallery -operationName PSGET_FIND_SCRIPT } } }
combined_dataset/train/non-malicious/Rollback Policy Module.ps1
Rollback Policy Module.ps1
Function Get-RollbackPolicy { <# .SYNOPSIS Retieves the current rollback policy on a local or remote computer .DESCRIPTION Retieves the current rollback policy on a local or remote computer .PARAMETER Computername The name of the computer or computers to perform the query against .NOTES Name: Get-RollbackPolicy Author: Boe Prox DateCreated: 06/24/2011 Links: .EXAMPLE Get-RollbackPolicy -Computername DC1 Rollback Computer -------- -------- Enabled dc1 Description ----------- Performs a query against the server, DC1 and returns whether the rollback setting has been enabled or disabled. .EXAMPLE Get-RollbackPolicy -Computername DC1,server1,server2 Rollback Computer -------- -------- Enabled dc1 Disabled server1 Enabled server2 Description ----------- Performs a query against the server, DC1 and returns whether the rollback setting has been enabled or disabled. #> [cmdletbinding()] Param ( [parameter()] [string[]]$Computername ) Process { ForEach ($computer in $computername) { Try { #Make initial registry connection Write-Verbose "Making registry connection to remote computer" $registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey("LocalMachine",$computer) #Connect to the subkey where the rollback is located Write-Verbose "Making registry connection to 'Software' key" If ($registry.GetSubkeyNames() -contains "Software") { $subkey = $registry.OpenSubKey("Software",$True) Write-Verbose "Making registry connection to 'Policies' key" If ($subkey.GetSubKeyNames() -contains "Policies") { $subkey = $subkey.OpenSubKey("Policies",$True) Write-Verbose "Making registry connection to 'Microsoft' key" If ($subkey.GetSubKeyNames() -contains "Microsoft") { $subkey = $subkey.OpenSubKey("Microsoft",$True) Write-Verbose "Making registry connection to 'Windows' key" If ($subkey.GetSubKeyNames() -contains "Windows") { $subkey = $subkey.OpenSubKey("Windows",$True) Write-Verbose "Making registry connection to 'Installer' key" If ($subkey.GetSubKeyNames() -contains "Installer") { $subkey = $subkey.OpenSubKey("Installer",$True) Write-Verbose "Checking to see if 'DisableRollback' value name exists" If ($subkey.GetValueNames() -contains "DisableRollback") { #Get the value of DisableRollback Write-Verbose "Retrieving value of 'DisableRollback'" $value = $subkey.GetValue('DisableRollback') Switch ($value) { 0 {$hash = @{Computer = $computer;Rollback = "Enabled"}} 1 {$hash = @{Computer = $computer;Rollback = "Disabled"}} Default {$hash = @{Computer = $computer;Rollback = "Unknown"}} } } Else { Write-Warning "$($computer): Missing 'DisableRollback' value name in registy!" $hash = @{Computer = $computer;Rollback = "Missing DisableRollback value name"} } } Else { Write-Warning "$($computer): Missing 'Installer' key in registy!" $hash = @{Computer = $computer;Rollback = "Missing Installer key"} } } Else { Write-Warning "$($computer): Missing 'Windows' key in registy!" $hash = @{Computer = $computer;Rollback = "Missing Windows key"} } } Else { Write-Warning "$($computer): Missing 'Microsoft' key in registy!" $hash = @{Computer = $computer;Rollback = "Missing Microsoft key"} } } Else { Write-Warning "$($computer): Missing 'Policies' key in registy!" $hash = @{Computer = $computer;Rollback = "Missing Policies key"} } } Else { Write-Warning "$($computer): Missing 'Software' key in registy!" $hash = @{Computer = $computer;Rollback = "Missing Software key"} } } Catch { Write-Warning "$($computer): $($Error[0])" $hash = @{Computer = $computer;Rollback = ($error[0].exception.innerexception.message -split "`n")[0]} } Finally { $object = New-Object PSObject -Property $hash $object.PSTypeNames.Insert(0,'RollbackStatus') Write-Output $object } } } } Function Disable-RollbackPolicy { <# .SYNOPSIS Disables the rollback policy on a local or remote computer .DESCRIPTION Disables the rollback policy on a local or remote computer .PARAMETER Computername The name of the computer or computers to disable the rollback policy on .PARAMETER Passthru Displays the returned object after disabling the policy. .NOTES Name: Disable-RollbackPolicy Author: Boe Prox DateCreated: 06/24/2011 Links: .EXAMPLE Disable-RollbackPolicy -Computername DC1 -Passthru Rollback Computer -------- -------- Disabled DC1 Description ----------- This disables the rollback policy on DC1 and returns the object showing that the policy has been disabled. .EXAMPLE Disable-RollbackPolicy -Computername DC1,server1,server2 -Passthru Rollback Computer -------- -------- Disabled DC1 Disabled server1 Disabled server2 Description ----------- This disables the rollback policy on DC1,server1 and server2 and returns the object showing that the policy has been disabled. #> [cmdletbinding( SupportsShouldProcess = 'True' )] Param ( [parameter()] [string[]]$Computername, [parameter()] [Switch]$Passthru ) Process { ForEach ($computer in $computername) { Try { #Make initial registry connection Write-Verbose "Making registry connection to remote computer" $registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey("LocalMachine",$computer) If ($PScmdlet.ShouldProcess("$computer","Disable Rollback")) { #Connect to the subkey where the rollback is located Write-Verbose "Making registry connection to 'Software' key" If ($registry.GetSubkeyNames() -notcontains "Software") { $registry.CreateSubKey("Software") $subkey = $registry.OpenSubKey("Software",$True) } Else { $subkey = $registry.OpenSubKey("Software",$True) } Write-Verbose "Making registry connection to 'Policies' key" If ($subkey.GetSubKeyNames() -notcontains "Policies") { $subkey.CreateSubKey("Policies") $subkey = $subkey.OpenSubKey("Policies",$True) } Else { $subkey = $subkey.OpenSubKey("Policies",$True) } Write-Verbose "Making registry connection to 'Microsoft' key" If ($subkey.GetSubKeyNames() -notcontains "Microsoft") { $subkey.CreateSubKey("Microsoft") $subkey = $subkey.OpenSubKey("Microsoft",$True) } Else { $subkey = $subkey.OpenSubKey("Microsoft",$True) } Write-Verbose "Making registry connection to 'Windows' key" If ($subkey.GetSubKeyNames() -notcontains "Windows") { $subkey.CreateSubKey("Windows") $subkey = $subkey.OpenSubKey("Windows",$True) } Else { $subkey = $subkey.OpenSubKey("Windows",$True) } Write-Verbose "Making registry connection to 'Installer' key" If ($subkey.GetSubKeyNames() -notcontains "Installer") { $subkey.CreateSubKey("Installer") $subkey = $subkey.OpenSubKey("Installer",$True) } Else { $subkey = $subkey.OpenSubKey("Installer",$True) } Write-Verbose "Checking to see if 'DisableRollback' value name exists" If ($subkey.GetValueNames() -notcontains "DisableRollback") { Write-Verbose "Creating DisableRollback value name and setting to 1 (Disable)" $subkey.SetValue("DisableRollback","1","DWord") } Else { Write-Verbose "Disabling Rollback" $subkey.SetValue("DisableRollback","1","DWord") } If ($PSBoundParameters['Passthru']) { Write-Verbose "Retrieving value of 'DisableRollback'" $value = $subkey.GetValue('DisableRollback') Switch ($value) { 0 {$hash = @{Computer = $computer;Rollback = "Enabled"}} 1 {$hash = @{Computer = $computer;Rollback = "Disabled"}} Default {$hash = @{Computer = $computer;Rollback = "Unknown"}} } } } } Catch { Write-Warning "$($computer): $($Error[0])" } Finally { If ($PSBoundParameters['Passthru']) { $object = New-Object PSObject -Property $hash $object.PSTypeNames.Insert(0,'RollbackStatus') Write-Output $object } } } } } Function Enable-RollbackPolicy { <# .SYNOPSIS Enables the rollback policy on a local or remote computer .DESCRIPTION Enables the rollback policy on a local or remote computer .PARAMETER Computername Name of computer or computers to enable the rollback policy .PARAMETER Passthru Displays the object after enabling the rollback policy on a computer .NOTES Name: Enable-RollbackPolicy Author: Boe Prox DateCreated: 06/24/2011 Links: .EXAMPLE Enable-RollbackPolicy -Computername DC1 -Passthru Rollback Computer -------- -------- Enable DC1 Description ----------- This enables the rollback policy on DC1 and returns the object showing that the policy has been enabled. .EXAMPLE Enable-RollbackPolicy -Computername DC1,server1,server2 -Passthru Rollback Computer -------- -------- Enable DC1 Enable server1 Enable server2 Description ----------- This enables the rollback policy on DC1,server1 and server2 and returns the object showing that the policy has been enabled. #> [cmdletbinding( SupportsShouldProcess = 'True' )] Param ( [parameter()] [string[]]$Computername, [parameter()] [Switch]$Passthru ) Process { ForEach ($computer in $computername) { Try { #Make initial registry connection Write-Verbose "Making registry connection to remote computer" $registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey("LocalMachine",$computer) If ($PScmdlet.ShouldProcess("$computer","Enable Rollback")) { #Connect to the subkey where the rollback is located Write-Verbose "Making registry connection to 'Software' key" If ($registry.GetSubkeyNames() -notcontains "Software") { $registry.CreateSubKey("Software") $subkey = $registry.OpenSubKey("Software",$True) } Else { $subkey = $registry.OpenSubKey("Software",$True) } Write-Verbose "Making registry connection to 'Policies' key" If ($subkey.GetSubKeyNames() -notcontains "Policies") { $subkey.CreateSubKey("Policies") $subkey = $subkey.OpenSubKey("Policies",$True) } Else { $subkey = $subkey.OpenSubKey("Policies",$True) } Write-Verbose "Making registry connection to 'Microsoft' key" If ($subkey.GetSubKeyNames() -notcontains "Microsoft") { $subkey.CreateSubKey("Microsoft") $subkey = $subkey.OpenSubKey("Microsoft",$True) } Else { $subkey = $subkey.OpenSubKey("Microsoft",$True) } Write-Verbose "Making registry connection to 'Windows' key" If ($subkey.GetSubKeyNames() -notcontains "Windows") { $subkey.CreateSubKey("Windows") $subkey = $subkey.OpenSubKey("Windows",$True) } Else { $subkey = $subkey.OpenSubKey("Windows",$True) } Write-Verbose "Making registry connection to 'Installer' key" If ($subkey.GetSubKeyNames() -notcontains "Installer") { $subkey.CreateSubKey("Installer") $subkey = $subkey.OpenSubKey("Installer",$True) } Else { $subkey = $subkey.OpenSubKey("Installer",$True) } Write-Verbose "Checking to see if 'DisableRollback' value name exists" If ($subkey.GetValueNames() -notcontains "DisableRollback") { Write-Verbose "Creating DisableRollback value name and setting to 0 (Enable)" $subkey.SetValue("DisableRollback","0","DWord") } Else { Write-Verbose "Enabling Rollback" $subkey.SetValue("DisableRollback","0","DWord") } If ($PSBoundParameters['Passthru']) { Write-Verbose "Retrieving value of 'DisableRollback'" $value = $subkey.GetValue('DisableRollback') Switch ($value) { 0 {$hash = @{Computer = $computer;Rollback = "Enabled"}} 1 {$hash = @{Computer = $computer;Rollback = "Disabled"}} Default {$hash = @{Computer = $computer;Rollback = "Unknown"}} } } } } Catch { Write-Warning "$($computer): $($Error[0])" } Finally { If ($PSBoundParameters['Passthru']) { $object = New-Object PSObject -Property $hash $object.PSTypeNames.Insert(0,'RollbackStatus') Write-Output $object } } } } } Export-ModuleMember -Function Get-RollbackPolicy,Enable-RollbackPolicy,Disable-RollbackPolicy
combined_dataset/train/non-malicious/4466.ps1
4466.ps1
Publish-PSResource -name 'TestModule' Publish-PSResource 'TestModule' Publish-PSResource 'TestModule' -Path '.\*\somepath' Publish-PSResource 'TestModule' -LiteralPath '.' Publish-PSResource 'TestModule' -RequiredVersion '1.5.0' Publish-PSResource 'TestModule' -Prerelease Publish-PSResource 'TestModule' -NuGetApiKey '1234567890' Publish-PSResource 'TestModule' -Repository 'Repository' Publish-PSResource 'TestModule' -ReleaseNotes 'Mock release notes.' Publish-PSResource 'TestModule' -Tags 'Tag1', 'Tag2', 'Tag3' Publish-PSResource 'TestModule' -LicenseUri 'www.licenseuri.com' Publish-PSResource 'TestModule' -IconUri 'www.iconuri.com' Publish-PSResource 'TestModule' -ProjectUri 'www.projecturi.com' Publish-PSResource 'TestModule' -Exclude 'some\path\file.ps1' Publish-PSResource 'TestModule' -Force Publish-PSResource 'TestModule' -SkipDependenciesCheck Publish-PSResource 'TestModule' -Nuspec '\path\to\file.nuspec' Publish-PSResource 'TestModule' -DestinationPath '.\TestNupkg.nupkg' Publish-PSResource 'TestScript' -Path '.\*\TestScript.ps1' Publish-PSResource 'TestScript' -LiteralPath '.\TestScript.ps1' Publish-PSResource 'TestScript' -RequiredVersion '1.5.0' Publish-PSResource 'TestScript' -Prerelease Publish-PSResource 'TestScript' -NuGetApiKey '1234567890' Publish-PSResource 'TestScript' -Repository 'Repository' Publish-PSResource 'TestScript' -ReleaseNotes 'Mock release notes.' Publish-PSResource 'TestScript' -Tags 'Tag1', 'Tag2', 'Tag3' Publish-PSResource 'TestScript' -LicenseUri 'www.licenseuri.com' Publish-PSResource 'TestScript' -IconUri 'www.iconuri.com' Publish-PSResource 'TestScript' -ProjectUri 'www.projecturi.com' Publish-PSResource 'TestScript' -Force Publish-PSResource 'TestScript' -SkipDependenciesCheck Publish-PSResource 'TestScript' -Nuspec '\path\to\file.nuspec'
combined_dataset/train/non-malicious/4132.ps1
4132.ps1
[CmdletBinding()] param ( [switch]$SecureDelete, [string]$SecureDeletePasses = '3' ) function Close-Process { [CmdletBinding()][OutputType([boolean])] param ( [ValidateNotNullOrEmpty()][string]$ProcessName ) $Process = Get-Process -Name $ProcessName -ErrorAction SilentlyContinue If ($Process -ne $null) { $Output = "Stopping " + $Process.Name + " process....." Stop-Process -Name $Process.Name -Force -ErrorAction SilentlyContinue Start-Sleep -Seconds 1 $TestProcess = Get-Process $ProcessName -ErrorAction SilentlyContinue If ($TestProcess -eq $null) { $Output += "Success" Write-Host $Output Return $true } else { $Output += "Failed" Write-Host $Output Return $false } } else { Return $true } } function Get-Architecture { [CmdletBinding()][OutputType([string])] param () $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $OSArchitecture = $OSArchitecture.OSArchitecture Return $OSArchitecture } function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Open-Application { [CmdletBinding()] param ( [string]$Executable, [ValidateNotNullOrEmpty()][string]$ApplicationName ) $Architecture = Get-Architecture $Uninstall = Get-ChildItem -Path REGISTRY::"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" If ($Architecture -eq "64-bit") { $Uninstall += Get-ChildItem -Path REGISTRY::"HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall" } $InstallLocation = ($Uninstall | ForEach-Object { Get-ItemProperty $_.PsPath } | Where-Object { $_.DisplayName -eq $ApplicationName }).InstallLocation If ($InstallLocation[$InstallLocation.Length - 1] -ne "\") { $InstallLocation += "\" } $Process = ($Executable.Split("."))[0] $Output = "Opening $ApplicationName....." Start-Process -FilePath $InstallLocation$Executable -ErrorAction SilentlyContinue Start-Sleep -Seconds 5 $NewProcess = Get-Process $Process -ErrorAction SilentlyContinue If ($NewProcess -ne $null) { $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } function Remove-ChatFiles { [CmdletBinding()] param () $Users = Get-ChildItem -Path $env:HOMEDRIVE"\users" -Exclude 'Administrator', 'public', 'iCreateService', 'sccmadmin', 'Default' foreach ($User in $Users) { $History = $User.FullName + '\AppData\Local\Cisco\Unified Communications\Jabber\CSF\History' $ChatHistoryFiles = Get-ChildItem -Path $History -Filter *.db If ($ChatHistoryFiles -ne $null) { foreach ($File in $ChatHistoryFiles) { $Output = "Deleting " + $File.Name + "....." If ($SecureDelete.IsPresent) { $RelativePath = Get-RelativePath $sDelete = [char]34 + $env:windir + "\system32\" + "sdelete64.exe" + [char]34 $Switches = "-accepteula -p" + [char]32 + $SecureDeletePasses + [char]32 + "-q" + [char]32 + [char]34 + $File.FullName + [char]34 $ErrCode = (Start-Process -FilePath $sDelete -ArgumentList $Switches -Wait -PassThru).ExitCode If (($ErrCode -eq 0) -and ((Test-Path $File.FullName) -eq $false)) { $Output += "Success" } else { $Output += "Failed" } } else { Remove-Item -Path $File.FullName -Force | Out-Null If ((Test-Path $File.FullName) -eq $false) { $Output += "Success" } else { $Output += "Failed" } } Write-Output $Output } } else { $Output = "No Chat History Present" Write-Output $Output } } } function Remove-MyJabberFilesFolder { [CmdletBinding()] param () $Users = Get-ChildItem -Path $env:HOMEDRIVE"\users" -Exclude 'Administrator', 'public', 'iCreateService', 'sccmadmin', 'Default' foreach ($User in $Users) { $Folder = $User.FullName + '\Documents\MyJabberFiles' $MyJabberFilesFolder = Get-Item $Folder -ErrorAction SilentlyContinue If ($MyJabberFilesFolder -ne $null) { $Output = "Deleting " + $MyJabberFilesFolder.Name + "....." Remove-Item -Path $MyJabberFilesFolder -Recurse -Force | Out-Null If ((Test-Path $MyJabberFilesFolder.FullName) -eq $false) { $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } else { $Output = "No MyJabberFiles folder present" Write-Output $Output } } } Clear-Host $JabberClosed = Close-Process -ProcessName CiscoJabber Remove-ChatFiles Remove-MyJabberFilesFolder If ($JabberClosed -eq $true) { Open-Application -ApplicationName "Cisco Jabber" -Executable CiscoJabber.exe }
combined_dataset/train/non-malicious/sample_25_6.ps1
sample_25_6.ps1
# # Module manifest for module 'OCI.PSModules.Generativeaiinference' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceChat', 'Invoke-OCIGenerativeaiinferenceEmbedText', 'Invoke-OCIGenerativeaiinferenceSummarizeText', 'New-OCIGenerativeaiinferenceText' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/PowerShellServer Cmdlet .ps1
PowerShellServer Cmdlet .ps1
\n#Global Hashtable to Control all Powershell Server Runspace\nSet-Variable -name '__PSRUNSPACES__' -scope 'global' -value @{} -force\n\nfunction global:New-PowerShellServerRunspace\n{\n param(\n $Credential,\n $ErrorAction='Stop',\n [switch]$Force,\n $Password,\n $Port=22,\n $Server='127.0.0.1',\n $SSHAccept,\n $Timeout=30,\n $user\n )\n Write-FPEvent "Calling New-PowerShellServerRunspace Function"\n $ErrorActionPreference = $ErrorAction\n trap{\n Write-FPEvent -EventInfo "Function New-PowerShellServerRunspace threw error $($error[0])" -EventType 'Error'\n }\n if(($Credential -eq $null) -and (($User -eq $null) -and ($Password -eq $null))){\n Throw "You Must Provide Authenication `n PSCredential or User and Password"\n }\n\n if($User -and $Password){$script:Credential = Get-FPCredential -Username $User -Password $Password}\n \n if( ($global:__PSRUNSPACES__.Keys -contains "$Server") -and ($global:__PSRunspaces__['10.27.1.4'].RunspaceStateInfo -eq 'OPENED' ) )\n {\n Write-Output $global:__PSRUNSPACES__["$Server"]\n return\n }\n else\n {\n if($Force){\n if($Credential){\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -Credential $Credential -Port $Port -Force -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Credential' -value $Credential -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -Credential $This.Credential -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n else{\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -User $User -Password $Password -Port $Port -Force -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'User' -value $User -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Password' -value $Password -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -User $This.User -Password $This.Password -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n }\n elseif($SSHAccept){\n if($Credential){\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -Credential $Credential -Port $Port -SSHAccept $SSHAccept -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Credential' -value $Credential -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -Credential $This.Credential -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n else{\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -User $User -Password $Password -Port $Port -SSHAccept $SSHAccept -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'User' -value $User -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Password' -value $Password -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -User $This.User -Password $This.Password -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n }\n else{\n if($Credential){\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -Credential $Credential -Port $Port -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Credential' -value $Credential -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -Credential $This.Credential -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n else{\n $script:rs = & (Get-Command -commandType 'Cmdlet' -name 'New-PowerShellServerRunspace') -Server $Server -User $User -Password $Password -Port $Port -ErrorAction $ErrorAction -Timeout $Timeout\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'User' -value $User -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Password' -value $Password -force\n Add-Member -inputObject $script:rs -memberType NoteProperty -name 'Port' -value $Port -force\n [scriptblock]$SB = { $This = New-PowerShellServerRunspace -Server $This.SSHServer -User $This.User -Password $This.Password -Port $This.Port -Force ; $This.RunspaceStateInfo = 'OPENED'}\n Add-Member -inputObject $script:rs -memberType ScriptMethod -name 'Reconnect' -value $SB -force\n }\n }\n $global:__PSRUNSPACES__["$Server"] = $script:rs\n Write-Output $global:__PSRUNSPACES__["$Server"]\n return\n }\n}\n\nfunction global:Remove-PowerShellServerRunspace\n{\n param(\n $SSHRunspace\n )\n if($SSHRunspace)\n {\n & (Get-Command -commandType 'Cmdlet' -name 'Remove-PowerShellServerRunspace') -SSHRunspace $SSHRunspace\n if( $global:__PSRUNSPACES__.Keys -contains $SSHRunspace.SSHServer )\n {\n $global:__PSRUNSPACES__.Remove($SSHRunspace.SSHServer)\n }\n }\n elseif( $global:__FPRUNSPACES__.Count -gt 0 )\n {\n $global:__FPRUNSPACES__ | Foreach-Object { \n & (Get-Command -commandType 'Cmdlet' -name 'Remove-PowerShellServerRunspace') -SSHRunspace $_\n }\n $global:__PSRUNSPACES__.Clear()\n }\n}
combined_dataset/train/non-malicious/sample_61_0.ps1
sample_61_0.ps1
$global:VerbosePreference = 'Continue' Function Write-Custom-Output { Param([string]$message) $date = Get-Date $newMessage = '[{0}] {1}' -f $date, $message Write-Output $newMessage } trap [Exception] { Write-Custom-Output "WARN: Terminating error encountered on line $($_.InvocationInfo.ScriptLineNumber), char $($_.InvocationInfo.OffsetInLine): $_" Write-Custom-Output "WARN: Execution will attempt to continue (As ErrorAction cannot be set for terminating errors)" continue } Function GetTimestamp { return get-date -uformat %Y%m%d-%k%M%S } Function StartHFSTranscript ([string] $LogName) { $transcriptPath = "$($env:temp)\$LogName-$($timestamp).log" Start-Transcript -Path $transcriptPath } Function StopHFSTranscript { Stop-Transcript } Function DeleteFirewallExceptions { Write-Custom-Output "Deleting firewall exceptions" Start-ProcessAndPipeOutput "$env:SystemRoot\system32\netsh.exe" 'advfirewall firewall delete rule name="Storage Sync Agent - WorkFolders (Port 80)"' Start-ProcessAndPipeOutput "$env:SystemRoot\system32\netsh.exe" 'advfirewall firewall delete rule name="Storage Sync Agent - WorkFolders (Port 443)"' } Function Start-ProcessAndPipeOutput ([string] $commandPath, [string] $commandArguments) { Write-Custom-Output ">>>>Executing commmand '$commandPath' with arguments '$commandArguments'" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = $commandPath $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true $pinfo.UseShellExecute = $false $pinfo.Arguments = $commandArguments $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() Write-Custom-Output ">>>>Command completed with exit code '$($p.ExitCode)'" Write-Custom-Output ">>>>Output stream: " Write-Custom-Output "$($p.StandardOutput.ReadToEnd())" Write-Custom-Output ">>>>Error stream: " Write-Custom-Output "$($p.StandardError.ReadToEnd())" } Function Load-Module { Param([string]$name) if(-not(Get-Module -name $name)) { if(Get-Module -ListAvailable | Where-Object { $_.name -eq $name }) { Import-Module -Name $name $true } #end if module available then import else { $false } #module not available } # end if not module else { $true } #module already loaded } #end function Function WaitForAppPoolToBeInDesiredState([string] $AppPoolName, [string] $DesiredState, [int] $WaitTimeInSecs = 100) { if(Load-Module -Name "WebAdministration") { Write-Custom-Output "Waiting until IIS app pool is in the state '$DesiredState'." $timeElapsed = 0 $checkInterval = 5 while ((Get-WebAppPoolState -Name $AppPoolName).Value -ne $DesiredState) { # The IIS Module has a 90s shutdown timer, so if it'is still running after 100s, then IIS did not successfully kill the process. if ($timeElapsed -ge $WaitTimeInSecs) { $error = "Waited for $WaitTimeInSecs seconds, and app pool hasn't reached the desired state '$DesiredState'." throw $error } Write-Custom-Output "Waiting for AppPool to reach $DesiredState (waited for $timeElapsed seconds, timeout in $WaitTimeInSecs)" Start-Sleep -Seconds $checkInterval $timeElapsed = $timeElapsed + $checkInterval } Write-Custom-Output "IIS app pool is in the state '$DesiredState' (Took $timeElapsed seconds to reach state)." } else { $message = "WebAdministration could not be loaded, skipped {0}" -f $MyInvocation.MyCommand Write-Custom-Output $message } } Function InstallFeature([string] $featureName) { Write-Custom-Output "Checking Windows Feature $featureName installation" try { #install feature if not already installed if((ServerManager\Get-WindowsFeature -Name $featureName).Installed -ne $true) { if(([Environment]::OSVersion.Version) -gt (new-object 'Version' 6,1,7601,65536)) { Write-Custom-Output "Command to install feature: Install-WindowsFeature -Name $featureName" ServerManager\Install-WindowsFeature -Name $featureName; } else #Machine is Windows 7 run Add-WindowsFeature { Write-Custom-Output "Command to install feature: Add-WindowsFeature -Name $featureName" ServerManager\Add-WindowsFeature -Name $featureName; } } else { Write-Custom-Output "Windows Feature $featureName is already installed." } Write-Custom-Output "Completed Windows Feature $featureName installation" } catch { throw "InstallFeature action not completed for $featureName" } } Function InstallHFSRequiredWindowsFeatures() { Write-Custom-Output "Initiating HFS Required Windows Feature installation action" #Install IIS InstallFeature("Web-Server"); # Skip the feature on Server Core if(Test-Path "$env:windir\explorer.exe") { InstallFeature("Web-Mgmt-Tools"); } #Install Windows Authentication module InstallFeature("Web-Windows-Auth"); #Install Windows Authentication module InstallFeature("Web-Digest-Auth"); Write-Custom-Output "Completed HFS Required Windows Feature installation action" } #Checks the state of the service # If service is in the stopped state, attempt to start it and finish the function # If the service is not in stopped state: # Stop the service # Check the process and process id to confirm service is stopped. If not stopped, kill the service using taskkill # If service is stopped, attmempt to start it. If service is unable to stop, start call would not be successful Function RestartService([string] $serviceName) { $processId=0 Write-Custom-Output "Checking if service '$serviceName' exists" #Get the service name $serviceObj = Get-Service $serviceName -ErrorAction Ignore $processFound = $false if ($serviceObj -eq $null) { Write-Custom-Output "WARN: Service '$serviceName' does not exist." return } #check if the service is stopped if($serviceObj.Status -ieq "Stopped") { #Attempt to start the service Write-Custom-Output "Service $serviceName is not currently running. Attempting to restart it" Start-Service -Name $serviceName -ErrorAction SilentlyContinue } else #service is running { #Get the process Id try { #throws incase the process not found $processId = (Get-Process -Name $serviceName).Id if($processId -ne $null) { $processFound=$true } } catch { #process really not running Write-Custom-Output "Get-Process failed with detail: $Error" } if($processFound -eq $true) { Write-Custom-Output "Found the service $serviceName with processId $processId." Write-Custom-Output "Attempting to stop the service $serviceName with processId $processId." #Stop the service and check the ProcessId $sb = { param($ServiceName) Stop-Service -Name $ServiceName -Force } $job = Start-Job -ScriptBlock $sb -ArgumentList $ServiceName -ErrorAction Continue #Delay for time Start-Sleep -Seconds 30 Write-Custom-Output "Checking if the service $serviceName was stoppped successfully in grace time period." #Get the process for service #Process will be only found if the service was unable to stop with Stop-Service call earlier $newProcessObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue #Process found if($newProcessObj -ne $null) { #Get the process id $newProcessId = $newProcessObj.Id if($newProcessId -eq $processId) #id is same as earlier process id, service didn't stop { Write-Custom-Output "$serviceName has not yet stopped after initial wait period. Continuing to poll the service status before timeout." $processStopped = $false #additional logic for service stop status query $serviceStopRetryCount = 1; $serviceStopMaxRetries = 15; #poll the service state for 2:30 min (15 X 10 sec) #poll is added as service state may not be completely stoppped #after initial wait of 30 sec while($serviceStopRetryCount -le $serviceStopMaxRetries) { Write-Custom-Output "Polling $serviceName state in retry count $serviceStopRetryCount of $serviceStopMaxRetries" #10 sec delay before polling the service Start-Sleep -Seconds 10; #Get the process Id detail $fileSyncSvcProcessObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue #Check if the process not found if(($fileSyncSvcProcessObj -eq $null) ) { Write-Custom-Output "Confirmed $serviceName state as stopped after $serviceStopRetryCount of $serviceStopMaxRetries." $processStopped=$true; #exit loop break; } #check if the process did spin up and new Id found if(($fileSyncSvcProcessObj.Id -ne $processId)) { Write-Custom-Output "Confirmed $serviceName state as stopped after $serviceStopRetryCount of $serviceStopMaxRetries. Old processId: $processId, New processId: $fileSyncSvcProcessObj.Id" $processStopped=$true; #exit loop break; } #increment the retry count $serviceStopRetryCount++ } Write-Custom-Output "Process stop check flag value is $processStopped." $retryCount = 0; $maxRetries=3; #retry to stop the process if needed while (($processStopped -eq $false) -and ($retryCount -le $maxRetries)) { #Stop/Kill the process using taskkill $retryCount++ Write-Custom-Output "Ending the process $serviceName with attempt $retryCount of $maxRetries" taskkill /F /IM "$serviceName.exe" #Delay Start-Sleep -Seconds 5 #Check if process still exists $processObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue if($processObj -eq $null) #ProcessId not found as process closed earlier { Write-Custom-Output "Process $serviceName not yet found after service killed successfully" $processStopped = $true } else { if($processObj.Id -ne $processId) { $newProcessObjId = $processObj.Id Write-Custom-Output "Service $serviceName restarted and got a new processId as $newProcessObjId" $processStopped = $true } } } #Exit if the service cannot be stopped if ($processStopped -ieq $false) { Write-Custom-Output "Service $serviceName with processId $ProcessId could not be killed after $maxRetries" } } else #new process id was found { Write-Custom-Output "$serviceName service restarted. New process id is $newProcessId" } } else { Write-Custom-Output "No running process found for $serviceName. Attempting to start a new instance of $serviceName process." #attempt to run the service Start-Service -Name $serviceName -ErrorAction SilentlyContinue } } } $retryCount = 0; $maxRetries = 3; $serviceStarted = $false while (($serviceStarted -eq $false) -and ($retryCount -le $maxRetries)) { #Check the service existence and state $serviceObj = Get-Service -Name $serviceName -ErrorAction SilentlyContinue if (($serviceObj -ne $null) -and ($serviceObj).Status -ieq 'Running') { $serviceStarted = $true } if($serviceStarted -ne $true) { $retryCount++; Write-Custom-Output "Trying service $serviceName start command as $retryCount out of $maxRetries times." #Start the service Start-Service -Name $serviceName -ErrorAction SilentlyContinue #Delay Start-Sleep -Seconds 5 } } #After retries check if service started if ($serviceStarted) { $processId = (Get-Process -Name $serviceName).Id Write-Custom-Output "Service $serviceName has started successfully and the processId is $processId." } else { throw "Service $serviceName couldn't start after $maxRetries retries." } } Function RegisterAfsSysprepProvider { $installPath = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\Agent").InstallDir $dllPath = Join-Path -Path $installPath -ChildPath "AfsSysprepProvider.dll" $val = $dllPath + ",AgentSysprep_Generalize" $RegKeyPath = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\SysPrepExternal\Generalize" if (!(Test-Path $RegKeyPath)) { Write-Custom-Output "Path $RegKeyPath doesn't exist, creating a new path of it"; New-Item -Path $RegKeyPath -Force } # 51f1f017-4af5-41cc-a691-5b935c07e74f is GUID for AfsSysprepProvider. # Every external provider needs a GUID when register to sysprep New-ItemProperty -Path $RegKeyPath -Name "51f1f017-4af5-41cc-a691-5b935c07e74f" -Value $val -PropertyType String -Force Write-Custom-Output "Successfully registered AfsSysprepProvider"; } Function UnregisterAfsSysprepProvider { try { # 51f1f017-4af5-41cc-a691-5b935c07e74f is GUID for AfsSysprepProvider. Remove-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\SysPrepExternal\Generalize" -Name "51f1f017-4af5-41cc-a691-5b935c07e74f" -Force Write-Custom-Output "Successfully unregistered AfsSysprepProvider"; } catch { Write-Custom-Output "Failed to unregister AfsSysprepProvider. $_"; } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCARZfhV8PXaHBmd # Mj1pmjDy287lDeHdGpDfUv+fyiridaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgdYSwQpHPgT1vTT/WsqaBj # mrYrsqetCVfR2CTZ63/vMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAIiZ4inEg2+Z0xD9T/49ZFSI5Kgmz2XNxklZM7UKvYOHh3TiyB3sTQy8K # HNcbrPrBMBTNpNFVy9aN0woHQ+XDTrN1kkPZPC4BFCuqxhUU7qfU5TUqIwIc4QH4 # uAKFuEOXbZBU+0fl0v6dRF5+oMuTR9UGnJGm/RKcLoN3dVfH/Q24haBGaTeqpZUn # L2ECKfB3RT1Ya1QFXmWcQ/kQ10msSTYPii+dQHuo+Mi5Y/iyuy5lDoyH/Z1nqY8J # vImMUZf1reXbedunetNgrjAlKszqZoWyccmsk4+gmaBNVV3szjpswvqplJB5lW9p # 6u7IPoD7uTf83kqHj3t5iMJ7dTe0N6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD08Inos/VrKBPf8/020ebwCC5LZ2WhQWKVrz3wfdpLQwIGZpfJ0YkO # GBMyMDI0MDgxNDA3NDU1Ny4xMjlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpmhocwIhgPMjAyNDA4MTQwOTI3MzVaGA8yMDI0MDgxNTA5MjczNVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6maGhwIBADAHAgEAAgIWWTAHAgEAAgIRPzAKAgUA # 6mfYBwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABBpTmOL5U5ykQ63FoGR # oUcrMPX5bZU+NaSOXCPdG7s5O+5Q+XPLBYQNgq0mgOm4kUNV08qLNzjQgZf1DCN1 # JbiFK3M7Mf65cSUm6Nq44NbzvRwwT2XSNyyGeb8G4IgqAewkTSatUVeBfoMBHAEr # ABDEmyeELfesohaja+IazRZ3MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgQfot1CVfFtes52k2k8KpZyX+97ThVVsKJL+8/u7J2jUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIDcdTG/gImChLsA6oxNCQ8juMazifmrVvblqy3dN26lD # MA0GCSqGSIb3DQEBCwUABIICADYhmJcnpsrOVje7aGqoHcEjqcoAjixjHft1S2mp # iZlixf5eJXgYeBvCl7SUWy4tK3sfDfYd6chMGDsJeYFX6H0jFm169Hb11W1g0fAK # 79r0lQe0g7rxDQ2YXBYyM7e82EW8ge88MY9QI5ScXcGB4+xeEjRk5X3+5xqsHQFY # coMBi0SYIaiy54yj5mUH66S2PKKmumhg8CNUDFbXGaFlOdfgyiP4n0sR7LW8CPvs # FH9NqByE6OAhCrl+UcNIMSaDG3EEc37GjuOGAA0XkAIfo9MdDa1ybAchRpT3+/7s # OkIW64almA4wkfL5ZkqPQOp0Sesnm2oajdeRZaKMXGi/+GOWkAR35S3z8lSJ0AWm # zG9OJfQDx20w0LAdNc0FWYZqNt7OirzWOINCEVRi1euDY6ILfbN6kghNXOo0NbJW # h1UhCGh/LAOHO+sHiytKQuQZ4iKE9vEov7tAxIgMLpPuURjfEwyv6xw2n06rKMdd # p6b796bhfclEku2Gsivv96pNRWrWp2MKiuadGconQggKchtacNRkdcexvTQwfrCT # 7FvhKJbko46cXOyHrnKdD0/1v9Wpjz1JYxPeXma00lBlyf3XrDwZL2z7yZRXuaNa # Fe4X99UmiksNiEuJOnu/Dm6S0kFuTT2lFPakDpOrSGoh5Oigf0zNy4JhLXO5AnKb # Vh9G # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_0.ps1
sample_5_0.ps1
. ./utils_cts.ps1 SkipSecondExecution if($debug -eq $true){[void]$shell.popup("Run RS_PrintInfo.ps1")} $PrintInfoAlertXMLFileName = $Computername + "_PrintInfoAlerts.XML" if (Test-Path $PrintInfoAlertXMLFileName) { if($debug -eq $true){[void]$shell.popup($PrintInfoAlertXMLFileName)} [xml] $XMLResults = Get-Content -Path $PrintInfoAlertXMLFileName $ID = 0 $XMLResults.SelectNodes("//Alert") | Sort-Object -Property @{expression={$_.Priority};Descending=$true} | ForEach-Object -Process { $ID +=1 $_.InnerXML | Update-DiagReport -id ($ID.ToString() + "_PrintInfo") -Name $_.Category -verbosity $_.Type } } if($debug -eq $true){[void]$shell.popup("RS_PrintInfo.ps1 finished")} # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAE3j9c6lnlV/r/ # iaaBEVAdly1fnQUdCUN43kuJi1XfK6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPNpIs1Zmg2ag2B0GijK6Loo # H0GZAXtONRlPdGPC20LoMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAr2hf32RVFywIQyHhu5L/0/mJys/WJzUrOQiNgtlq80wVrIQSw7cAyVQm # YQH/BBSHLBrcjKJtNryW1aCCaYfVKPwkoP1NYNRjitIV+P55c6d49d4HWb5Klbsc # /EdOLQ6WXgHeJQFYPMSXDBUXvCuxgDP2HjV9ksJns5FaZnWwOCuokUPjMkzbVh2x # 5HKmF/yGqT6Le2WX3xjEU4awIlX3kgs5wJt3DPYJ7EyoiqKbQU1mQUIZ68jIqFXn # +2mLpupSx07H4p2jrigo79wgTfkWGzUdTjNldkCIqBHSXEYF9FarqWWMbJAkCz4v # CBEVX6cfJcImdOUo4AIZTutcqY454aGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBDm7SkDnomThpRM7lleSo68a0C/EOFMGIUb9p2lzTOKwIGZusyQ1ej # GBMyMDI0MTAyODExNDA0NC40NzJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu # 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6 # FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B # EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b # tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ # X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP # 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP # 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp # 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2 # uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG # cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d # OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8 # +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr # YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ # 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE # DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9 # uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp # Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n # +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath # RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX # XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4 # CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE # rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD # hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK # AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y # M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7 # RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j # /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty # l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1 # Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP # 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgl7QYTlEiVeky # mDWdL5+Z0SWn2hSR+ZWVPaCa2KpxWpIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9 # MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB # CwUABIICAGGU+OJ/67JYxmojTN9TJ/EhFsHz5b2aock6qw886c4R4bVV2/6XpIF5 # nGSyOExAdltq6Uzba9SxH7cLVCRoVp5+nGU9iIvZTkuVDndlj0P7Shvj5f8Kam22 # b1/9eZRIOLfWhbZ6FDhZjBziaetlctlflc6DlhtHU+73QmKIYfKDxu9eVfooMzDb # scT+n3K9Xazyi1I6KTP+e5MiuSjg5D0jh8d7l6qJlhk/o/csosJ95gkR29vNXWyp # Fr23INtu9lK69Jjh0oP2LkMi3enjMZksaPRgoJow5WZaSAiGQwsUYJU7EQtvYUxw # pRo3xHnZE12jOFJmz05QJ+euqoPpia9AsAhMDbMMEk+xro8mXFbZe7LjB2wSEREK # iGQfzLg+huc1+W/AqKNnoqb1FXA72Ml7W8EkxvVST9jDfG01O16jW0tVxghMXxOl # yYEaF8yzzs+w9BfSmZvVTCJ6kUPyrJm9khdJBrsnM8RngwRJKwmam2v42muertr+ # amQPi4XYcBx0jhyTXHbWDSAnniRjTmafq0lRsIyhmyz6ZBIekkjuM/jp1v79ezuR # uszn0P4Zrgd4QPoobaVKJagDcS0eUn0NwOyHCfz0N1N/gur15T/jiiEgKaZiqKi+ # u4IVFRfeXF4sxSLHe3JbTVR6GpblzX2nAMUiYzV1+qrX2Rq6qU2s # SIG # End signature block
combined_dataset/train/non-malicious/Set-Computername_8.ps1
Set-Computername_8.ps1
function Set-ComputerName { param( [switch]$help, [string]$computerName=$(read-host "Please specify the new name of the computer")) $usage = "set-ComputerName -computername AnewName" if ($help) {Write-Host $usage;break} $computer = Get-WmiObject Win32_ComputerSystem $computer.Rename($computerName) }
combined_dataset/train/non-malicious/sample_54_85.ps1
sample_54_85.ps1
# # Module manifest for module 'OCI.PSModules.Opa' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opa.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b3b17045-1e55-4c1b-8e02-641f25d4bb58' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opa Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opa.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOpaInstance', 'Get-OCIOpaInstancesList', 'Get-OCIOpaWorkRequest', 'Get-OCIOpaWorkRequestErrorsList', 'Get-OCIOpaWorkRequestLogsList', 'Get-OCIOpaWorkRequestsList', 'Move-OCIOpaInstanceCompartment', 'New-OCIOpaInstance', 'Remove-OCIOpaInstance', 'Start-OCIOpaInstance', 'Stop-OCIOpaInstance', 'Stop-OCIOpaWorkRequest', 'Update-OCIOpaInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opa' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/39.ps1
39.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( $name ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-DeviceConfigurationPolicyAssignment(){ [cmdletbinding()] param ( [Parameter(Mandatory=$true,HelpMessage="Enter id (guid) for the Device Configuration Policy you want to check assignment")] $id ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id/groupAssignments" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" [string]$AllUsers = "acacacac-9df4-4c7d-9d50-4ef0226f57a9" [string]$AllDevices = "adadadad-808e-44e2-905a-0b7873a8a531" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" switch ( $id ) { $AllUsers { $grp = [PSCustomObject]@{ displayName = "All users"}; $grp } $AllDevices { $grp = [PSCustomObject]@{ displayName = "All devices"}; $grp } default { (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $DCPs = Get-DeviceConfigurationPolicy write-host foreach($DCP in $DCPs){ write-host "Device Configuration Policy:"$DCP.displayName -f Yellow write-host $DCP $id = $DCP.id $DCPA = Get-DeviceConfigurationPolicyAssignment -id $id write-host "Getting Configuration Policy assignment..." -f Cyan if($DCPA){ if($DCPA.count -gt 1){ foreach($group in $DCPA){ (Get-AADGroup -id $group.targetGroupId).displayName } } else { (Get-AADGroup -id $DCPA.targetGroupId).displayName } } else { Write-Host "No assignments found." } Write-Host }
combined_dataset/train/non-malicious/PowerBoots Gadgets_1.ps1
PowerBoots Gadgets_1.ps1
$gadgetWindow = @{ # Transparency, WindowStyle, and background work together # to get rid of the standard window's chrome and make the window "irregular" shaped # that is, the window will be the shape of it's content. AllowsTransparency = $True WindowStyle = "None" Background = "Transparent" # Async means the window will keep running but PowerShell will return to the prompt Async = $True # Assuming you put something on your window, this will make the window draggable # It might get in the way of clicking on controls, so bear that in mind. On_MouseDown = { $this.DragMove() } # This makes a timer for you, based on the TITLE and TAG of the window On_SourceInitialized = { $this.Tag = DispatcherTimer -Interval $this.Tag[0] -On_Tick $this.Tag[1] $this.Tag.Start() } # Stop that timer or it will just keep right on firing. On_Closing = { $this.Tag.Stop() } } ## Example uses: # Create a little clock that's always topmost ... boots { label -fontsize 24 | tee -var global:clock } @gadgetWindow -Title "Clock" -Topmost -Tag "00:00:00.2", { $global:clock.Content = "$(Get-Date -f 'hh:mm:ss')" } # World's simplest weather report, updates every 5 minutes $weatherUrl = "http`://weather.yahooapis.com/forecastrss?p={0}" -f 14586 # Must be a "woeid" # To find your WOEID, browse or search for your city from the Weather home page. # The WOEID is the LAST PART OF the URL for the forecast page for that city. boots { Image -Stretch Uniform -Width 250 -height 180| tee -var global:weather } @gadgetWindow -Title "Weather" -Tag "00:05", { $h = ([int](Get-Date -f hh)); if($h -gt 8 -and $h -lt 7){$dayOrNight = 'd'}else{$dayOrNight = 'n'} $code = ([xml](New-Object Net.WebClient).DownloadString($weatherUrl)).rss.channel.item.condition.code $global:Weather.Source = "http`://l.yimg.com/a/i/us/nws/weather/gr/{0}{1}.png" -f $code, $dayOrNight }
combined_dataset/train/non-malicious/600.ps1
600.ps1
function Export-SPLists{ param( [Parameter(Mandatory=$true)] [String[]] $Urls, [Parameter(Mandatory=$false)] [String] $Path = "C:\temp" ) if ((Get-PSSnapin "Microsoft.SharePoint.PowerShell" -ErrorAction SilentlyContinue) -eq $null) { Add-PSSnapin "Microsoft.SharePoint.PowerShell" } foreach($UrlItem in $Urls){ $Url = Get-CleanSPUrl -Url $UrlItem $SPWeb = Get-SPWeb -Identity ($Url.WebUrl.Scheme + "://" + $Url.WebUrl.Host + $Url.WebUrl.LocalPath) if(!(Test-Path -path $Path)){New-Item $Path -Type Directory} $FileName = ($Url.ListUrl.LocalPath -replace ".*/","") Write-Progress -Activity "Export SharePoint list" -status $FileName -percentComplete ([int]([array]::IndexOf($Urls, $UrlItem)/$Urls.Count*100)) $FilePath = Join-Path -Path $Path -ChildPath ( $FileName + " Export-SPWeb -Identity $SPWeb.Url -ItemUrl $Url.ListUrl.LocalPath -Path $FilePath -IncludeVersions All -IncludeUserSecurity -Force -NoLogFile -CompressionSize 1000 $FilePath } }
combined_dataset/train/non-malicious/1782.ps1
1782.ps1
Describe "DSC MOF Compilation" -tags "CI" { BeforeAll { $module = Get-Module PowerShellGet -ListAvailable | Sort-Object -Property Version -Descending | Select-Object -First 1 $psGetModuleVersion = $module.Version.ToString() if (!$env:DSC_HOME) { Import-Module PSDesiredStateConfiguration } } It "Should be able to compile a MOF using PSModule resource" { if ($IsLinux) { Set-ItResult -Pending -Because "https://github.com/PowerShell/PowerShellGet/pull/529" } Write-Verbose "DSC_HOME: ${env:DSC_HOME}" -verbose [Scriptblock]::Create(@" configuration DSCTestConfig { Import-DscResource -ModuleName PowerShellGet -ModuleVersion $psGetModuleVersion Node "localhost" { PSModule f1 { Name = 'PsDscResources' InstallationPolicy = 'Trusted' } } } DSCTestConfig -OutputPath TestDrive:\DscTestConfig2 "@) | Should -Not -Throw "TestDrive:\DscTestConfig2\localhost.mof" | Should -Exist } }
combined_dataset/train/non-malicious/sample_55_3.ps1
sample_55_3.ps1
Описание свойства объекта встроенного языка -------------------- **Видимость:** @Глобально **Сравнение:** Сравнение ссылочное # PropertyReflection#Annotations Набор аннотаций, объявленных для свойства -------------------- **Видимость:** @Глобально **ТолькоЧтение** **Определен:** **ОтражениеСвойства** # PropertyReflection#Name Имя свойства на двух языках -------------------- **Видимость:** @Глобально **ТолькоЧтение** **Определен:** **ОтражениеСвойства** # PropertyReflection#ReadOnly Признак, что свойство доступно только для чтения -------------------- **Видимость:** @Глобально **ТолькоЧтение** **Определен:** **ОтражениеСвойства** # PropertyReflection#Types Набор типов данных свойства -------------------- **Видимость:** @Глобально **ТолькоЧтение** **Определен:** **ОтражениеСвойства** # PropertyReflection#Get(Object) Получить значение свойства для целевого объекта -------------------- **Видимость:** @Глобально **Определен:** **ОтражениеСвойства** # PropertyReflection#Presentation() -------------------- **Видимость:** @Глобально **Определен:** **Объект** **Переопределение:** **Представление** # PropertyReflection#Set(Object,Object?) Установить значение свойства для целевого объекта -------------------- **Видимость:** @Глобально **Примеры:** ```xbsl метод ЗаполнитьЗначенияСвойств(Приемник: Объект, Источник: Объект) знч СвойстваПоИменам = новый Соответствие<Строка, ОтражениеСвойства>() для СвойствоИсточника из Приемник.ПолучитьТип().ПолучитьСвойства() СвойстваПоИменам[СвойствоИсточника.Имя.Английский] = СвойствоИсточника СвойстваПоИменам[СвойствоИсточника.Имя.Русский] = СвойствоИсточника ; для СвойствоИсточника из Источник.ПолучитьТип().ПолучитьСвойства() // Поиск одноименного свойства по любому из языков пер СвойствоПриемника = СвойстваПоИменам.ПолучитьИлиУмолчание(СвойствоИсточника.Имя.Английский) если СвойствоПриемника == Неопределено СвойствоПриемника = СвойстваПоИменам.ПолучитьИлиУмолчание(СвойствоИсточника.Имя.Русский) ; если СвойствоПриемника != Неопределено // Установим значение знч ЗначениеИсточника = СвойствоИсточника.Получить(Источник) СвойствоПриемника.Установить(Приемник, ЗначениеИсточника) ; ; ; ``` **Определен:** **ОтражениеСвойства** # PropertyReflection#ToString() -------------------- **Видимость:** @Глобально **Определен:** **Объект** **Переопределение:** **ВСтроку**
combined_dataset/train/non-malicious/Get-WebFile _1.6.ps1
Get-WebFile _1.6.ps1
## Get-WebFile (aka wget for PowerShell) ############################################################################################################## ## Downloads a file or page from the web ## History: ## v3.6 - Add -Passthru switch to output TEXT files ## v3.5 - Add -Quiet switch to turn off the progress reports ... ## v3.4 - Add progress report for files which don't report size ## v3.3 - Add progress report for files which report their size ## v3.2 - Use the pure Stream object because StreamWriter is based on TextWriter: ## it was messing up binary files, and making mistakes with extended characters in text ## v3.1 - Unwrap the filename when it has quotes around it ## v3 - rewritten completely using HttpWebRequest + HttpWebResponse to figure out the file name, if possible ## v2 - adds a ton of parsing to make the output pretty ## added measuring the scripts involved in the command, (uses Tokenizer) ############################################################################################################## function Get-WebFile { param( $url = (Read-Host "The URL to download"), $fileName = $null, [switch]$Passthru, [switch]$quiet ) $req = [System.Net.HttpWebRequest]::Create($url); @@ #http://stackoverflow.com/questions/518181/too-many-automatic-redirections-were-attempted-error-message-when-using-a-httpw @@ $req.CookieContainer = New-Object System.Net.CookieContainer $res = $req.GetResponse(); if($fileName -and !(Split-Path $fileName)) { $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } elseif((!$Passthru -and ($fileName -eq $null)) -or (($fileName -ne $null) -and (Test-Path -PathType "Container" $fileName))) { [string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $res.Headers["Content-Disposition"] ).Groups[1].Value $fileName = $fileName.trim("\\/""'") if(!$fileName) { $fileName = $res.ResponseUri.Segments[-1] $fileName = $fileName.trim("\\/") if(!$fileName) { $fileName = Read-Host "Please provide a file name" } $fileName = $fileName.trim("\\/") if(!([IO.FileInfo]$fileName).Extension) { $fileName = $fileName + "." + $res.ContentType.Split(";")[0].Split("/")[1] } } $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } if($Passthru) { $encoding = [System.Text.Encoding]::GetEncoding( $res.CharacterSet ) [string]$output = "" } if($res.StatusCode -eq 200) { [int]$goal = $res.ContentLength $reader = $res.GetResponseStream() if($fileName) { $writer = new-object System.IO.FileStream $fileName, "Create" } [byte[]]$buffer = new-object byte[] 4096 [int]$total = [int]$count = 0 do { $count = $reader.Read($buffer, 0, $buffer.Length); if($fileName) { $writer.Write($buffer, 0, $count); } if($Passthru){ $output += $encoding.GetString($buffer,0,$count) } elseif(!$quiet) { $total += $count if($goal -gt 0) { Write-Progress "Downloading $url" "Saving $total of $goal" -id 0 -percentComplete (($total/$goal)*100) } else { Write-Progress "Downloading $url" "Saving $total bytes..." -id 0 } } } while ($count -gt 0) $reader.Close() if($fileName) { $writer.Flush() $writer.Close() } if($Passthru){ $output } } $res.Close(); if($fileName) { ls $fileName } }
combined_dataset/train/non-malicious/1579.ps1
1579.ps1
function Remove-MrSavedCredential { [CmdletBinding(SupportsShouldProcess, ConfirmImpact='Medium')] param ( [Parameter(Mandatory, ValueFromPipelineByPropertyName)] [string]$Target ) PROCESS { if ($PSCmdlet.ShouldProcess($Target,'Delete')) { & "$env:windir\System32\cmdkey.exe" /delete $Target } } }
combined_dataset/train/non-malicious/8.ps1
8.ps1
$global:GitMissing = $false $requiredVersion = [Version]'1.7.2' $script:GitVersion = $requiredVersion if (!(Get-Command git -TotalCount 1 -ErrorAction SilentlyContinue)) { Write-Warning "git command could not be found. Please create an alias or add it to your PATH." $Global:GitMissing = $true return } if ([string](git --version 2> $null) -match '(?<ver>\d+(?:\.\d+)+)') { $script:GitVersion = [System.Version]$Matches['ver'] } if ($GitVersion -lt $requiredVersion) { Write-Warning "posh-git requires Git $requiredVersion or better. You have $GitVersion." $false } else { $true }
combined_dataset/train/non-malicious/sample_38_3.ps1
sample_38_3.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Gets the properties of the specified webhook. .Description Gets the properties of the specified webhook. .Example Get-AzContainerRegistryWebhook -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample" -Name "webhook001" .Example Get-AzContainerRegistryWebhook -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample" .Inputs Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.IContainerRegistryIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IWebhook .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IContainerRegistryIdentity>: Identity Parameter [AgentPoolName <String>]: The name of the agent pool. [CacheRuleName <String>]: The name of the cache rule. [ConnectedRegistryName <String>]: The name of the connected registry. [CredentialSetName <String>]: The name of the credential set. [ExportPipelineName <String>]: The name of the export pipeline. [GroupName <String>]: The name of the private link resource. [Id <String>]: Resource identity path [ImportPipelineName <String>]: The name of the import pipeline. [PipelineRunName <String>]: The name of the pipeline run. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection. [RegistryName <String>]: The name of the container registry. [ReplicationName <String>]: The name of the replication. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [RunId <String>]: The run ID. [ScopeMapName <String>]: The name of the scope map. [SubscriptionId <String>]: The ID of the target subscription. The value must be an UUID. [TaskName <String>]: The name of the container registry task. [TaskRunName <String>]: The name of the task run. [TokenName <String>]: The name of the token. [WebhookName <String>]: The name of the webhook. .Link https://learn.microsoft.com/powershell/module/az.containerregistry/get-azcontainerregistrywebhook #> function Get-AzContainerRegistryWebhook { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IWebhook])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Alias('WebhookName', 'ResourceName')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the webhook. ${Name}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Alias('ContainerRegistryName')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the container registry. ${RegistryName}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='List')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. # The value must be an UUID. ${SubscriptionId}, [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.IContainerRegistryIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetByRegistry', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistry] # The Registry Object. ${Registry}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters.ContainsKey('Registry')){ $Registry = $PSBoundParameters["Registry"] $null = $PSBoundParameters.Remove('Registry') $RegistryName = $Registry.Name $ResourceGroupName = $Registry.ResourceGroupName } . Az.ContainerRegistry.internal\Get-AzContainerRegistryWebhook -RegistryName $RegistryName -ResourceGroupName $ResourceGroupName @PSBoundParameters } } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAiCXwwILE74VEx # 4cPvQvcNnUtMOeS/gc6ZQM/j344vpKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK1w # /PnEYzcMNLFbZiLtafV1GFVGhRR7DYZOLZMdJ0JeMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmn+hXtRgCns9aVxHI5Zf1rQgORKVoEP19as5 # dy1LkG302jhb3yvP67vOdEvubxNGot1jsDxvcSY/nLPYOb68RsEffEtnG0QuUbCS # cFAuzzFgMqK93WibEADggFHFrcMi4G/AntM/8KE34/iF1owzXo4yX/JkDdcxlttx # rdKHMrr45bCHNV2l3LcAaVUbXGAwsTJ4oipQ9r8fYNL0BN7nKXon4k4rp7aVLxZS # etkJZJVY1nWvAVEbJRtQeiXW25YNCUHVxZKw1Wp6AKw9+2dKiLeU8pwY7s+ppeZE # auYIQXwbxypYkHxoGWpzeBQor8v8c1zEw+eCl+MhLN5tSQNayaGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCIjKAYrXR8peKwE/KkAfGWDZwgxZLaVW8J # Iu3GfoQgRwIGZhfWS4gmGBMyMDI0MDQyMzEzMTUxNy4wMDNaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAi # GA8yMDI0MDQyMzEyMTQyMFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp0iScAgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03Yc # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGm # KRxZss6LPFkY42ZOWnXsVX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W5 # 8hCrRegPfWwTzs8g1aOMYXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6 # EQMGwD/BAq7tdePiGcewKasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkC # Enw9OPR+IbvMfWkyCTqpPJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Q # a4zlmb79kpVqf6nLoXJr9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # Aecujy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAU+KvM2NHAO1IYfbMcVXsc # ehxrnP6VgaXFItXp8/tOETCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2 # XQ12aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W # 10UOl24tqW0PGjrhbdiG0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIA # L9GMOOeFgfQqK2hW/Pr1KSg8tE8qO32BDUBOBVP7FpIDmeys/40VC+TEmaWMN+fR # XUWIE13ABjelCgtELELaeHloSYrvicE/zwOuUvxaQIeKz1PJOssZ4a/NiZGla2UU # 9IPG916lnmHek9mZuoo2rxDmIw5e3dd7uhIHRVW05rH5gguq+O7odJZIdPThR5gD # fLL8mlifm6Q88fJVJysEqQgbnA2jgTltl/krEvypfNfD1/2+IyY8jfBeqJwM6DFR # 9YkA4MJqAFwDR/awBUhmmqDQDjxhHtbRItqPw9fnpTEfwH9YxRI9qlKVgfRwjs6H # ivWPLzJ7M2CbshCQ45hseMkjQlVA0Ghdh/+hg/NNcuOkAr8rqhw2rsYGs3D9ltgn # ZmqTx9WwI4xbQo45X5jsTo/rb1ZOXh8TeIF+xwbijfx23soBFPDfWyxx4i5LMkYs # uRFD1StD8OoAocezpDXkkrXNXKNF+MYxUq8u5vaaz5VL33lnkodQJcFxCj/BGruf # SP8KpyX4NetaEIKlTVpfRk+kxmGe1K8EnKVnie5icbw6HARpabCoIKGnZsiU4khN # 4eTREIcfBA9Vjh4SxtA+eFay1bH/6Ls65LBi3/2XmeHAZ3tYof39+nfNanlXPOlA # H0v3FwZvhhRCdd6W+1y9FkziaA5p94hLRAkRd7PCZnU= # SIG # End signature block
combined_dataset/train/non-malicious/3766.ps1
3766.ps1
$SESSION_RG = "flowrg" $SESSION_IA = "PS-Tests-Sessions" $AGREEMENT_X12_Name = "PS-X12-Agreement" $AGREEMENT_Edifact_Name = "PS-Edifact-Agreement" function Test-GetGeneratedControlNumber() { $resultNoType = Get-AzIntegrationAccountGeneratedIcn -ResourceGroupName $SESSION_RG -Name $SESSION_IA -AgreementName $AGREEMENT_X12_Name Assert-AreEqual "1234" $resultNoType.ControlNumber Assert-AreEqual "X12" $resultNoType.MessageType $resultX12 = Get-AzIntegrationAccountGeneratedIcn -ResourceGroupName $SESSION_RG -Name $SESSION_IA -AgreementName $AGREEMENT_X12_Name -AgreementType "X12" Assert-AreEqual "1234" $resultX12.ControlNumber Assert-AreEqual "X12" $resultX12.MessageType $resultEdifact = Get-AzIntegrationAccountGeneratedIcn -ResourceGroupName $SESSION_RG -Name $SESSION_IA -AgreementName $AGREEMENT_Edifact_Name -AgreementType "Edifact" Assert-AreEqual "1234" $resultEdifact.ControlNumber Assert-AreEqual "Edifact" $resultEdifact.MessageType } function Test-UpdateGeneratedControlNumber() { $updatedControlNumber = Set-AzIntegrationAccountGeneratedIcn -AgreementType "X12" -ResourceGroupName $SESSION_RG -Name $SESSION_IA -AgreementName $AGREEMENT_X12_Name -ControlNumber "4321" Assert-AreEqual "4321" $updatedControlNumber.ControlNumber $updatedControlNumber = Set-AzIntegrationAccountGeneratedIcn -AgreementType "X12" -ResourceGroupName $SESSION_RG -Name $SESSION_IA -AgreementName $AGREEMENT_X12_Name -ControlNumber "1234" Assert-AreEqual "1234" $updatedControlNumber.ControlNumber } function Test-ListGeneratedControlNumber() { $results = Get-AzIntegrationAccountGeneratedIcn -ResourceGroupName $SESSION_RG -Name $SESSION_IA Assert-AreEqual "1234" $results[0].ControlNumber }
combined_dataset/train/non-malicious/2049.ps1
2049.ps1
function getIndex { param([string[]]$strings,[string]$pattern) for ($i = 0; $i -lt $strings.Count; $i++) { if ($strings[$i] -like $pattern) { return $i } } return -1 } try { if ( ! $IsWindows ) { $PSDefaultParameterValues["it:pending"] = $true } Describe "CIM Objects are adapted properly" -Tag @("CI") { BeforeAll { if ( ! $IsWindows ) { return } $p = get-ciminstance win32_process |Select-object -first 1 $indexOf_namespaceQualified_Win32Process = getIndex $p.PSTypeNames "*root?cimv2?Win32_Process" $indexOf_namespaceQualified_CimProcess = getIndex $p.PSTypeNames "*root?cimv2?CIM_Process" $indexOf_namespaceQualified_CimLogicalElement = getIndex $p.PSTypeNames "*root?cimv2?CIM_LogicalElement" $indexOf_namespaceQualified_CimManagedSystemElement = getIndex $p.PSTypeNames "*root?cimv2?CIM_ManagedSystemElement" $indexOf_className_Win32Process = getIndex $p.PSTypeNames "* $indexOf_className_CimProcess = getIndex $p.PSTypeNames "* $indexOf_className_CimLogicalElement = getIndex $p.PSTypeNames "* $indexOf_className_CimManagedSystemElement = getIndex $p.PSTypeNames "* } AfterAll { $PSDefaultParameterValues.Remove("it:pending") } It "Namespace-qualified Win32_Process is present" -skip:(!$IsWindows) { $indexOf_namespaceQualified_Win32Process | Should -Not -Be (-1) } It "Namespace-qualified CIM_Process is present" { $indexOf_namespaceQualified_CimProcess | Should -Not -Be (-1) } It "Namespace-qualified CIM_LogicalElement is present" { $indexOf_namespaceQualified_CimLogicalElement | Should -Not -Be (-1) } It "Namespace-qualified CIM_ManagedSystemElement is present" { $indexOf_namespaceQualified_CimManagedSystemElement | Should -Not -Be (-1) } It "Classname of Win32_Process is present" -skip:(!$IsWindows) { $indexOf_className_Win32Process | Should -Not -Be (-1) } It "Classname of CIM_Process is present" { $indexOf_className_CimProcess | Should -Not -Be (-1) } It "Classname of CIM_LogicalElement is present" { $indexOf_className_CimLogicalElement | Should -Not -Be (-1) } It "Classname of CIM_ManagedSystemElement is present" { $indexOf_className_CimManagedSystemElement | Should -Not -Be (-1) } It "Win32_Process comes after CIM_Process (namespace qualified)" -skip:(!$IsWindows) { $indexOf_namespaceQualified_Win32Process | Should -BeLessThan $indexOf_namespaceQualified_CimProcess } It "CIM_Process comes after CIM_LogicalElement (namespace qualified)" { $indexOf_namespaceQualified_CimProcess | Should -BeLessThan $indexOf_namespaceQualified_CimLogicalElement } It "CIM_LogicalElement comes after CIM_ManagedSystemElement (namespace qualified)" { $indexOf_namespaceQualified_CimLogicalElement | Should -BeLessThan $indexOf_namespaceQualified_CimManagedSystemElement } It "Win32_Process comes after CIM_Process (classname only)" -skip:(!$IsWindows) { $indexOf_className_Win32Process | Should -BeLessThan $indexOf_className_CimProcess } It "CIM_Process comes after CIM_LogicalElement (classname only)" { $indexOf_className_CimProcess | Should -BeLessThan $indexOf_className_CimLogicalElement } It "CIM_LogicalElement comes after CIM_ManagedSystemElement (classname only)" { $indexOf_className_CimLogicalElement | Should -BeLessThan $indexOf_className_CimManagedSystemElement } It "Namespace qualified PSTypenames comes after class-only PSTypeNames" -skip:(!$IsWindows) { $indexOf_namespaceQualified_CimManagedSystemElement | Should -BeLessThan $indexOf_className_Win32Process } } } finally { $PSDefaultParameterValues.Remove("it:pending") }
combined_dataset/train/non-malicious/2278.ps1
2278.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Specify the Primary Site server")] [ValidateNotNullOrEmpty()] [string]$SiteServer ) Begin { try { $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } try { Add-Type -AssemblyName "System.Drawing" -ErrorAction Stop Add-Type -AssemblyName "System.Windows.Forms" -ErrorAction Stop } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied when attempting to load required assemblies" ; break } catch [System.Exception] { Write-Warning -Message "Unable to load required assemblies. Error message: $($_.Exception.Message) Line: $($_.InvocationInfo.ScriptLineNumber)" ; break } } Process { function Load-Form { $Form.Controls.AddRange(@( $ButtonStart, $ButtonValidate, $TextBoxMatch, $TextBoxReplace, $ComboBoxTypes, $CheckBoxCopyContent, $OutputBox, $DGVResults, $GBLog, $GBResults, $GBMatch, $GBReplace, $GBOptions, $GBActions, $StatusBar )) $Form.Add_Shown({$Form.Activate()}) $Form.Add_Shown({Load-Connect}) $Form.ShowDialog() | Out-Null $TextBoxMatch.Focus() | Out-Null } function Load-Connect { Write-OutputBox -OutputBoxMessage "Connected to Site server '$($SiteServer)' with Site Code '$($SiteCode)'" -Type INFO } function Invoke-CleanControls { param( [parameter(Mandatory=$true)] [ValidateSet("All","Log")] $Option ) if ($Option -eq "All") { $DGVResults.Rows.Clear() $OutputBox.ResetText() } if ($Option -eq "Log") { $OutputBox.ResetText() } } function Write-OutputBox { param( [parameter(Mandatory=$true)] [string]$OutputBoxMessage, [parameter(Mandatory=$true)] [ValidateSet("WARNING","ERROR","INFO")] [string]$Type ) Begin { $DateTime = (Get-Date).ToLongTimeString() } Process { if ($OutputBox.Text.Length -eq 0) { $OutputBox.Text = "$($DateTime) - $($Type): $($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } else { $OutputBox.AppendText("`n$($DateTime) - $($Type): $($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } } } function Update-StatusBar { param( [parameter(Mandatory=$true)] [ValidateSet("Ready","Updating","Validating","Enumerating")] [string]$Activity, [parameter(Mandatory=$true)] [string]$Text ) $StatusBarPanelActivity.Text = $Activity $StatusBarPanelProcessing.Text = $Text [System.Windows.Forms.Application]::DoEvents() } function Update-ApplicationContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Begin { try { Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.dll") -ErrorAction Stop Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.Extender.dll") -ErrorAction Stop Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.MsiInstaller.dll") -ErrorAction Stop } catch [System.UnauthorizedAccessException] { Write-OutputBox -OutputBoxMessage "Access denied when attempting to load ApplicationManagement dll's" -Type ERROR ; break } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "Unable to load required ApplicationManagement dll's. Make sure that you're running this tool on system where the ConfigMgr console is installed and that you're running the tool elevated" -Type ERROR ; break } } Process { if ($Action -eq "Validate") { $AppCount = 0 Update-StatusBar -Activity Enumerating -Text " " $Applications = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ApplicationLatest" -ComputerName $SiteServer $ApplicationCount = ($Applications | Measure-Object).Count foreach ($Application in $Applications) { $AppCount++ $ApplicationName = $Application.LocalizedDisplayName Update-StatusBar -Activity Validating -Text "Validating application $($AppCount) / $($ApplicationCount)" if ($Application.HasContent -eq $true) { $Application.Get() $ApplicationXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::DeserializeFromString($Application.SDMPackageXML, $true) foreach ($DeploymentType in $ApplicationXML.DeploymentTypes) { $DeploymentTypeName = $DeploymentType.Title $ExistingContentLocation = $DeploymentType.Installer.Contents[0].Location if ($ExistingContentLocation -match [regex]::Escape($TextBoxMatch.Text)) { $UpdatedContentLocation = $DeploymentType.Installer.Contents[0].Location -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $ApplicationName, $DeploymentTypeName, $ExistingContentLocation, $UpdatedContentLocation) Write-OutputBox -OutputBoxMessage "Validated deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "Validation of deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)' did not match the search pattern" -Type INFO } } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "Validation of application '$($ApplicationName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO if ($DGVResults.RowCount -ge 1) { $ButtonStart.Enabled = $true } } if ($Action -eq "Update") { $AppCount = 0 $AppRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $AppRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellAppName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellAppSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value if ($CellAppSelected -eq $true) { $AppCount++ $Application = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ApplicationLatest" -ComputerName $SiteServer -Filter "LocalizedDisplayName like '$($CellAppName)'" if ($Application -ne $null) { $ApplicationName = $Application.LocalizedDisplayName Update-StatusBar -Activity Updating -Text "Updating application $($AppCount) / $($AppRowCount)" $Application.Get() $ApplicationXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::DeserializeFromString($Application.SDMPackageXML, $true) foreach ($DeploymentType in $ApplicationXML.DeploymentTypes) { $DeploymentTypeName = $DeploymentType.Title $ExistingContentLocation = $DeploymentType.Installer.Contents[0].Location if ($ExistingContentLocation -match [regex]::Escape($TextBoxMatch.Text)) { $UpdatedContentLocation = $DeploymentType.Installer.Contents[0].Location -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if ($DeploymentType.Installer.Technology -eq "AppV") { $AmendUpdatedContentLocation = Split-Path -Path $UpdatedContentLocation -Parent if (-not(Test-Path -Path $AmendUpdatedContentLocation)) { New-Item -Path $AmendUpdatedContentLocation -ItemType Directory | Out-Null } if (Test-Path -Path $ExistingContentLocation) { $ExistingContentLocationItems = Get-ChildItem -Path $ExistingContentLocation Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingContentLocation) to $($AmendUpdatedContentLocation)" -Type INFO foreach ($ExistingContentLocationItem in $ExistingContentLocationItems) { Copy-Item -Path $ExistingContentLocationItem.FullName -Destination $AmendUpdatedContentLocation -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingContentLocation)" -Type WARNING } } else { if (-not(Test-Path -Path $UpdatedContentLocation)) { New-Item -Path $UpdatedContentLocation -ItemType Directory | Out-Null } if (Test-Path -Path $ExistingContentLocation) { $ExistingContentLocationItems = Get-ChildItem -Path $ExistingContentLocation Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingContentLocation) to $($UpdatedContentLocation)" -Type INFO foreach ($ExistingContentLocationItem in $ExistingContentLocationItems) { Copy-Item -Path $ExistingContentLocationItem.FullName -Destination $UpdatedContentLocation -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingContentLocation)" -Type WARNING } } } $ContentImporter = [Microsoft.ConfigurationManagement.ApplicationManagement.ContentImporter]::CreateContentFromFolder($UpdatedContentLocation) $DeploymentType.Installer.Contents[0].ID = $ContentImporter.ID $DeploymentType.Installer.Contents[0] = $ContentImporter $UpdatedXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::SerializeToString($ApplicationXML, $true) $Application.SDMPackageXML = $UpdatedXML $Application.Put() | Out-Null Write-OutputBox -OutputBoxMessage "Updated deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-PackageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $PackageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $Packages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer $PackagesCount = ($Packages | Measure-Object).Count foreach ($Package in $Packages) { $PackageCount++ $PackageName = $Package.Name $PackageID = $Package.PackageID Update-StatusBar -Activity Validating -Text "Validating package $($PackageCount) / $($PackagesCount)" if ($Package.PkgSourcePath -ne $null) { if ($Package.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingPackageSourcePath = $Package.PkgSourcePath $UpdatedPackageSourcePath = $Package.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $PackageName, $ExistingPackageSourcePath, $UpdatedPackageSourcePath, $PackageID) $DGVResults.ClearSelection() Write-OutputBox -OutputBoxMessage "Successfully validated package '$($PackageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for package '$($PackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of package '$($PackageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $PackageCount = 0 $PackageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $PackageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellPackageSelected -eq $true) { $PackageCount++ $Package = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer -Filter "PackageID like '$($CellPackageID)'" if ($Package -ne $null) { $PackageName = $Package.Name Update-StatusBar -Activity Validating -Text "Updating package $($PackageCount) / $($PackageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($Package.PkgSourcePath -ne $null) { if ($Package.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingPackageSourcePath = $Package.PkgSourcePath $UpdatedPackageSourcePath = $Package.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedPackageSourcePath)) { New-Item -Path $UpdatedPackageSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedPackageSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingPackageSourcePath) { $ExistingPackageSourcePathItems = Get-ChildItem -Path $ExistingPackageSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingPackageSourcePath) to $($UpdatedPackageSourcePath)" -Type INFO foreach ($ExistingPackageSourcePathItem in $ExistingPackageSourcePathItems) { Copy-Item -Path $ExistingPackageSourcePathItem.FullName -Destination $UpdatedPackageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingPackageSourcePath)" -Type WARNING } } } $Package.PkgSourcePath = $UpdatedPackageSourcePath $Package.Put() | Out-Null $ValidatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer -Filter "PackageID like '$($CellPackageID)'" if ($ValidatePackage.PkgSourcePath -eq $UpdatedPackageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated package '$($PackageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating package '$($PackageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for package '$($PackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of package '$($PackageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-DeploymentPackageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $DeploymentPackageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $DeploymentPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer $DeploymentPackagesCount = ($DeploymentPackages | Measure-Object).Count foreach ($DeploymentPackage in $DeploymentPackages) { $DeploymentPackageCount++ $DeploymentPackageName = $DeploymentPackage.Name $DeploymentPackageID = $DeploymentPackage.PackageID Update-StatusBar -Activity Validating -Text "Validating deployment package $($DeploymentPackageCount) / $($DeploymentPackagesCount)" if ($DeploymentPackage.PkgSourcePath -ne $null) { if ($DeploymentPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath $UpdatedDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $DeploymentPackageName, $ExistingDeploymentPackageSourcePath, $UpdatedDeploymentPackageSourcePath, $DeploymentPackageID) Write-OutputBox -OutputBoxMessage "Successfully validated deployment package '$($DeploymentPackageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for deployment package '$($DeploymentPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of deployment package '$($DeploymentPackageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $DeploymentPackageCount = 0 $DeploymentPackageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $DeploymentPackageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellDeploymentPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellDeploymentPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellDeploymentPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellDeploymentPackageSelected -eq $true) { $DeploymentPackageCount++ $DeploymentPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDeploymentPackageID)'" if ($DeploymentPackage -ne $null) { $DeploymentPackageName = $DeploymentPackage.Name Update-StatusBar -Activity Validating -Text "Updating package $($DeploymentPackageCount) / $($DeploymentPackageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($DeploymentPackage.PkgSourcePath -ne $null) { if ($DeploymentPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath $UpdatedDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedDeploymentPackageSourcePath)) { New-Item -Path $UpdatedDeploymentPackageSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedDeploymentPackageSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingDeploymentPackageSourcePath) { $ExistingDeploymentPackageSourcePathItems = Get-ChildItem -Path $ExistingDeploymentPackageSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDeploymentPackageSourcePath) to $($UpdatedDeploymentPackageSourcePath)" -Type INFO foreach ($ExistingDeploymentPackageSourcePathItem in $ExistingDeploymentPackageSourcePathItems) { Copy-Item -Path $ExistingDeploymentPackageSourcePathItem.FullName -Destination $UpdatedDeploymentPackageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDeploymentPackageSourcePath)" -Type WARNING } } } $DeploymentPackage.PkgSourcePath = $UpdatedDeploymentPackageSourcePath $DeploymentPackage.Put() | Out-Null $ValidateDeploymentPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDeploymentPackageID)'" if ($ValidateDeploymentPackage.PkgSourcePath -eq $UpdatedDeploymentPackageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated deployment package '$($DeploymentPackageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating deployment package '$($DeploymentPackageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for package '$($DeploymentPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of package '$($DeploymentPackageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-DriverContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $DriverCount = 0 Update-StatusBar -Activity Enumerating -Text " " $Drivers = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer $DriversCount = ($Drivers | Measure-Object).Count foreach ($Driver in $Drivers) { $DriverCount++ $DriverName = $Driver.LocalizedDisplayName $DriverCIID = $Driver.CI_ID Update-StatusBar -Activity Validating -Text "Validating driver $($DriverCount) / $($DriversCount)" if ($Driver.ContentSourcePath -ne $null) { if ($Driver.ContentSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDriverSourcePath = $Driver.ContentSourcePath $UpdatedDriverSourcePath = $Driver.ContentSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $DriverName, $ExistingDriverSourcePath, $UpdatedDriverSourcePath, $DriverCIID) Write-OutputBox -OutputBoxMessage "Successfully validated driver '$($DriverName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for driver '$($DriverName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of driver '$($DriverName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $DriverCount = 0 $DriverRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $DriverRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellDriverName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellDriverSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellDriverCIID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellDriverSelected -eq $true) { $DriverCount++ $Driver = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer -Filter "CI_ID like '$($CellDriverCIID)'" if ($Driver -ne $null) { $DriverName = $Driver.LocalizedDisplayName Update-StatusBar -Activity Validating -Text "Updating driver $($DriverCount) / $($DriverRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($Driver.ContentSourcePath -ne $null) { if ($Driver.ContentSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDriverSourcePath = $Driver.ContentSourcePath $UpdatedDriverSourcePath = $Driver.ContentSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedDriverSourcePath)) { New-Item -Path $UpdatedDriverSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedDriverSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingDriverSourcePath) { $ExistingDriverSourcePathItems = Get-ChildItem -Path $ExistingDriverSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDriverSourcePath) to $($UpdatedDriverSourcePath)" -Type INFO foreach ($ExistingDriverSourcePathItem in $ExistingDriverSourcePathItems) { Copy-Item -Path $ExistingDriverSourcePathItem.FullName -Destination $UpdatedDriverSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDriverSourcePath)" -Type WARNING } } } $Driver.ContentSourcePath = $UpdatedDriverSourcePath $Driver.Put() | Out-Null $ValidateDriver = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer -Filter "CI_ID like '$($CellDriverCIID)'" if ($ValidateDriver.ContentSourcePath -eq $UpdatedDriverSourcePath) { Write-OutputBox -OutputBoxMessage "Updated driver '$($DriverName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating driver '$($DriverName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for driver '$($DriverName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of driver '$($DriverName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-DriverPackageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $DriverPackageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $DriverPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer $DriverPackagesCount = ($DriverPackages | Measure-Object).Count foreach ($DriverPackage in $DriverPackages) { $DriverPackageCount++ $DriverPackageName = $DriverPackage.Name $DriverPackageID = $DriverPackage.PackageID Update-StatusBar -Activity Validating -Text "Validating driver package $($DriverPackageCount) / $($DriverPackagesCount)" if ($DriverPackage.PkgSourcePath -ne $null) { if ($DriverPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDriverPackageSourcePath = $DriverPackage.PkgSourcePath $UpdatedDriverPackageSourcePath = $DriverPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $DriverPackageName, $ExistingDriverPackageSourcePath, $UpdatedDriverPackageSourcePath, $DriverPackageID) Write-OutputBox -OutputBoxMessage "Successfully validated driver package '$($DriverPackageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for driver package '$($DriverPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of driver package '$($DriverPackageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $DriverPackageCount = 0 $DriverPackageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $DriverPackageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellDriverPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellDriverPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellDriverPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellDriverPackageSelected -eq $true) { $DriverPackageCount++ $DriverPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDriverPackageID)'" if ($DriverPackage -ne $null) { $DriverPackageName = $DriverPackage.Name Update-StatusBar -Activity Validating -Text "Updating driver package $($DriverPackageCount) / $($DriverPackageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($DriverPackage.PkgSourcePath -ne $null) { if ($DriverPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingDriverPackageSourcePath = $DriverPackage.PkgSourcePath $UpdatedDriverPackageSourcePath = $DriverPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedDriverPackageSourcePath)) { New-Item -Path $UpdatedDriverPackageSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedDriverPackageSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingDriverPackageSourcePath) { $ExistingDriverPackageSourcePathItems = Get-ChildItem -Path $ExistingDriverPackageSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDriverPackageSourcePath) to $($UpdatedDriverPackageSourcePath)" -Type INFO foreach ($ExistingDriverPackageSourcePathItem in $ExistingDriverPackageSourcePathItems) { Copy-Item -Path $ExistingDriverPackageSourcePathItem.FullName -Destination $UpdatedDriverPackageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDriverPackageSourcePath)" -Type WARNING } } } $DriverPackage.PkgSourcePath = $UpdatedDriverPackageSourcePath $DriverPackage.Put() | Out-Null $ValidateDriverPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDriverPackageID)'" if ($ValidateDriverPackage.PkgSourcePath -eq $UpdatedDriverPackageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated driver package '$($DriverPackageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating driver package '$($DriverPackageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for driver package '$($DriverPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of driver package '$($DriverPackageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-OperatingSystemImageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $OperatingSystemImageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $OperatingSystemImages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer $OperatingSystemImagesCount = ($OperatingSystemImages | Measure-Object).Count foreach ($OperatingSystemImage in $OperatingSystemImages) { $OperatingSystemImageCount++ $OperatingSystemImageName = $OperatingSystemImage.Name $OperatingSystemImageID = $OperatingSystemImage.PackageID Update-StatusBar -Activity Validating -Text "Validating operating system image $($OperatingSystemImageCount) / $($OperatingSystemImagesCount)" if ($OperatingSystemImage.PkgSourcePath -ne $null) { if ($OperatingSystemImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath $UpdatedOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $OperatingSystemImageName, $ExistingOperatingSystemImageSourcePath, $UpdatedOperatingSystemImageSourcePath, $OperatingSystemImageID) Write-OutputBox -OutputBoxMessage "Successfully validated operating system image '$($OperatingSystemImageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for operating system image '$($OperatingSystemImageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of operating system image '$($OperatingSystemImageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $OperatingSystemImageCount = 0 $OperatingSystemImageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $OperatingSystemImageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellOperatingSystemImageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellOperatingSystemImageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellOperatingSystemImageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellOperatingSystemImageSelected -eq $true) { $OperatingSystemImageCount++ $OperatingSystemImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemImageID)'" if ($OperatingSystemImage -ne $null) { $OperatingSystemImageName = $OperatingSystemImage.Name Update-StatusBar -Activity Validating -Text "Updating operating system image $($OperatingSystemImageCount) / $($OperatingSystemImageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($OperatingSystemImage.PkgSourcePath -ne $null) { if ($OperatingSystemImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath $UpdatedOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $AmendUpdatedOperatingSystemImageSourcePath = Split-Path -Path $UpdatedOperatingSystemImageSourcePath -Parent if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $AmendUpdatedOperatingSystemImageSourcePath)) { New-Item -Path $AmendUpdatedOperatingSystemImageSourcePath -ItemType Directory | Out-Null } if (Test-Path -Path $ExistingOperatingSystemImageSourcePath) { $ExistingOperatingSystemImageSourcePathItems = Get-ChildItem -Path $ExistingOperatingSystemImageSourcePath Write-OutputBox -OutputBoxMessage "Copying wim file $($ExistingOperatingSystemImageSourcePath) to $($AmendUpdatedOperatingSystemImageSourcePath)" -Type INFO foreach ($ExistingOperatingSystemImageSourcePathItem in $ExistingOperatingSystemImageSourcePathItems) { Copy-Item -Path $ExistingOperatingSystemImageSourcePathItem.FullName -Destination $AmendUpdatedOperatingSystemImageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingOperatingSystemImageSourcePath)" -Type WARNING } } if (Test-Path -Path $UpdatedOperatingSystemImageSourcePath) { $OperatingSystemImage.Get() $OperatingSystemImage.PkgSourcePath = $UpdatedOperatingSystemImageSourcePath $OperatingSystemImage.Put() | Out-Null $ValidateOperatingSystemImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemImageID)'" if ($ValidateOperatingSystemImage.PkgSourcePath -eq $UpdatedOperatingSystemImageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated operating system image '$($OperatingSystemImageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating operating system image '$($OperatingSystemImageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "Unable to locate $($OperatingSystemImageName) wim file on updated content source path. Manually copy the content files or check the Copy content files to new location check box " -Type WARNING } } else { Write-OutputBox -OutputBoxMessage "No matching content source for operating system image '$($OperatingSystemImageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of operating system image '$($OperatingSystemImageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-OperatingSystemPackageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $OperatingSystemPackageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $OperatingSystemPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer $OperatingSystemPackagesCount = ($OperatingSystemPackages | Measure-Object).Count foreach ($OperatingSystemPackage in $OperatingSystemPackages) { $OperatingSystemPackageCount++ $OperatingSystemPackageName = $OperatingSystemPackage.Name $OperatingSystemPackageID = $OperatingSystemPackage.PackageID Update-StatusBar -Activity Validating -Text "Validating operating system package $($OperatingSystemPackageCount) / $($OperatingSystemPackagesCount)" if ($OperatingSystemPackage.PkgSourcePath -ne $null) { if ($OperatingSystemPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath $UpdatedOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $OperatingSystemPackageName, $ExistingOperatingSystemPackageSourcePath, $UpdatedOperatingSystemPackageSourcePath, $OperatingSystemPackageID) Write-OutputBox -OutputBoxMessage "Successfully validated operating system package '$($OperatingSystemPackageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for operating system package '$($OperatingSystemPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of operating system package '$($OperatingSystemPackageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $OperatingSystemPackageCount = 0 $OperatingSystemPackageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $OperatingSystemPackageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellOperatingSystemPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellOperatingSystemPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellOperatingSystemPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellOperatingSystemPackageSelected -eq $true) { $OperatingSystemPackageCount++ $OperatingSystemPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemPackageID)'" if ($OperatingSystemPackage -ne $null) { $OperatingSystemPackageName = $OperatingSystemPackage.Name Update-StatusBar -Activity Validating -Text "Updating operating system package $($OperatingSystemPackageCount) / $($OperatingSystemPackageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($OperatingSystemPackage.PkgSourcePath -ne $null) { if ($OperatingSystemPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath $UpdatedOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedOperatingSystemPackageSourcePath)) { New-Item -Path $UpdatedOperatingSystemPackageSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedOperatingSystemPackageSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingOperatingSystemPackageSourcePath) { $ExistingOperatingSystemPackageSourcePathItems = Get-ChildItem -Path $ExistingOperatingSystemPackageSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingOperatingSystemPackageSourcePath) to $($UpdatedOperatingSystemPackageSourcePath)" -Type INFO foreach ($ExistingOperatingSystemPackageSourcePathItem in $ExistingOperatingSystemPackageSourcePathItems) { Copy-Item -Path $ExistingOperatingSystemPackageSourcePathItem.FullName -Destination $UpdatedOperatingSystemPackageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingOperatingSystemPackageSourcePath)" -Type WARNING } } } $OperatingSystemPackage.Get() $OperatingSystemPackage.PkgSourcePath = $UpdatedOperatingSystemPackageSourcePath $OperatingSystemPackage.Put() | Out-Null $ValidateOperatingSystemPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemPackageID)'" if ($ValidateOperatingSystemPackage.PkgSourcePath -eq $UpdatedOperatingSystemPackageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated operating system package '$($OperatingSystemPackageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating operating system package '$($OperatingSystemPackageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for operating system package '$($OperatingSystemPackageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of operating system package '$($OperatingSystemPackageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } function Update-BootImageContentSource { param( [parameter(Mandatory=$true)] [ValidateSet("Validate","Update")] [string]$Action, [parameter(Mandatory=$false)] [switch]$CopyFiles ) Process { if ($Action -eq "Validate") { $BootImageCount = 0 Update-StatusBar -Activity Enumerating -Text " " $BootImages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer $BootImagesCount = ($BootImages | Measure-Object).Count foreach ($BootImage in $BootImages) { $BootImageCount++ $BootImageName = $BootImage.Name $BootImageID = $BootImage.PackageID Update-StatusBar -Activity Validating -Text "Validating operating system image $($BootImageCount) / $($BootImagesCount)" if ($BootImage.PkgSourcePath -ne $null) { if ($BootImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingBootImageSourcePath = $BootImage.PkgSourcePath $UpdatedBootImageSourcePath = $BootImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text $DGVResults.Rows.Add($true, $BootImageName, $ExistingBootImageSourcePath, $UpdatedBootImageSourcePath, $BootImageID) Write-OutputBox -OutputBoxMessage "Successfully validated boot image '$($BootImageName)'" -Type INFO [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for boot image '$($BootImageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of boot image '$($BootImageName)' detected that there was no associated content" -Type INFO } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO $ButtonStart.Enabled = $true } if ($Action -eq "Update") { $BootImageCount = 0 $BootImageRowCount = 0 for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) { $BootImageRowCount++ } } for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) { $CellBootImageName = $DGVResults.Rows[$RowIndex].Cells[1].Value $CellBootImageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value $CellBootImageID = $DGVResults.Rows[$RowIndex].Cells[4].Value if ($CellBootImageSelected -eq $true) { $BootImageCount++ $BootImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellBootImageID)'" if ($BootImage -ne $null) { $BootImageName = $BootImage.Name Update-StatusBar -Activity Validating -Text "Updating boot image $($BootImageCount) / $($BootImageRowCount)" [System.Windows.Forms.Application]::DoEvents() if ($BootImage.PkgSourcePath -ne $null) { if ($BootImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) { $ExistingBootImageSourcePath = $BootImage.PkgSourcePath $UpdatedBootImageSourcePath = $BootImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text if ($CopyFiles -eq $true) { if (-not(Test-Path -Path $UpdatedBootImageSourcePath)) { New-Item -Path $UpdatedBootImageSourcePath -ItemType Directory | Out-Null } if ((Get-ChildItem -Path $UpdatedBootImageSourcePath | Measure-Object).Count -eq 0) { if (Test-Path -Path $ExistingBootImageSourcePath) { $ExistingBootImageSourcePathItems = Get-ChildItem -Path $ExistingBootImageSourcePath Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingBootImageSourcePath) to $($UpdatedBootImageSourcePath)" -Type INFO foreach ($ExistingBootImageSourcePathItem in $ExistingBootImageSourcePathItems) { Copy-Item -Path $ExistingBootImageSourcePathItem.FullName -Destination $UpdatedBootImageSourcePath -Force -Recurse } } else { Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingBootImageSourcePath)" -Type WARNING } } } $BootImage.Get() $BootImage.PkgSourcePath = $UpdatedBootImageSourcePath $BootImage.Put() | Out-Null $ValidateBootImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellBootImageID)'" if ($ValidateBootImage.PkgSourcePath -eq $UpdatedBootImageSourcePath) { Write-OutputBox -OutputBoxMessage "Updated boot image '$($BootImageName)'" -Type INFO } else { Write-OutputBox -OutputBoxMessage "An error occurred while updating boot image '$($BootImageName)'" -Type ERROR } [System.Windows.Forms.Application]::DoEvents() } else { Write-OutputBox -OutputBoxMessage "No matching content source for boot image '$($BootImageName)' was found" -Type INFO } } else { Write-OutputBox -OutputBoxMessage "Validation of boot image '$($BootImageName)' detected that there was no associated content" -Type INFO } } } } Update-StatusBar -Activity Ready -Text " " Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO $ButtonStart.Enabled = $false } } } $Form = New-Object System.Windows.Forms.Form $Form.Size = New-Object System.Drawing.Size(900,700) $Form.MinimumSize = New-Object System.Drawing.Size(900,700) $Form.MaximumSize = New-Object System.Drawing.Size([System.Int32]::MaxValue,[System.Int32]::MaxValue) $Form.SizeGripStyle = "Show" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "ConfigMgr Content Source Update Tool 1.0.0" $Form.ControlBox = $true $Form.TopMost = $false $ButtonStart = New-Object System.Windows.Forms.Button $ButtonStart.Location = New-Object System.Drawing.Size(762,35) $ButtonStart.Size = New-Object System.Drawing.Size(95,30) $ButtonStart.Text = "Update" $ButtonStart.TabIndex = "3" $ButtonStart.Anchor = "Top, Right" $ButtonStart.Enabled = $false $ButtonStart.Add_Click({ if ($CheckBoxCopyContent.Checked -eq $true) { $CopyFiles = $true } else { $CopyFiles = $false } switch ($ComboBoxTypes.SelectedItem) { "Application" { Invoke-CleanControls -Option Log Update-ApplicationContentSource -Action Update -CopyFiles:$CopyFiles } "Package" { Invoke-CleanControls -Option Log Update-PackageContentSource -Action Update -CopyFiles:$CopyFiles } "Deployment Package" { Invoke-CleanControls -Option Log Update-DeploymentPackageContentSource -Action Update -CopyFiles:$CopyFiles } "Driver" { Invoke-CleanControls -Option Log Update-DriverContentSource -Action Update -CopyFiles:$CopyFiles } "Driver Package" { Invoke-CleanControls -Option Log Update-DriverPackageContentSource -Action Update -CopyFiles:$CopyFiles } "Operating System Image" { Invoke-CleanControls -Option Log Update-OperatingSystemImageContentSource -Action Update -CopyFiles:$CopyFiles } "Operating System Package" { Invoke-CleanControls -Option Log Update-OperatingSystemPackageContentSource -Action Update -CopyFiles:$CopyFiles } "Boot Image" { Invoke-CleanControls -Option Log Update-BootImageContentSource -Action Update -CopyFiles:$CopyFiles } } }) $ButtonValidate = New-Object System.Windows.Forms.Button $ButtonValidate.Location = New-Object System.Drawing.Size(762,75) $ButtonValidate.Size = New-Object System.Drawing.Size(95,30) $ButtonValidate.Text = "Validate" $ButtonValidate.TabIndex = "2" $ButtonValidate.Anchor = "Top, Right" $ButtonValidate.Enabled = $false $ButtonValidate.Add_Click({ if ($CheckBoxCopyContent.Checked -eq $true) { $CopyFiles = $true } else { $CopyFiles = $false } switch ($ComboBoxTypes.SelectedItem) { "Application" { Invoke-CleanControls -Option All Update-ApplicationContentSource -Action Validate -CopyFiles:$CopyFiles } "Package" { Invoke-CleanControls -Option All Update-PackageContentSource -Action Validate -CopyFiles:$CopyFiles } "Deployment Package" { Invoke-CleanControls -Option All Update-DeploymentPackageContentSource -Action Validate -CopyFiles:$CopyFiles } "Driver" { Invoke-CleanControls -Option All Update-DriverContentSource -Action Validate -CopyFiles:$CopyFiles } "Driver Package" { Invoke-CleanControls -Option All Update-DriverPackageContentSource -Action Validate -CopyFiles:$CopyFiles } "Operating System Image" { Invoke-CleanControls -Option All Update-OperatingSystemImageContentSource -Action Validate -CopyFiles:$CopyFiles } "Operating System Package" { Invoke-CleanControls -Option All Update-OperatingSystemPackageContentSource -Action Validate -CopyFiles:$CopyFiles } "Boot Image" { Invoke-CleanControls -Option All Update-BootImageContentSource -Action Validate -CopyFiles:$CopyFiles } } }) $GBMatch = New-Object -TypeName System.Windows.Forms.GroupBox $GBMatch.Location = New-Object -TypeName System.Drawing.Size(10,10) $GBMatch.Size = New-Object -TypeName System.Drawing.Size(500,50) $GBMatch.Anchor = "Top, Left, Right" $GBMatch.Text = "Match pattern for Content Source locations" $GBReplace = New-Object -TypeName System.Windows.Forms.GroupBox $GBReplace.Location = New-Object -TypeName System.Drawing.Size(10,70) $GBReplace.Size = New-Object -TypeName System.Drawing.Size(500,50) $GBReplace.Anchor = "Top, Left, Right" $GBReplace.Text = "Replace pattern for Content Source locations" $GBOptions = New-Object -TypeName System.Windows.Forms.GroupBox $GBOptions.Location = New-Object -TypeName System.Drawing.Size(520,10) $GBOptions.Size = New-Object -TypeName System.Drawing.Size(220,110) $GBOptions.Anchor = "Top, Right" $GBOptions.Text = "Options" $GBActions = New-Object -TypeName System.Windows.Forms.GroupBox $GBActions.Location = New-Object -TypeName System.Drawing.Size(750,10) $GBActions.Size = New-Object -TypeName System.Drawing.Size(120,110) $GBActions.Anchor = "Top, Right" $GBActions.Text = "Actions" $GBResults = New-Object -TypeName System.Windows.Forms.GroupBox $GBResults.Location = New-Object -TypeName System.Drawing.Size(10,130) $GBResults.Size = New-Object -TypeName System.Drawing.Size(860,315) $GBResults.Anchor = "Top, Bottom, Left, Right" $GBResults.Text = "Content Source information" $GBLog = New-Object -TypeName System.Windows.Forms.GroupBox $GBLog.Location = New-Object -TypeName System.Drawing.Size(10,455) $GBLog.Size = New-Object -TypeName System.Drawing.Size(860,175) $GBLog.Anchor = "Bottom, Left, Right" $GBLog.Text = "Logging" $ComboBoxTypes = New-Object System.Windows.Forms.ComboBox $ComboBoxTypes.Location = New-Object System.Drawing.Size(530,30) $ComboBoxTypes.Size = New-Object System.Drawing.Size(200,20) $ComboBoxTypes.Items.AddRange(@("Application","Package","Deployment Package","Driver","Driver Package","Operating System Image","Operating System Upgrade Package","Boot Image")) $ComboBoxTypes.SelectedItem = "Application" $ComboBoxTypes.Anchor = "Top, Right" $ComboBoxTypes.DropDownStyle = [System.Windows.Forms.ComboBoxStyle]::DropDownList $ComboBoxTypes.Add_SelectedIndexChanged({ $DGVResults.Rows.Clear() $ButtonStart.Enabled = $false if ($ComboBoxTypes.SelectedItem -eq "Application") { $DGVResults.Columns.Clear() $DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn)) $DGVResults.Columns[0].Name = "Update" $DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False $DGVResults.Columns[0].Width = "50" $DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[1].Name = $ComboBoxTypes.SelectedItem $DGVResults.Columns[1].Width = "200" $DGVResults.Columns[1].ReadOnly = $true $DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[2].Name = "Deployment Type" $DGVResults.Columns[2].AutoSizeMode = "Fill" $DGVResults.Columns[2].ReadOnly = $true $DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[3].Name = "Existing Content Source" $DGVResults.Columns[3].AutoSizeMode = "Fill" $DGVResults.Columns[3].ReadOnly = $true $DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[4].Name = "Updated Content Source" $DGVResults.Columns[4].AutoSizeMode = "Fill" $DGVResults.Columns[4].ReadOnly = $true } else { $DGVResults.Columns.Clear() $DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn)) $DGVResults.Columns[0].Name = "Update" $DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False $DGVResults.Columns[0].Width = "50" $DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[1].Name = $ComboBoxTypes.SelectedItem $DGVResults.Columns[1].Width = "200" $DGVResults.Columns[1].ReadOnly = $true $DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[2].Name = "Existing Content Source" $DGVResults.Columns[2].AutoSizeMode = "Fill" $DGVResults.Columns[2].ReadOnly = $true $DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[3].Name = "Updated Content Source" $DGVResults.Columns[3].AutoSizeMode = "Fill" $DGVResults.Columns[3].ReadOnly = $true $DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[4].Name = "ID" $DGVResults.Columns[4].AutoSizeMode = "Fill" $DGVResults.Columns[4].ReadOnly = $true $DGVResults.Columns[4].Visible = $false } }) $CheckBoxCopyContent = New-Object System.Windows.Forms.CheckBox $CheckBoxCopyContent.Location = New-Object System.Drawing.Size(530,60) $CheckBoxCopyContent.Size = New-Object System.Drawing.Size(200,20) $CheckBoxCopyContent.Text = "Copy content files to new location" $CheckBoxCopyContent.Anchor = "Top, Right" $TextBoxMatch = New-Object System.Windows.Forms.TextBox $TextBoxMatch.Location = New-Object System.Drawing.Size(20,28) $TextBoxMatch.Size = New-Object System.Drawing.Size(480,20) $TextBoxMatch.TabIndex = "0" $TextBoxMatch.Anchor = "Top, Left, Right" $TextBoxMatch.Add_TextChanged({ if (($TextBoxMatch.Text.Length -ge 2) -and ($TextBoxReplace.Text.Length -ge 2)) { $ButtonValidate.Enabled = $true } else { $ButtonValidate.Enabled = $false } }) $TextBoxReplace = New-Object System.Windows.Forms.TextBox $TextBoxReplace.Location = New-Object System.Drawing.Size(20,88) $TextBoxReplace.Size = New-Object System.Drawing.Size(480,20) $TextBoxReplace.TabIndex = "1" $TextBoxReplace.Anchor = "Top, Left, Right" $TextBoxReplace.Add_TextChanged({ if (($TextBoxMatch.Text.Length -ge 2) -and ($TextBoxReplace.Text.Length -ge 2)) { $ButtonValidate.Enabled = $true } else { $ButtonValidate.Enabled = $false } }) $OutputBox = New-Object System.Windows.Forms.RichTextBox $OutputBox.Location = New-Object System.Drawing.Size(20,475) $OutputBox.Size = New-Object System.Drawing.Size(838,145) $OutputBox.Anchor = "Bottom, Left, Right" $OutputBox.Font = "Courier New" $OutputBox.BackColor = "white" $OutputBox.ReadOnly = $true $OutputBox.MultiLine = $true $StatusBarPanelActivity = New-Object Windows.Forms.StatusBarPanel $StatusBarPanelActivity.Text = "Ready" $StatusBarPanelActivity.Width = "100" $StatusBarPanelProcessing = New-Object Windows.Forms.StatusBarPanel $StatusBarPanelProcessing.Text = "" $StatusBarPanelProcessing.AutoSize = "Spring" $StatusBar = New-Object Windows.Forms.StatusBar $StatusBar.Size = New-Object System.Drawing.Size(500,20) $StatusBar.ShowPanels = $true $StatusBar.SizingGrip = $false $StatusBar.AutoSize = "Full" $StatusBar.Panels.AddRange(@( $StatusBarPanelActivity, $StatusBarPanelProcessing )) $DGVResults = New-Object System.Windows.Forms.DataGridView $DGVResults.Location = New-Object System.Drawing.Size(20,150) $DGVResults.Size = New-Object System.Drawing.Size(838,285) $DGVResults.Anchor = "Top, Bottom, Left, Right" $DGVResults.ColumnHeadersVisible = $true $DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn)) $DGVResults.Columns[0].Name = "Update" $DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False $DGVResults.Columns[0].Width = "50" $DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[1].Name = "Application" $DGVResults.Columns[1].Width = "200" $DGVResults.Columns[1].ReadOnly = $true $DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[2].Name = "Deployment Type" $DGVResults.Columns[2].AutoSizeMode = "Fill" $DGVResults.Columns[2].ReadOnly = $true $DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[3].Name = "Existing Content Source" $DGVResults.Columns[3].AutoSizeMode = "Fill" $DGVResults.Columns[3].ReadOnly = $true $DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn)) $DGVResults.Columns[4].Name = "Updated Content Source" $DGVResults.Columns[4].AutoSizeMode = "Fill" $DGVResults.Columns[4].ReadOnly = $true $DGVResults.AllowUserToAddRows = $false $DGVResults.AllowUserToDeleteRows = $false $DGVResults.ReadOnly = $false $DGVResults.MultiSelect = $true $DGVResults.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVResults.RowHeadersWidthSizeMode = "DisableResizing" $DGVResults.RowHeadersVisible = $false $DGVResults.SelectionMode = "FullRowSelect" Load-Form }
combined_dataset/train/non-malicious/2546.ps1
2546.ps1
Function New-SecurityDescriptor ( $ACEs = (throw "Missing one or more Trustees"), [string] $ComputerName = ".") { $SecDesc = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_SecurityDescriptor").CreateInstance() if ($ACEs -is [System.Array]) { foreach ($ACE in $ACEs ) { $SecDesc.DACL += $ACE.psobject.baseobject } } else { $SecDesc.DACL = $ACEs } return $SecDesc } Function New-ACE ( [string] $Name = (throw "Please provide user/group name for trustee"), [string] $Domain = (throw "Please provide Domain name for trustee"), [string] $Permission = "Read", [string] $ComputerName = ".", [switch] $Group = $false) { $Trustee = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_Trustee").CreateInstance() if (!$group) { $account = [WMI] "\\$ComputerName\root\cimv2:Win32_Account.Name='$Name',Domain='$Domain'" } else { $account = [WMI] "\\$ComputerName\root\cimv2:Win32_Group.Name='$Name',Domain='$Domain'" } $accountSID = [WMI] "\\$ComputerName\root\cimv2:Win32_SID.SID='$($account.sid)'" $Trustee.Domain = $Domain $Trustee.Name = $Name $Trustee.SID = $accountSID.BinaryRepresentation $ACE = ([WMIClass] "\\$ComputerName\root\cimv2:Win32_ACE").CreateInstance() switch ($Permission) { "Read" { $ACE.AccessMask = 1179817 } "Change" { $ACE.AccessMask = 1245631 } "Full" { $ACE.AccessMask = 2032127 } default { throw "$Permission is not a supported permission value. Possible values are 'Read','Change','Full'" } } $ACE.AceFlags = 3 $ACE.AceType = 0 $ACE.Trustee = $Trustee return $ACE } Function New-Share ( [string] $FolderPath = (throw "Please provide the share folder path (FolderPath)"), [string] $ShareName = (throw "Please provide the Share Name"), $ACEs, [string] $Description = "", [string] $ComputerName=".") { $text = "$ShareName ($FolderPath): " $SecDesc = New-SecurityDescriptor $ACEs $Share = [WMICLASS] "\\$ComputerName\Root\Cimv2:Win32_Share" $result = $Share.Create($FolderPath, $ShareName, 0, $false , $Description, $false , $SecDesc) switch ($result.ReturnValue) { 0 {$text += "has been success fully created" } 2 {$text += "Error 2: Access Denied" } 8 {$text += "Error 8: Unknown Failure" } 9 {$text += "Error 9: Invalid Name"} 10 {$text += "Error 10: Invalid Level" } 21 {$text += "Error 21: Invalid Parameter" } 22 {$text += "Error 22 : Duplicate Share"} 23 {$text += "Error 23: Redirected Path" } 24 {$text += "Error 24: Unknown Device or Directory" } 25 {$text += "Error 25: Net Name Not Found" } } $return = New-Object System.Object $return | Add-Member -type NoteProperty -name ReturnCode -value $result.ReturnValue $return | Add-Member -type NoteProperty -name Message -value $text $return } $ACE = New-ACE -Name "Domain Users" -Domain "CORETECH" -Permission "Read" -Group $ACE2 = New-ACE -Name "CCO" -Domain "CORETECH" -Permission "Full" $result = New-Share -FolderPath "C:\Temp" -ShareName "Temp4" -ACEs $ACE,$ACE2 -Description "Test Description" -Computer "localhost" Write-Output $result.Message If ($result.ReturnCode -eq 0) { }
combined_dataset/train/non-malicious/1958.ps1
1958.ps1
Describe "Select-Xml DRT Unit Tests" -Tags "CI" { BeforeAll { $testfile = "TestDrive:\testfile.xml" $xmlContent = @" <?xml version ="1.0" encoding="ISO-8859-1"?> <bookstore> <book category="CHILDREN"> <title lang="english">Harry Potter</title> <price>30.00</price> </book> <book category="WEB"> <title lang="english">Learning XML</title> <price>25.00</price> </book> </bookstore> "@ Set-Content -Path $testfile -Value $xmlContent } It "Can select text from an XML document"{ $results = Select-Xml -Path $testfile -XPath "/bookstore/book/title" $results | Should -HaveCount 2 $results[0].Node." $results[1].Node." } } Describe "Select-Xml Feature Tests" -Tags "Feature" { BeforeAll { $fileName = New-Item -Path "TestDrive:\testSelectXml.xml" $xmlContent = @" <Root> <Node Attribute='blah' /> </Root> "@ Set-Content -Path $fileName -Value $xmlContent $fileNameWithDots = $fileName.FullName.Replace("\", "\.\") $driveLetter = [string]($fileName.FullName)[0] $fileNameAsNetworkPath = "\\localhost\$driveLetter`$" + $fileName.FullName.SubString(2) $testCases = @( @{testName = 'Literalpath with relative paths'; testParameter = @{LiteralPath = $fileName.Name; XPath = 'Root'}}, @{testName = 'Literalpath with absolute paths'; testParameter = @{LiteralPath = $fileName.FullName; XPath = 'Root'}}, @{testName = 'Literalpath with path with dots'; testParameter = @{LiteralPath = $fileNameWithDots; XPath = 'Root'}}, @{testName = 'Path with relative paths'; testParameter = @{Path = $fileName.Name; XPath = 'Root'}}, @{testName = 'Path with absolute paths'; testParameter = @{Path = $fileName.FullName; XPath = 'Root'}}, @{testName = 'Path with path with dots'; testParameter = @{Path = $fileNameWithDots; XPath = 'Root'}} ) if ( ! $IsCoreCLR ) { $testcases += @{testName = 'Literalpath with network paths'; testParameter = @{LiteralPath = $fileNameAsNetworkPath; XPath = 'Root'}} $testcases += @{testName = 'Path with network paths'; testParameter = @{LiteralPath = $fileNameAsNetworkPath; XPath = 'Root'}} } Push-Location -Path $fileName.Directory } AfterAll { Pop-Location } It "Can work with input files using <testName>" -TestCases $testCases { param($testParameter) $node = Select-Xml @testParameter $node | Should -HaveCount 1 $node.Path | Should -Be $fileName.FullName } It "Can work with input streams" { [xml]$xml = "<a xmlns='bar'><b xmlns:b='foo'>hello</b><c>world</c></a>" $node = Select-Xml -Xml $xml -XPath "//c:b" -Namespace @{c='bar'} $node.Path | Should -BeExactly "InputStream" $node.Pattern | Should -BeExactly "//c:b" $node.ToString() | Should -BeExactly "hello" } It "Can throw on non filesystem paths using <parameter>" -TestCases @( @{parameter="LiteralPath"; expectedError='ProcessingFile,Microsoft.PowerShell.Commands.SelectXmlCommand'}, @{parameter="Path"; expectedError='ProcessingFile,Microsoft.PowerShell.Commands.SelectXmlCommand'} ) { param($parameter, $expectedError) $env:xmltestfile = $xmlContent $file = 'env:xmltestfile' $params = @{$parameter=$file} { Select-Xml @params "Root" -ErrorAction Stop } | Should -Throw -ErrorId $expectedError Remove-Item -Path 'env:xmltestfile' } It "Can throw for invalid XML file" { $testfile = "TestDrive:\test.xml" Set-Content -Path $testfile -Value "<a><b>" { Select-Xml -Path $testfile -XPath foo -ErrorAction Stop } | Should -Throw -ErrorId 'ProcessingFile,Microsoft.PowerShell.Commands.SelectXmlCommand' } It "Can throw for invalid XML namespace" { [xml]$xml = "<a xmlns='bar'><b xmlns:b='foo'>hello</b><c>world</c></a>" { Select-Xml -Xml $xml -XPath foo -Namespace @{c=$null} -ErrorAction Stop } | Should -Throw -ErrorId 'PrefixError,Microsoft.PowerShell.Commands.SelectXmlCommand' } It "Can throw for invalid XML content" { { Select-Xml -Content "hello" -XPath foo -ErrorAction Stop } | Should -Throw -ErrorId 'InvalidCastToXmlDocument,Microsoft.PowerShell.Commands.SelectXmlCommand' } It "Can use ToString() on nested XML node" { $node = Select-Xml -Content "<a><b>one<c>hello</c></b></a>" -XPath "//b" $node.ToString() | Should -BeExactly "one<c>hello</c>" } It "Can use ToString() with file" { $testfile = Join-Path $TestDrive "test.xml" Set-Content -Path $testfile -Value "<a><b>hello</b></a>" $node = Select-Xml -Path $testfile -XPath "//b" $node.ToString() | Should -BeExactly "hello:$testfile" } }
combined_dataset/train/non-malicious/1129.ps1
1129.ps1
$CategoryName = 'Carbon-PerformanceCounters-UninstallCategory' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { [Diagnostics.PerformanceCounterCategory]::Create( $CategoryName, '', (New-Object Diagnostics.CounterCreationDataCollection) ) Assert-True (Test-PerformanceCounterCategory -CAtegoryName $CAtegoryName) } function Stop-Test { Uninstall-PerformanceCounterCategory -CategoryName $CategoryName Assert-False (Test-PerformanceCounterCategory -CAtegoryName $CAtegoryName) } function Test-ShouldSupportWhatIf { Uninstall-PerformanceCounterCategory -CategoryName $CategoryName -WhatIf Assert-True (Test-PerformanceCounterCategory -CategoryName $CategoryName) }
combined_dataset/train/non-malicious/sample_67_22.ps1
sample_67_22.ps1
######################################################################################### # # Copyright (c) Microsoft Corporation. All rights reserved. # # Extension Tools # #Requires -Version 4.0 # ######################################################################################### add-type @" using System.Net; using System.Security.Cryptography.X509Certificates; public class TrustAllCertsPolicy : ICertificatePolicy { public bool CheckValidationResult( ServicePoint srvPoint, X509Certificate certificate, WebRequest request, int certificateProblem) { return true; } } "@ Function Get-Params { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $false)] [pscredential] $Credential ) if ( $GatewayEndpoint -eq $null ) { try { $GatewayEndpoint = [Uri] ( Get-ItemPropertyValue 'HKCU:\Software\Microsoft\ServerManagementGateway' 'SmeDesktopEndpoint' ) } catch { throw (New-Object System.Exception -ArgumentList 'No endpoint was specified so a local gateway was assumed and it must be run at least once.') } } $params = @{useBasicParsing = $true; userAgent = "PowerShell"} [System.Net.ServicePointManager]::CertificatePolicy = New-Object TrustAllCertsPolicy $clientCertificateThumbprint = '' $IsLocal = $GatewayEndpoint.IsLoopback -or ( $GatewayEndpoint.Host -eq $Env:ComputerName ) if ( ( $GatewayEndpoint.Scheme -eq [Uri]::UriSchemeHttps ) -and $IsLocal ) { $clientCertificateThumbprint = (Get-ChildItem 'Cert:\CurrentUser\My' | Where-Object { $_.Subject -eq 'CN=Windows Admin Center Client' }).Thumbprint } if ($clientCertificateThumbprint) { $params.certificateThumbprint = "$clientCertificateThumbprint" } else { if ($Credential) { $params.credential = $Credential } else { $params.useDefaultCredentials = $True } } $params.uri = "$($GatewayEndpoint)/api/extensions"; return $params } Function Get-RecentVersion($extensions) { $recent = $extensions[0] $extensions | ForEach-Object { if ($Null -eq $recent -Or [System.Version]$recent.version -le [System.Version]$_.version) { $recent = $_ } } return $recent } <# .SYNOPSIS Show the feeds available in the Windows Admin Center Gateway. .DESCRIPTION The function list the available feeds. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Get-Feed -GatewayEndpoint "https://localhost:4100" #> Function Get-Feed { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/configs"; $params.method = "Get" $params.headers = @{ 'Accept-Encoding' = '' } $response = Invoke-WebRequest @params if ($response.StatusCode -ne 200 ) { throw "Failed to get the feeds. Please verify the given URI points to a valid WAC gateway endpoint." } try { $packageFeeds = ConvertFrom-Json $response.Content $packageFeeds = $packageFeeds.packageFeeds if ($null -eq $packageFeeds) { throw } } catch { throw "The response was malformed. Please verify the given URI points to a valid WAC gateway endpoint." } return $packageFeeds } <# .SYNOPSIS Add a feed to the Windows Admin Center Gateway. .DESCRIPTION The function add a feed. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER Feed Required. Provide the Feed url. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Add-Feed -GatewayEndpoint "https://localhost:4100" -Feed "https://aka.ms/sme-extension-feed" #> Function Add-Feed { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $true)] [String] $Feed, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $packageFeeds = [PSCustomObject]@{packageFeeds = @(Get-Feed $GatewayEndpoint $Credential)} if ($packageFeeds.packageFeeds -Contains $Feed) { Write-Warning "The feed '$Feed' already exist in the gateway" return } $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/configs"; $params.method = "Put" $packageFeeds.packageFeeds += $Feed $params.body = ConvertTo-Json $packageFeeds $response = Invoke-WebRequest @params -ContentType "application/json" if ($response.StatusCode -ne 200 ) { throw "Failed to add the feed in the gateway" } return [PSCustomObject]@(Get-Feed $GatewayEndpoint $Credential) } <# .SYNOPSIS Remove a feed to the Windows Admin Center Gateway. .DESCRIPTION The function remove a feed. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER Feed Required. Provide the Feed url. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Remove-Feed -GatewayEndpoint "https://localhost:4100" -Feed "https://aka.ms/sme-extension-feed" #> Function Remove-Feed { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $true)] [String] $Feed, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $packageFeeds = [PSCustomObject]@{packageFeeds = @(Get-Feed $GatewayEndpoint $Credential)} if ($packageFeeds.packageFeeds -NotContains $Feed) { Write-Warning "The feed '$Feed' not exist in the gateway" } else { $removeFeed = [PSCustomObject]@($packageFeeds.packageFeeds | Where-Object { $_ -eq $Feed }) $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/configs"; $params.method = "Put" $packageFeeds.packageFeeds = @($packageFeeds.packageFeeds | Where-Object { $_ -Ne $Feed }) $params.body = ConvertTo-Json $packageFeeds $response = Invoke-WebRequest @params -ContentType "application/json" if ($response.StatusCode -ne 200 ) { throw "Failed to remove the feed in the gateway" } } return $removeFeed } <# .SYNOPSIS Show the extension available in the Windows Admin Center Gateway. .DESCRIPTION The function list the available extensions. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Get-Extension -GatewayEndpoint "https://localhost:4100" #> Function Get-Extension { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $params = Get-Params $GatewayEndpoint $Credential $params.method = "Get" $response = Invoke-WebRequest @params if ($response.StatusCode -ne 200 ) { throw "Failed to get the extensions" } try { $content = ConvertFrom-Json $response.Content $extensions = $content.Extensions if ($null -eq $extensions) { throw } } catch { throw "The response was malformed. Please verify the given URI points to a valid WAC gateway endpoint." } return $extensions } <# .SYNOPSIS Install a Windows Admin Center Extension. .DESCRIPTION The function install a specific extension. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER ExtensionId Required. Specifies the Id for the extension. .PARAMETER Version Optional. Specifies a version, if is not present, The function search for the latest one. .PARAMETER Feed Optional. Specifies a feed, if is not present, The function add it. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Install-Extension -GatewayEndpoint "https://localhost:4100" -ExtensionId "DataON.MUST" #> Function Install-Extension { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $true)] [String] $ExtensionId, [Parameter(Mandatory = $false)] [String] $Version, [Parameter(Mandatory = $false)] [String] $Feed, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $NotFoundLegend = "The extension '$ExtensionId' is not available in the " if ($PSBoundParameters.ContainsKey("Feed")) { if (!$Feed) { $NotFoundLegend += "Pre-installed catalog" $extensions = @(Get-Extension $GatewayEndpoint $Credential | Where-Object { $_.id -eq $ExtensionId -And $_.packageSource -eq $Null}) } else { # Check if exist the Feed otherwise install it $Feeds = Get-Feed $GatewayEndpoint $Credential if ($Feeds -NotContains $Feed){ Write-Warning "The feed '$Feed' not exist in the gateway, trying to add it" Add-Feed $GatewayEndpoint $Feed $Credential } $NotFoundLegend += "$Feed feed" $extensions = @(Get-Extension $GatewayEndpoint $Credential | Where-Object { $_.id -eq $ExtensionId -And $_.packageSource -eq $Feed}) } } else { $NotFoundLegend += "current feeds" $extensions = @(Get-Extension $GatewayEndpoint $Credential | Where-Object { $_.id -eq $ExtensionId }) } if (!$extensions) { Write-Warning $NotFoundLegend return } if ($Version) { $extensions = @($extensions | Where-Object { $_.version -eq $Version }) } if (!$extensions) { Write-Warning "The extension: '$ExtensionId' ('$Version') is not present" return } $extension = Get-RecentVersion $extensions $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/" + $extension.id + "/versions/" + $extension.version + "/install"; $params.method = "Post" Try { $response = Invoke-WebRequest @params } Catch { $e = ConvertFrom-Json $_ throw $e.error.message } if ($response.StatusCode -ne 200 ) { throw "Failed to install the extension in the gateway" } return $extension } <# .SYNOPSIS Uninstall a Windows Admin Center Extension. .DESCRIPTION The function uninstall the selected extension. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER ExtensionId Required. Specifies the Id for the extension. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Uninstall-Extension -GatewayEndpoint "https://localhost:4100" -ExtensionId "DataON.MUST" #> Function Uninstall-Extension { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $true)] [String] $ExtensionId, [Parameter(Mandatory = $false)] [pscredential] $Credential ) $extension = Get-Extension $GatewayEndpoint $Credential | Where-Object { $_.id -eq $ExtensionId -And $_.status -eq "Installed" } if (!$extension) { Write-Warning "The extension: '$ExtensionId' is not installed" return } $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/" + $extension.id + "/versions/" + $extension.version + "/uninstall"; $params.method = "Post" Try { $response = Invoke-WebRequest @params } Catch { $e = ConvertFrom-Json $_ throw $e.error.message } if ($response.StatusCode -ne 200 ) { throw "Failed to uninstall the extension in the gateway" } return $extension } <# .SYNOPSIS Update a Windows Admin Center Extension. .DESCRIPTION The function update the selected extension with the most recent version available. .PARAMETER GatewayEndpoint Required. Provide the gateway name. .PARAMETER ExtensionId Required. Specifies the Id for the extension. .PARAMETER Feed Optional. Specifies a feed, if is not present, The function add it. .PARAMETER Credential Optional. If you wish to provide credentials to the Windows Admin Center gateway which are different from your credentials on the computer where you're executing the script, provide a PSCredential by using Get-Credential. You can also provide just the username for this parameter and you will be prompted to enter the corresponding password (which gets stored as a SecureString). .EXAMPLE C:\PS> Update-Extension -GatewayEndpoint "https://localhost:4100" -ExtensionId "DataON.MUST" #> Function Update-Extension { param( [Parameter(Mandatory = $false)] [Uri] $GatewayEndpoint, [Parameter(Mandatory = $true)] [String] $ExtensionId, [Parameter(Mandatory = $false)] [String] $Feed, [Parameter(Mandatory = $false)] [pscredential] $Credential ) if ($PSBoundParameters.ContainsKey("Feed")) { if ($Feed) { $Feeds = Get-Feed $GatewayEndpoint $Credential if ($Feeds -NotContains $Feed){ Write-Warning "The feed '$Feed' not exist in the gateway, trying to add it" Add-Feed $GatewayEndpoint $Feed $Credential } } } $extension = Get-Extension $GatewayEndpoint $Credential | Where-Object { $_.id -eq $ExtensionId -And $_.status -eq "Installed"} if (!$extension) { Write-Warning "The extension: '$ExtensionId' is not installed" return } $params = Get-Params $GatewayEndpoint $Credential $params.uri = $params.uri + "/" + $extension.id + "/versions/" + $extension.version + "/update"; $params.method = "Post" Try { $response = Invoke-WebRequest @params } Catch { $e = ConvertFrom-Json $_ throw $e.error.message } if ($response.StatusCode -ne 200 ) { throw "Failed to update the extension in the gateway" } return $extension } Export-ModuleMember -Function Get-Feed Export-ModuleMember -Function Add-Feed Export-ModuleMember -Function Remove-Feed Export-ModuleMember -Function Get-Extension Export-ModuleMember -Function Install-Extension Export-ModuleMember -Function Uninstall-Extension Export-ModuleMember -Function Update-Extension # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBwiJf5Rw9PFq53 # eLBPxA1qrp5HPfS4BTYSaMWXvH12baCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILB2bG4TVkLHayFMMV9XhBD2 # /NHAipsmFV9Bq3TyxIl3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAD7Fa03YILoUp0UINCahX+XuxVf7yF8upUvrBXQj/4EiN8qa2AFXuuFP3 # RnKiYxzWQk2FA5ezE5+B7c5c5EImBcPhkGOUZEBioTxFfp+MOnBlEcQC3yS1UfKW # gKB8vlryzE9e3Ufqn93kPQ0+VxD1Qj9+0sGAaoZEqkGeO5uRHGr9cDi8pWxrxkkb # 3qaVyq7hnGSenqLvSLwnawtsUh2lqdlv6ECbBnhuxf3UOBQbgjI6vYlPSfDQ6pjE # pDf3IQHFjJIUA1G40WreJ40ND/xjG08vvY1uh0YzxB4X1CO0RLruNR1Eku92GI16 # yK+Sag2SPrATJ/f/GaMOUvWTl4ksLqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDJw+i7efzlKH9BrTQgCF2Ho+aIcI0zz0dNyE9i/zXJsAIGZpVtS3KO # GBMyMDI0MDcyMzIxNTY1NC40NTZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6kp3HTAiGA8yMDI0MDcyMzE4Mzgy # MVoYDzIwMjQwNzI0MTgzODIxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqSncd # AgEAMAoCAQACAh+pAgH/MAcCAQACAhOXMAoCBQDqS8idAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEYMl88Oy8W9AvPaDqesDvzyjV9MW8nJtTlJPwdhBJLl # A734xA0aD70nYmNpir/rChzKyJHCepWa1ltV69p2fcJiTrF1TeMNFLaBcqCdRKrA # H0Da3Sn7WCIdt9pg4aa6/Wkh//QOXQdOGlErFUkeRkciu55xRbRgvBT84AzJpNMl # Zpu5WYqSFmjkUvO4VcyukSSCjKOyM4yGgbC9Gt9eW1jmMR0brr4PpJMRD51tF1Sp # DhIMObX8967svlFyx4a+67VdAEgtYLDyaiwS9IxLyJYlkCzYS3sfQwLVl3cdhDTh # 0VheJSJeGiSUfCddJMry6siNPEPYeWEtdMEvr1kYTAsxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB # 6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBBLshHHp9h2EDVO5ldCS0ZWJgiI/rE6f80tuY4wHS6 # IzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige # 0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQguz13rx6zA3SWOXeKv65bs4RS # DYtiOWOM4Kk6KtQcQRQwDQYJKoZIhvcNAQELBQAEggIAdj+mNERa5+I3LBWnzzt5 # YM/TgAk0K2xTSSZXV8kVZ+bLM5nZsonGozZbY6iCdGudG6kCNp+GacNXNEWofVWO # E6WuZgrgloFjCOUJgkZ5wG9vhjyleOxlTAcnsTUmtSHao0D3EjRaa3ocbubf2Vam # HG+mxPN0Z5i0j8xMOZc/FOtBbNsVwQunXKIk86gg3HGrEMAL/aQCYew2wQAQ1okP # w7EbhXEV0ZOql0Hp1gy5Yn8mwLJUheC7tofepIrbstY7yGJEeFOE7KTaY1O57/KZ # KXUZy7pK/uyG+kmljfo3l4GNODzoQpExFENdiK+3jj0yBI4Tx539LwCAByGQOtsJ # pMTpmM7OQNTqcwvUBAv9BQp4FHTeJYJ/NZ7/OjLVGyOcB/Usnh+EHO67Hg17mBkx # 7YZ/wU962SeWKGRQWy0WYfGvk8kw1C2eJgn7nm+Zj6NgcJwe1Gm8e0b7iMie0BYM # s3uZ5FpSfPkl6MUWX7E8Yt691VPeWYMvHPbGnPWAYercOAHYVcsjVA8CJSgKtqUu # KLiQdP4fdzitAih09N3QA8D1kXQDZ5Z1unGa64yHexeR+syNzigmoWtH7cB1hHbQ # BOmTftsRVt/3GpAQybpEDEjkPdDl2yrAcrrt6PffwwprYFyrjv6oPP5OmdZrFoMg # xEa5JDTH5RaeVNBIxe0Ow40= # SIG # End signature block
combined_dataset/train/non-malicious/sample_7_4.ps1
sample_7_4.ps1
ConvertFrom-StringData @' id_clusterinfo=Cluster Information id_clusterinfoobtaining=Obtaining cluster basic information id_clustername=Cluster Name id_clusterdomain=Cluster Domain id_clustercsv=Shared Volumes id_clustercsvroot=Shared Volumes Root '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBanzOz0aCH0DqJ # KMtEiUU+NePU28fQkSrQVmMRiq5JPqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF6vKHIdS9CP4IbaVSmP7xkj # LVTRiGCok9A1TJJI77LgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEApo1skz4e/STvKWwRuSmCcKxMZ4WY/fBFEKeU/ueTUUk9FgHYekpcogaA # ZkksFUwj5oFxuvQ4jyPBUc/TbIwgSDG8pvlYpU3Nor0+Hs9AmYKAsWN5KKQ6TReA # 6giNTYTYFg0U6NQpf5hN/XleE6tKPkgQiH4KGE4yNkKiNYpB+NxTXEouZ55oHin3 # p3ACSN2DSg4nulLW4bHKsCiy6XG7IWXwjAkaN6kF2mWNfTJIypdlcuCh0Hb9foSH # qUWFqfL70fV4/lKUyK9KNKRzQ7BC0bbSX5RZXMVstBHCOpicwIwIasNUsdOKiIBc # f6ffPt5R7scnbHFPqqliw6/aoCUqhKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCbRz9L6EKbgVovb9EgAHUI5q094ZIwtmC1PLU5TDjpQwIGZxp9zsob # GBMyMDI0MTAyODExNDA0Mi42MjFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCaKR1PhBwNlsaK8qDKKdiEMTdE8teJAJSZey/2Z0nS # ujCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAW42DLnHAuo9igNGPhaoA # 7ybJuSjtBg9aATqaKQ9sGZf0LsnTHlpCCERxOoKqmtkkVTv9nn4zrg+knOp/q9Et # 2FX5C/6BLms46oIkIIcOu4DiQX2kT1WkJndusjRd88UmVJ780P1IH44mUUhWS8W3 # B098UlI3z2fWnE7lFj9Q/Q4GW9HaaWDj6Ssy6KkymHDi19abQvx0ja+4WKU5vy3x # 5vJ0MK29i98YsJzd5tNdkgRtvCJGzce4WR9HOijw9Y8CDoOYQ0IENccNaeYDqU4U # BaVOAL80OM2s+vbk9Ik18yNAM3rY2RglQ8dK4fbsf7sz6fHg3MPZL84am7twp2en # O/RK5iZQzqbIvCYG12kJykZaUBJzbdrx3y2b33jta7TGBFElFioEqYDNJPtgYhN4 # UXPQsmdRvu0RgUg/V4bRLlMDl5qygK4b/83uZCQNg+8FkhiUjfq5OhOFZ+STMTjK # 4g/BTkoz6kqNk/FlV15xO1RJk87lWXDiSTDgveEqu5umbVYOczw/+e/mKcwnL2S4 # QcLhyicLkAAaLftIiD8WM+P5GLeJmVc4PVa1lLNw0dS0Te0B4HorxpB1UqaETkJd # 73pQxzqaNmQ6rvE6sV0qRnBWwkz6M/MCwGYKaEecsYLOzGEO1u1Z4V5mTM2tJ/QL # fY8n1loS8T5FD3QNh1YMCcg= # SIG # End signature block
combined_dataset/train/non-malicious/3921.ps1
3921.ps1
function Test-ListBillingPeriods { $billingPeriods = Get-AzBillingPeriod Assert-True {$billingPeriods.Count -ge 1} Assert-NotNull $billingPeriods[0].Name Assert-NotNull $billingPeriods[0].Id Assert-NotNull $billingPeriods[0].Type Assert-NotNull $billingPeriods[0].BillingPeriodStartDate Assert-NotNull $billingPeriods[0].BillingPeriodEndDate } function Test-ListBillingPeriodsWithMaxCount { $billingPeriods = Get-AzBillingPeriod -MaxCount 1 Assert-True {$billingPeriods.Count -eq 1} Assert-NotNull $billingPeriods[0].Name Assert-NotNull $billingPeriods[0].Id Assert-NotNull $billingPeriods[0].Type Assert-NotNull $billingPeriods[0].BillingPeriodStartDate Assert-NotNull $billingPeriods[0].BillingPeriodEndDate } function Test-GetBillingPeriodWithName { $billingPeriods = Get-AzBillingPeriod | where { $_.InvoiceNames.Count -eq 1 } Assert-True {$billingPeriods.Count -ge 1} $billingPeriodName = $billingPeriods[0].Name $billingInvoiceName = $billingPeriods[0].InvoiceNames[0] $billingPeriod = Get-AzBillingPeriod -Name $billingPeriodName Assert-AreEqual $billingPeriodName $billingPeriod.Name Assert-NotNull $billingPeriod.Id Assert-NotNull $billingPeriod.Type Assert-NotNull $billingPeriod.BillingPeriodStartDate Assert-NotNull $billingPeriod.BillingPeriodEndDate Assert-NotNull $billingPeriod.InvoiceNames Assert-AreEqual 1 $billingPeriod.InvoiceNames.Count Assert-AreEqual $billingInvoiceName $billingPeriod.InvoiceNames } function Test-GetBillingPeriodWithNames { $sampleBillingPeriods = Get-AzBillingPeriod Assert-True {$sampleBillingPeriods.Count -gt 1} $billingPeriodNames = $sampleBillingPeriods | %{ $_.Name } $billingPeriods = Get-AzBillingPeriod -Name $billingPeriodNames Assert-AreEqual $sampleBillingPeriods.Count $billingPeriods.Count Foreach($billingPeriod in $billingPeriods) { Assert-NotNull $billingPeriod.Id Assert-NotNull $billingPeriod.Type Assert-NotNull $billingPeriod.BillingPeriodStartDate Assert-NotNull $billingPeriod.BillingPeriodEndDate } }
combined_dataset/train/non-malicious/1706.ps1
1706.ps1
Function Test-ServiceNowURL { [OutputType([System.Boolean])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string]$Url ) begin {} process { Write-Verbose "Testing url: $Url" if ($Url -match '^\w+\..*\.\w+') { $true } else { Throw "The expected URL format is tenant.domain.com" } } end {} }
combined_dataset/train/non-malicious/sample_25_97.ps1
sample_25_97.ps1
# # Module manifest for module 'OCI.PSModules.Emwarehouse' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Emwarehouse.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b5a40306-5a74-471c-a805-435bba4f4b4b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Emwarehouse Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Emwarehouse.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmwarehouse', 'Get-OCIEmwarehouseEtlRunsList', 'Get-OCIEmwarehouseResourceUsage', 'Get-OCIEmwarehousesList', 'Get-OCIEmwarehouseWorkRequest', 'Get-OCIEmwarehouseWorkRequestErrorsList', 'Get-OCIEmwarehouseWorkRequestLogsList', 'Get-OCIEmwarehouseWorkRequestsList', 'Move-OCIEmwarehouseCompartment', 'New-OCIEmwarehouse', 'Remove-OCIEmwarehouse', 'Stop-OCIEmwarehouseWorkRequest', 'Update-OCIEmwarehouse' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Emwarehouse' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_10_97.ps1
sample_10_97.ps1
# # Module manifest for module 'OCI.PSModules.Networkloadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend', 'Get-OCINetworkloadbalancerBackendHealth', 'Get-OCINetworkloadbalancerBackendSet', 'Get-OCINetworkloadbalancerBackendSetHealth', 'Get-OCINetworkloadbalancerBackendSetsList', 'Get-OCINetworkloadbalancerBackendsList', 'Get-OCINetworkloadbalancerHealth', 'Get-OCINetworkloadbalancerHealthChecker', 'Get-OCINetworkloadbalancerHealthsList', 'Get-OCINetworkloadbalancerListener', 'Get-OCINetworkloadbalancerListenersList', 'Get-OCINetworkloadbalancersList', 'Get-OCINetworkloadbalancersPoliciesList', 'Get-OCINetworkloadbalancersProtocolsList', 'Get-OCINetworkloadbalancerWorkRequest', 'Get-OCINetworkloadbalancerWorkRequestErrorsList', 'Get-OCINetworkloadbalancerWorkRequestLogsList', 'Get-OCINetworkloadbalancerWorkRequestsList', 'Move-OCINetworkloadbalancerCompartment', 'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend', 'New-OCINetworkloadbalancerBackendSet', 'New-OCINetworkloadbalancerListener', 'Remove-OCINetworkloadbalancer', 'Remove-OCINetworkloadbalancerBackend', 'Remove-OCINetworkloadbalancerBackendSet', 'Remove-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancer', 'Update-OCINetworkloadbalancerBackend', 'Update-OCINetworkloadbalancerBackendSet', 'Update-OCINetworkloadbalancerHealthChecker', 'Update-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancerNetworkSecurityGroups' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }