full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_37_31.ps1
|
sample_37_31.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apigateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apigateway.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apigateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent',
'Get-OCIApigatewayApiDeploymentSpecification',
'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations',
'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList',
'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList',
'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList',
'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList',
'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber',
'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan',
'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest',
'Get-OCIApigatewayWorkRequestErrorsList',
'Get-OCIApigatewayWorkRequestLogsList',
'Get-OCIApigatewayWorkRequestsList',
'Move-OCIApigatewayApiCompartment',
'Move-OCIApigatewayCertificateCompartment',
'Move-OCIApigatewayDeploymentCompartment',
'Move-OCIApigatewayGatewayCompartment',
'Move-OCIApigatewaySubscriberCompartment',
'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi',
'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment',
'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk',
'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan',
'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate',
'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway',
'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber',
'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest',
'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate',
'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway',
'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber',
'Update-OCIApigatewayUsagePlan'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3587.ps1
|
3587.ps1
|
function Get-ResourceGroupName
{
return getAssetName
}
function Get-ResourceName
{
return getAssetName
}
function Get-ProviderLocation($provider)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
$namespace = $provider.Split("/")[0]
if($provider.Contains("/"))
{
$type = $provider.Substring($namespace.Length + 1)
$location = Get-AzureRmResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type}
if ($location -eq $null)
{
return "West US"
} else
{
return $location.Locations[0]
}
}
return "West US"
}
return "WestUS"
}
function TestSetup-CreateResourceGroup
{
$resourceGroupName = getAssetName
$rglocation = Get-ProviderLocation "East US"
$resourceGroup = New-AzureRmResourceGroup -Name $resourceGroupName -location $rglocation -Force
return $resourceGroup
}
function Assert-Tags($tags1, $tags2)
{
if($tags1.count -ne $tags2.count)
{
throw "Tag size not equal. Tag1: $tags1.count Tag2: $tags2.count"
}
foreach($key in $tags1.Keys)
{
if($tags1[$key] -ne $tags2[$key])
{
throw "Tag content not equal. Key:$key Tags1:" + $tags1[$key] + "Tags2:" + $tags2[$key]
}
}
}
function Assert-CompressionTypes($types1, $types2)
{
if($types1.Count -ne $types1.Count)
{
throw "Array size not equal. Types1: $types1.count Types2: $types2.count"
}
foreach($value1 in $types1)
{
$found = $false
foreach($value2 in $types2)
{
if($value1.CompareTo($value2) -eq 0)
{
$found = $true
break
}
}
if(-Not($found))
{
throw "Compression content not equal. " + $value1 + " cannot be found in second array"
}
}
}
|
combined_dataset/train/non-malicious/2836.ps1
|
2836.ps1
|
function FormatErrorMessage
{
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
$ErrorRecord = $Error[0]
)
$currentConfig = GetCurrentConfigurationOrDefault
if ($currentConfig.verboseError) {
$error_message = "{0}: An Error Occurred. See Error Details Below: $($script:nl)" -f (Get-Date)
$error_message += ("-" * 70) + $script:nl
$error_message += "Error: {0}$($script:nl)" -f (ResolveError $ErrorRecord -Short)
$error_message += ("-" * 70) + $script:nl
$error_message += ResolveError $ErrorRecord
$error_message += ("-" * 70) + $script:nl
$error_message += "Script Variables" + $script:nl
$error_message += ("-" * 70) + $script:nl
$error_message += get-variable -scope script | format-table | out-string
} else {
$error_message = "Error: {0}: $($script:nl){1}" -f (Get-Date), (ResolveError $ErrorRecord -Short)
}
$error_message
}
|
combined_dataset/train/non-malicious/sample_48_5.ps1
|
sample_48_5.ps1
|
# region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ManagedServices.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ManagedServices.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCutaeVcagoG5W2
# MmucrciIN20IQDI8XlvwXZDOXqfoZKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKj7MGXxcXyKHDJgawugQN0A
# h0ckWaONmY4xAy2WmgEyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAPOQ7K8786/6Ms5kR+1ieicoNeBa9TThVkO3VRJRk7HZeeRhlha7VE8du
# 2PbM8204GOspL3cVKDDFRgLI3oBskE2P3so+5wqZUfW2XRWAFV8x24UhLeovkkpq
# utg1956gQExeaRmQSfs7+Hap59yXO7eWdlA8GPSv1tosiqMFGBtDYtQKvaNiJixY
# vPNJp9AwZRbFFp3fXtB+7VhCDlD4U1/a5bpAQ4tMabt0QUNpFarG1/13W4WCoxY/
# AwJZBtwNdI1bLClA6gOYZKNqUKmylGCPBoNsiDfnVmb01wEWXUfDSSdB++iEGZsO
# wzsP333458+vrVFfVG0VwT63Gpm+OqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD4phjhArCGyF/GwVAJusMl8Yvr69zWlE0LFgbWBQwOBQIGZhglJ+nZ
# GBMyMDI0MDQyMzEzMTUxMi43NTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dHMaDAiGA8yMDI0MDQyMzA1NTgw
# MFoYDzIwMjQwNDI0MDU1ODAwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0cxo
# AgEAMAoCAQACAhumAgH/MAcCAQACAhOWMAoCBQDp0x3oAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAHuFwnym2r7kFbUSwAIhNBE7GWHUnl4GPkTRV9TELUue
# +4ulfVp7+fozqonA3eKejtIwlMl0hIsL+l3vUYCybFUstRmWgaoyPqQ4BVQ/O0Oa
# CjOmbnTGQwNbljJOEyB1moLTvX4v2CrijfO2cffFfJ6m/+NpJEcN7wT7MDDhAl2W
# 3Bg7DrmE35fqfPIhSgMx91tBc976NzsJvMMh9ahJrkqzBokvefRb+J5EuJLSIdXp
# Go6wbgJ8PPWqXswAll/cB81QGy+IvJxx4PCDw53a4MHSQt/JiaHkW926e21LE/cZ
# 19KSnceGCzw2gLv/JUMg37LUAkNpT3ShRxh8EZMiQ/wxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB
# 7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDjk88PjArk11Yyl3DQlaivpz3f4QpVb4sBaGAkwamU
# 5jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIk
# Bz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg6teaou3uEbPepaFO9eBh6kjY
# LknalC+ILH6PdqcEDpEwDQYJKoZIhvcNAQELBQAEggIAZpipa4ulDJ3oGJ69umeM
# M5QY4aMf5tOWo64gKJ6uheGHjKYhsS3EfyBL5nJRfWh+sm7VgcETOVUlXXw9QCB2
# n3ky06QVGPKGpJWZDq3V/l7Y3Q1jFu6k3wAe6GrsKR8pJWm6hN9rTNihgeVzD61G
# PMdBjbh+bKAkJTgP8Ypgk0Gh0AUiVwd0llkbcss5ETTlGe1H4sZepwV3k8hAIYSP
# 44a+TU1Vu9DbPclcWHDF7NEuzFoUAEogy8UsXc/7yaPnQcaTue+RqVH+n6Q5xbb6
# fCvYorawVklpyRP7JP9JMUX2QXeGg/ehL0pMQ7kTj7JM3nh4E26i9h0aYeKwzjgk
# ixxQUdkgnR3Y2HiobqDSi/gwf21C5zRFU7NRvz7xePFy4BbWPBnukiDSOjPrC3/i
# izsEVxpMRUERVCLefIu7H/jeHgF7ivOhedyZkX9mprgVgplA1cYlOSNRzvwZJ5U8
# SGiCK+xp/QzErb75NR4R4Jupx5p/3OuE67GZS7NkCwf/t/R1TEedFJOHyaQAtwqA
# sMC6pHU9k39aiAEgPJLrRbE1WmGXUZBWQ1LU/Ogno2sDAOjhfFqYzPkwoov1ntCY
# 5IM6ZMo4tvag6xrDNCZKvlpLSsTL/WyLoIQhxl5ON4GCiRYh82zc1LIRN+gsJbpT
# K4ymwtTP4yNABl5Uh8XwEFs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2696.ps1
|
2696.ps1
|
function Get-Entropy
{
[CmdletBinding()] Param (
[Parameter(Mandatory = $True, Position = 0, ValueFromPipeline = $True, ParameterSetName = 'Bytes')]
[ValidateNotNullOrEmpty()]
[Byte[]]
$ByteArray,
[Parameter(Mandatory = $True, Position = 0, ParameterSetName = 'File')]
[ValidateNotNullOrEmpty()]
[IO.FileInfo]
$FilePath
)
BEGIN
{
$FrequencyTable = @{}
$ByteArrayLength = 0
}
PROCESS
{
if ($PsCmdlet.ParameterSetName -eq 'File')
{
$ByteArray = [IO.File]::ReadAllBytes($FilePath.FullName)
}
foreach ($Byte in $ByteArray)
{
$FrequencyTable[$Byte]++
$ByteArrayLength++
}
}
END
{
$Entropy = 0.0
foreach ($Byte in 0..255)
{
$ByteProbability = ([Double] $FrequencyTable[[Byte]$Byte]) / $ByteArrayLength
if ($ByteProbability -gt 0)
{
$Entropy += -$ByteProbability * [Math]::Log($ByteProbability, 2)
}
}
Write-Output $Entropy
}
}
|
combined_dataset/train/non-malicious/sample_45_60.ps1
|
sample_45_60.ps1
|
#
# Module manifest for module 'OCI.PSModules.Oda'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Oda.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '040ef05d-6373-43bf-a0a9-67444099f906'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Oda Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oda.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIOdaDigitalAssistant', 'Export-OCIOdaSkill',
'Get-OCIOdaAuthenticationProvider',
'Get-OCIOdaAuthenticationProvidersList', 'Get-OCIOdaChannel',
'Get-OCIOdaChannelsList', 'Get-OCIOdaDigitalAssistant',
'Get-OCIOdaDigitalAssistantParameter',
'Get-OCIOdaDigitalAssistantParametersList',
'Get-OCIOdaDigitalAssistantsList', 'Get-OCIOdaImportedPackage',
'Get-OCIOdaImportedPackagesList', 'Get-OCIOdaInstance',
'Get-OCIOdaInstanceAttachment', 'Get-OCIOdaInstanceAttachmentsList',
'Get-OCIOdaInstancesList', 'Get-OCIOdaPackage',
'Get-OCIOdaPackagesList', 'Get-OCIOdaPrivateEndpoint',
'Get-OCIOdaPrivateEndpointAttachment',
'Get-OCIOdaPrivateEndpointAttachmentsList',
'Get-OCIOdaPrivateEndpointScanProxiesList',
'Get-OCIOdaPrivateEndpointScanProxy',
'Get-OCIOdaPrivateEndpointsList', 'Get-OCIOdaSkill',
'Get-OCIOdaSkillParameter', 'Get-OCIOdaSkillParametersList',
'Get-OCIOdaSkillsList', 'Get-OCIOdaTranslator',
'Get-OCIOdaTranslatorsList', 'Get-OCIOdaWorkRequest',
'Get-OCIOdaWorkRequestErrorsList', 'Get-OCIOdaWorkRequestLogsList',
'Get-OCIOdaWorkRequestsList', 'Import-OCIOdaBot',
'Invoke-OCIOdaBulkCreateSkillEntities',
'Invoke-OCIOdaCascadingDeleteSkillCustomEntities',
'Invoke-OCIOdaConfigureDigitalAssistantParameters',
'Invoke-OCIOdaPublishDigitalAssistant', 'Invoke-OCIOdaPublishSkill',
'Invoke-OCIOdaRotateChannelKeys', 'Invoke-OCIOdaTrainSkill',
'Move-OCIOdaInstanceCompartment',
'Move-OCIOdaPrivateEndpointCompartment',
'New-OCIOdaAuthenticationProvider', 'New-OCIOdaChannel',
'New-OCIOdaDigitalAssistant', 'New-OCIOdaImportedPackage',
'New-OCIOdaInstance', 'New-OCIOdaInstanceAttachment',
'New-OCIOdaPrivateEndpoint', 'New-OCIOdaPrivateEndpointAttachment',
'New-OCIOdaPrivateEndpointScanProxy', 'New-OCIOdaSkill',
'New-OCIOdaSkillParameter', 'New-OCIOdaTranslator',
'Remove-OCIOdaAuthenticationProvider', 'Remove-OCIOdaChannel',
'Remove-OCIOdaDigitalAssistant', 'Remove-OCIOdaImportedPackage',
'Remove-OCIOdaInstance', 'Remove-OCIOdaInstanceAttachment',
'Remove-OCIOdaPrivateEndpoint',
'Remove-OCIOdaPrivateEndpointAttachment',
'Remove-OCIOdaPrivateEndpointScanProxy', 'Remove-OCIOdaSkill',
'Remove-OCIOdaSkillParameter', 'Remove-OCIOdaTranslator',
'Start-OCIOdaChannel', 'Start-OCIOdaInstance', 'Stop-OCIOdaChannel',
'Stop-OCIOdaInstance', 'Update-OCIOdaAuthenticationProvider',
'Update-OCIOdaChannel', 'Update-OCIOdaDigitalAssistant',
'Update-OCIOdaDigitalAssistantParameter',
'Update-OCIOdaImportedPackage', 'Update-OCIOdaInstance',
'Update-OCIOdaInstanceAttachment', 'Update-OCIOdaPrivateEndpoint',
'Update-OCIOdaSkill', 'Update-OCIOdaSkillParameter',
'Update-OCIOdaTranslator'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oda'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_32_78.ps1
|
sample_32_78.ps1
|
@{
GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
CmdletsToExport = @(
'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml',
'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv',
'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger',
'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event',
'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData',
'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host',
'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List',
'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption',
'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object',
'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output',
'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint',
'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession',
'Import-PSSession', 'Get-Random', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace',
'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String',
'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan',
'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData',
'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable',
'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest',
'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File'
)
FunctionsToExport = @()
AliasesToExport = @('fhx')
NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll")
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWhHfnpXxq8+sl
# W/kAF9/QzeuIlnKNo39e6SmlDViguKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINaaBnF8LQCsIvCJpbEhpAnE
# 4rNzRP/Hj2UoJ6v0PJKnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAm7KdI8WzpNVvhgZOVQkNfL96VVGfcWp3WmUAK3FEHWN4bBdZkUhk8x43
# PYcOm9JFC6EbsXp+eRZiINOSwREuPgs0gHEw+Z1Ev9PGOuo4o/KAebxARx6v95oA
# 1onMocut1g5ykWmuMwcAQqM0VSLo16jiMiYVF9N9wJ4agsgw0khhq3f+oIc9bvQw
# z4IpJBIGZt1Uuwh6kp8aFrILQGWnM/PwWnRdMLg3B+VgAzGGSeFzMlzqV7L+ikLY
# 5Cv/9PEXM9II6l4ZRg4V1b0+uTvqwREWLAv7iFUz7rgbKYfpDup5rnX0xLcM4f+O
# zzSYsn4fDm5+sWFmzZGsOuoCohTOIKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCtoBIWZaHaVYWWH6x7UugmqBIe0ml2ZJd5lIWtGg/bGQIGZXsh8kGn
# GBMyMDI0MDExMDE5NDUyNS44MjlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAdmcXAWSsINrPgABAAAB2TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA2MDExODMy
# NThaFw0yNDAyMDExODMyNThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDV6SDN1rgY2305yLdCdUNvHCEE4Z0ucD6CKvL5lA7H
# M81SMkW36RU77UaBL9PScviqfVzE2r2pRbRMtDBMwEx1iaizV2EZsNGGuzeR3XNY
# ObQvJVLaCiBktAZdq75BNFIil+SfdpXgKzVQZiDBJDN50WCADNrrb48Z4Z7/Kvyz
# aD4Gb+aZeCioB2Gg1m53d+6pUTBc3WO5xHZi/rrI/XdnhiE6/bspjpU5aufClIDx
# 0QDq1QRw04adrKhcDWyGL3SaBp/hjN+4JJU7KzvsKWZVdTuXPojnaTwWcHdEGfzx
# iaF30zd8SY4YRUcMGPOQORH1IPwkwwlqQkc0HBkJCQziaXY/IpgMRw/XP4Uv+JBJ
# 8RZGKZN1zRPWT9d5vHGUSmX3m77RKoCfkgSJifIiQi6Fc0OYKS6gZOA7nd4t+liA
# rr9niqeC/UcNOuVrcVC4CbkwfJ2eHkaWh18sUt3UD8QHYLQwn95P+Hm8PZJigr1S
# RLcsm8pOPee7PBbndI/VeKJsmQdjek2aFO9VGnUtzDDBowlhXshswZMMkLJ/4jUz
# QmUBfm+JAH1516E+G02wS7NgzMwmpHWCmAaFdd7DyJIqGa6bcZrR7QALdkwIhVQD
# gzZAuNxqwvh4Ia4ZI5Voyj4b7zWAhmurpwpMpijz+ieeWwf6ZdmysRjR/yZ6UXmG
# awIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBw6wSlTZ6gFXl05w/s3Ga1f51wnMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAqNtVYLO61TMuIanC7clt0i+XRRbHwnwNo
# 05Q3s4ppFtd4nCmB/TJPDJ6uvEryxs0vw5Y+jQwUiKnhl2VGGwIq0pWDIuaW4ppM
# V1pYQfJ6dtBGkRiTP1eKVvARYZMRaITe9ZhwJJnYP83pMxHCxaEsZC4ilY3/55dq
# d4ZXTCz/cpG5anmDartnWmgysygNstTwbWJJRj85gYRkjxi/nxKAiEFxl6GfkcnX
# Vy8DRFQj1d3AiqsePoeIzxu1iuAJRwDrfe4NnKHqoTgWsv7eCWJnWjWWRt7RRGrp
# vzLQo/BxUb8i49UwRg9G5bxpd5Su1b224Gv6G1HRU+qJHB1zoe41D2r/ic2BPous
# V9neYK5qI5PHLshAn6YTQllbV9pCbOUvZO0dtdwp5HH2fw6ofJNwKcPElaqkEcxv
# rhhRWqwNgaEVTyIV4jMc8jPbx2Nh9zAztnb9NfnDFOE+/gF8cZqTa/T65TGNP3uM
# iP3gr8nIXQ2IRwMVUoLmGu2qfmhDoews3dcvk6s1aA6mXHw+MANEIDKKjw3i2G6J
# tZkEemu1OXtskg/tGnfywaMgq5CauU9b6enTtA+UE+GKnmiQW6YUHPhBI0L2QG76
# TRBre5PpNVHiyc/01bjUEMpeaB+InAH4nDxYXx18wbJE+e/IbMv0147EFL792dEL
# F0XwqqcU0TCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi
# HEW6Ca3n5BgZV/tQ/fCR09Tf96CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Uk4ejAiGA8yMDI0MDExMDE1Mzgz
# NFoYDzIwMjQwMTExMTUzODM0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpSTh6
# AgEAMAcCAQACAgWKMAcCAQACAhN0MAoCBQDpSon6AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAGT4He2fEZiWwgWcvR3Jgd1PSX0iEtTbpbv8TOuAzMSkeF1J
# G4jCf9TO+/in6dWnSp1gMNVtUOoDecRo+ZIMChcPa9jc+FeDq7xXXtTu+XQGECZe
# kgtf0Qpzq9t5Otw3S2RFiIBfiF2FBd0SNjUBua+8+srVQizm2MHn1EuJjMAh/qgF
# EGpzqjxUzNOzqLXMHApEYi/lL4Vj3aFzUjzbw2+b/032UT7S/17oAaVkVqtuGhn3
# IJYZIVajo70eqcFtBZ65JJLfMgNDZaCeIZQuQTy9kmzvv2tpdnUvQu9HzMWkMkh5
# MbBfELwHP/vtVykyzIooX8iIw43KZc/CCgicZI4xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdmcXAWSsINrPgABAAAB2TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCALuqAkvzV33I2/oW6z7X5bkurK+k+gfnHXXKW6IYdpdjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJ+gFbItOm/UMDAnETzbJe0u0DWd
# 2Mgpgb0ScbQgB3nzMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHZnFwFkrCDaz4AAQAAAdkwIgQgvJbPbuTp7cZW57E689Iej5SVaPI8
# byzdlHfypNld5TgwDQYJKoZIhvcNAQELBQAEggIAL6iOTn824ma0PAuy8NXoEYeg
# 53Ia+QxjhwDKAvHNscLw7oFVoQ9sJwX5oh2XHf2B56GT5lvFgeeFmL2G9NsGsW/g
# I+7exCqB1qLMRiVpJkuSxgeuTlo6vjbU1OOn04e+a87VH4PEePLAqVVvv6J0Iaw/
# CwBAKyamo2aHEVd4hcUvEhes9iEoz4bf50q5gEBm7J5H6IK1FQ6ITkKu44s4Dlg6
# X1kfkgxBYyyqDERSXqDpxc+tFnNgJWP0ZWO55s70ipnz5Pw/2NSW9GLJXxDpJ3HY
# 64AigSSnopDGWFWICnb6zdxKk3B6omN2/d6xcsLIaiOx3WkyCEJv1oeP5X/08Vf5
# D9CWhAswTv5lpmJ2aiXUj4vbuiuY0wgmL4HBr+l843MJgHADyMMkfvpxpyQPZqfs
# UdJtIGqA2vcQUSdI9CdtiGLiwI83579UTMek93c0U0S/mYtjkvURWtHEiCnl7NB9
# 3Vix30to/Q7ptdHCm/Gduij9JkC5PTnmKJcAJANz8AQr/nCNAAbmv3SIAaly4cUY
# Z9u07ojr+Pc5ivLpVbo5svBHH87zgLNCZ6tR0dI21J5jxCRKHEkFTYa33bq9UQl/
# S6FY68Rp/x/Yx1ZucpM59kP4f3PdQtHOp/CYJPqK0krzjvASizNplMcb1VmXCY7Y
# NIUfcCCJsMBTw2bOXgU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_2_1.ps1
|
sample_2_1.ps1
|
# File DC_RegistryStorage.ps1
# Copyright 2020, Microsoft Corporation. All rights reserved.
Import-LocalizedData -BindingVariable UtilsRegistrySetupPerf
$OutputFile= $Computername + "_reg_MountedDevices.TXT"
RegQuery -RegistryKeys "HKLM\System\MountedDevices" -OutputFile $OutputFile -fileDescription "MountedDevices"
$OutputFile= $Computername + "_reg_MountedDevices.HIV"
RegSave -RegistryKey "HKLM\System\MountedDevices" -OutputFile $OutputFile -fileDescription "MountedDevices"
$iSCSIKeys = "HKLM\SYSTEM\CurrentControlSet\Services\iScsiPrt",
"HKLM\SOFTWARE\Microsoft\iSCSI Target",
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\iSCSI"
$OutputFile= $Computername + "_reg_iSCSI.TXT"
RegQuery -RegistryKeys $iSCSIKeys -OutputFile $OutputFile -fileDescription "iSCSI" -Recursive $true
$StorageKeys = "HKLM\System\CurrentControlSet\Control\MPDEV",
"HKLM\System\CurrentControlSet\Control\iSCSIPRT",
"HKLM\System\CurrentControlSet\Services\MSiSCSI",
"HKLM\System\CurrentControlSet\Services\MSDSM",
"HKLM\System\CurrentControlSet\Services\MPIO",
"HKLM\System\CurrentControlSet\Control\Class\{4d36e97b-e325-11ce-bfc1-08002be10318}",
"HKLM\System\CurrentControlSet\Services\Tcpip"
$OutputFile= $Computername + "_reg_Storage.TXT"
RegQuery -RegistryKeys $StorageKeys -OutputFile $OutputFile -fileDescription $UtilsRegistrySetupPerf.ID_RegSetupPerfStorage -Recursive $true
$OutputFile= $Computername + "_reg_Enum.TXT"
RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Enum" -OutputFile $OutputFile -fileDescription $UtilsRegistrySetupPerf.ID_RegSetupPerfEnum -Recursive $true
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKRFhSL/BhggCk
# knyW65quO5VqtMZbGYz5oJfR9p0d/aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBl7ft6b3tQ9ztsveDhoq3st
# D/dC9V1KoMyxFjxfkHaxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASoV+gnTWjO2XTkxV5JKUSspzCfeoBYcN1fmxPs799f1xre7S+WX8WQBu
# KBGJOd9KU7am25zQRDUDrbVvTlzIUKUyp9RD1MK2PaCbR1nBKtl1lfO9EC7rG8BT
# r5/fWrq0ZxxZNEk1uBoUQNMlsgkhwxuD6hmU1rieh4+wiSo8ibtV/Z72XF5FhwwC
# KNIhiW9qj1rc1BfZNYYJuFYRYc06iPA9KCapOs9BHg8cAjAu8dLRhnIg31RMLjSB
# mITMdxBJKa6JXhUhm8nPWHPgxBfo6kYcPas7Eo4BQmXOQi/M/XoEbGfJq5gVH+E5
# /9lRSoBVQ2eGrW9Eyr8Xz5JPhHK+g6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCADYFUTjKNv56cIbZMC76OFH2A90jBXuBbE0tVoEZvvrwIGZuspkdLk
# GBMyMDI0MTAyODExNDA0Mi4zODNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C
# u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx
# /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV
# V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR
# 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp
# gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo
# j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4
# yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm
# TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi
# wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd
# 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s
# huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q
# lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG
# l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc
# 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A
# /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl
# SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4
# gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG
# 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt
# oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc
# 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn
# ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq
# Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/
# R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK
# AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I
# gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo
# SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY
# o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k
# ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt
# 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb
# zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgL8S4S5IMht3A
# 4W2btaPkHG2VkXBpEHwd9+qS2WUWqSowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4
# MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB
# CwUABIICAGKzH29IjKCvKJhfvFI6pgGwhhPpN6r2j0m0tri2aadq1C5+kEw3p2cz
# wBrgZnFziAXjF1P6fFuQf+WPHSNTbbTDdOmDjWCnpotGbtvdpxFWAYoGCQxQQbLa
# /4dInxhzmq6vvKdJR8fboUgffJQEqkubovPKn+sgLaroZqz/MpmjeAQ2PazEPFu3
# l6LmNXtolBdgDDsne9bubN+Abz5UFEEPMgVq83hY5KHxUgYpBpAzuScCQptNUZ4V
# AHQl9gAslGiVBaMY7bD0i1a+6zYgUSFdw34qGXMlKznPbDsQIw29h4TnD6UeElzC
# 8ufYzJKLyczpTwdxEHGOWZIS/rVqcYbHL3em3mYXZRwu8dGc9pBcuQJumL5i+2zk
# 5uctHSnxHph0cT81vHEH1xo5XksQBJ3MYy8y6aNu8BNMhMrsdg4o/2RHd/7YJ6n3
# GxN/oxL5zY7+oTOSjDct8RKiD5OFcTxwtgLzuQjzT5unlM559VISSij+64wA2eqa
# GjGT9NDhUAyM8Yqa1C80WxESm2ueAtgPBaTeuaICfcdDFk8DIgCE3UN63985m5uQ
# zFoEhpn5Jng/8SDGup3zOafd+aBHH6czU/P0Y3XAXjZcRgh6wwVDV6QKbdUIpX7I
# 6Gy8Rgrcr3/iZgTd71qyVu5erlD0HGKge2KK1MifiskG8wG1CyX4
# SIG # End signature block
|
combined_dataset/train/non-malicious/Test-SqlConnection_1.ps1
|
Test-SqlConnection_1.ps1
|
#######################
<#
Version History
v1.0 - Chad Miller - Initial release
v1.1 - Chad Miller - Fixed issues, added colorized HTML output
#>
Add-Type -AssemblyName System.Xml.Linq
$Script:CMServer = 'MyServer'
#######################
function Test-Ping
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{
$ComputerName | foreach {$result=Test-Connection -ComputerName $_ -Count 1 -Quiet;
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args=$_;Result=$result;Message=$null}}
}
} #Test-Ping
#######################
function Test-Wmi
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{
try {
$ComputerName | foreach {$name=$_; Get-WmiObject -ComputerName $name -Class Win32_ComputerSystem -ErrorAction 'Stop' | out-null;
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null}}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-Wmi
#######################
function Test-Port
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName
,[Parameter(Mandatory=$true)] [int32]$Port)
Process {
try {
$Computername | foreach {
$sock = new-object System.Net.Sockets.Socket -ArgumentList $([System.Net.Sockets.AddressFamily]::InterNetwork),$([System.Net.Sockets.SocketType]::Stream),$([System.Net.Sockets.ProtocolType]::Tcp); $name=$_; `
$sock.Connect($name,$Port)
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null}
$sock.Close()}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-Port
#######################
function Test-SMB
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{ Test-Port $ComputerName 445 }
} #Test-SMB
#######################
function Test-SSIS
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName
,[Parameter(Mandatory=$true)] [ValidateSet("2005", "2008")] [string]$Version
)
#Note: Unlike the database engine and replication SSIS is not backwards compatible
# Once an assembly is loaded, you can unload it. This means you need to fire up a powershell.exe process
# and mixing between 2005 and 2008 SSIS connections are not permitted in same powershell process.
# You'll need to test 2005 and 2008 SSIS in separate powershell.exe processes
Begin {
$ErrorAction = 'Stop'
if ($Version -eq 2008)
{ add-type -AssemblyName "Microsoft.SqlServer.ManagedDTS, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" }
else
{ add-type -AssemblyName "Microsoft.SqlServer.ManagedDTS, Version=9.0.242.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" }
}
process
{
$ComputerName | foreach {
$name=$_; `
if ((test-SSISService -ComputerName $name).Result)
{
try {
$app = new-object ("Microsoft.SqlServer.Dts.Runtime.Application")
$out = $null
$app.GetServerInfo($name,[ref]$out) | out-null
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"}}
}
else
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message='SSIS Not Running'} }
}
}
} #Test-SSIS
#######################
function Test-SQL
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ServerInstance)
process {
$ServerInstance | foreach {
$name = $_; `
if ((test-Ping $(ConvertTo-ComputerName $name)).Result)
{
$connectionString = "Data Source={0};Integrated Security=true;Initial Catalog=master;Connect Timeout=3;" -f $name
$sqlConn = new-object ("Data.SqlClient.SqlConnection") $connectionString
try {
$sqlConn.Open()
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
finally { $sqlConn.Dispose() }
}
else
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message='Host Unreachable'} }
}
}
} #Test-SQL
#######################
function Test-AgentService
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{
try {
$ComputerName | foreach {
$name=$_; `
if (Get-WmiObject -Class Win32_Service -ComputerName $name -Filter {Name Like 'SQLAgent%' and State='Stopped'} -ErrorAction 'Stop') {
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message=$null} }
else {
new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null} }
}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-AgentService
#######################
function Test-SqlService
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{
try {
$ComputerName | foreach {
$name=$_; `
if (Get-WmiObject -ComputerName $name `
-query "select Name,State from Win32_Service where (NOT Name Like 'MSSQLServerADHelper%') AND (Name Like 'MSSQL%' OR Name Like 'SQLServer%') And State='Stopped'" `
-ErrorAction 'Stop')
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message=$null} }
else
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null} }
}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-SqlService
#######################
function Test-SSISService
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ComputerName)
process
{
try {
$ComputerName | foreach {
$name=$_; `
if (Get-WmiObject -Class Win32_Service -ComputerName $ComputerName -Filter {Name Like 'MsDtsServer%' And State='Stopped'} -ErrorAction 'Stop')
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message=$null} }
else
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null} }
}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-SSISService
#######################
<#
.SYNOPSIS
Runs a T-SQL script.
.DESCRIPTION
Runs a T-SQL script. Invoke-Sqlcmd2 only returns message output, such as the output of PRINT statements when -verbose parameter is specified
.INPUTS
None
You cannot pipe objects to Invoke-Sqlcmd2
.OUTPUTS
System.Data.DataTable
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -Query "SELECT login_time AS 'StartTime' FROM sysprocesses WHERE spid = 1"
This example connects to a named instance of the Database Engine on a computer and runs a basic T-SQL query.
StartTime
-----------
2010-08-12 21:21:03.593
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -InputFile "C:\\MyFolder\\tsqlscript.sql" | Out-File -filePath "C:\\MyFolder\\tsqlscript.rpt"
This example reads a file containing T-SQL statements, runs the file, and writes the output to another file.
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -Query "PRINT 'hello world'" -Verbose
This example uses the PowerShell -Verbose parameter to return the message output of the PRINT command.
VERBOSE: hello world
.NOTES
Version History
v1.0 - Chad Miller - Initial release
v1.1 - Chad Miller - Fixed Issue with connection closing
v1.2 - Chad Miller - Added inputfile, SQL auth support, connectiontimeout and output message handling. Updated help documentation
v1.3 - Chad Miller - Added As parameter to control DataSet, DataTable or array of DataRow Output type
#>
function Invoke-Sqlcmd2
{
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)] [string]$ServerInstance,
[Parameter(Position=1, Mandatory=$false)] [string]$Database,
[Parameter(Position=2, Mandatory=$false)] [string]$Query,
[Parameter(Position=3, Mandatory=$false)] [string]$Username,
[Parameter(Position=4, Mandatory=$false)] [string]$Password,
[Parameter(Position=5, Mandatory=$false)] [Int32]$QueryTimeout=600,
[Parameter(Position=6, Mandatory=$false)] [Int32]$ConnectionTimeout=15,
[Parameter(Position=7, Mandatory=$false)] [ValidateScript({test-path $_})] [string]$InputFile,
[Parameter(Position=8, Mandatory=$false)] [ValidateSet("DataSet", "DataTable", "DataRow")] [string]$As="DataRow"
)
if ($InputFile)
{
$filePath = $(resolve-path $InputFile).path
$Query = [System.IO.File]::ReadAllText("$filePath")
}
$conn=new-object System.Data.SqlClient.SQLConnection
if ($Username)
{ $ConnectionString = "Server={0};Database={1};User ID={2};Password={3};Trusted_Connection=False;Connect Timeout={4}" -f $ServerInstance,$Database,$Username,$Password,$ConnectionTimeout }
else
{ $ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2}" -f $ServerInstance,$Database,$ConnectionTimeout }
$conn.ConnectionString=$ConnectionString
#Following EventHandler is used for PRINT and RAISERROR T-SQL statements. Executed when -Verbose parameter specified by caller
if ($PSBoundParameters.Verbose)
{
$conn.FireInfoMessageEventOnUserErrors=$true
$handler = [System.Data.SqlClient.SqlInfoMessageEventHandler] {Write-Verbose "$($_)"}
$conn.add_InfoMessage($handler)
}
$conn.Open()
$cmd=new-object system.Data.SqlClient.SqlCommand($Query,$conn)
$cmd.CommandTimeout=$QueryTimeout
$ds=New-Object system.Data.DataSet
$da=New-Object system.Data.SqlClient.SqlDataAdapter($cmd)
[void]$da.fill($ds)
$conn.Close()
switch ($As)
{
'DataSet' { Write-Output ($ds) }
'DataTable' { Write-Output ($ds.Tables) }
'DataRow' { Write-Output ($ds.Tables[0]) }
}
} #Invoke-Sqlcmd2
#######################
function Test-DatabaseOnline
{
param([Parameter(Mandatory=$true, ValueFromPipeline = $true)] [string[]]$ServerInstance)
begin
{
$query = @"
SELECT name
FROM sysdatabases
WHERE DATABASEPROPERTYEX(name,'Status') <> 'ONLINE'
"@
}
process
{
try {
$ServerInstance | foreach {
$name=$_; `
$out = Invoke-Sqlcmd2 -ServerInstance $name -Database master -Query $query -ConnectionTimeout 5 | foreach {$_.name}
if ($out)
{$out = $out -join ","; new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message=$out} }
else
{ new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$true;Message=$null} }
}
}
catch { new-object psobject -property @{Test="$($myinvocation.mycommand.name)";Args="$name";Result=$false;Message="$($_.ToString())"} }
}
} #Test-DatabaseOnline
#######################
filter ConvertTo-ComputerName
{
param ($ServerInstance)
if ($_)
{ $ServerInstance = $_ }
$ServerInstance -replace "\\\\.*|,.*"
} #ConvertTo-ComputerName
#######################
filter ConvertTo-NamePortNumber
{
param ($ServerInstance)
if ($_)
{ $ServerInstance = $_ }
$work = $ServerInstance -split ","
if ($work[1])
{ new-object psobject -Property @{ComputerName=$work[0];PortNumber=$work[1]} }
} #ConvertTo-NamePortNumber
#######################
function Get-CMServer
{
param($ServerInstance,$GroupName,[switch]$UsePort)
$query = @"
FROM msdb.dbo.sysmanagement_shared_registered_servers s
JOIN msdb.dbo.sysmanagement_shared_server_groups g
ON s.server_group_id = g.server_group_id
WHERE 1 = 1
"@
if ($UsePort) {
$query = "SELECT DISTINCT s.server_name AS 'name'`n" + $query + "`nAND PATINDEX('%,%', s.server_name) <> 0"
}
else {
$query = "SELECT DISTINCT s.name`n" + $query
}
if ($GroupName) {
$query = $query + "`nAND g.name = '$GroupName'"
}
#Write-Host $query
Invoke-SqlCmd2 -ServerInstance $ServerInstance -Database msdb -Query $query | foreach {$_.name}
} #Get-CMServer
#######################
filter Get-SqlVersion2
{
param($ServerInstance)
$query = @"
select CAST(SERVERPROPERTY('ServerName') AS varchar(128)) AS 'server_name',
CASE CONVERT(int, LEFT(CONVERT(varchar(10),SERVERPROPERTY('ProductVersion')),1))
WHEN 1 THEN '2008'
WHEN 9 THEN '2005'
WHEN 8 THEN '2000'
END AS 'version'
"@
if ($_)
{ $ServerInstance = $_ }
Invoke-SqlCmd2 -ServerInstance $ServerInstance -Database master -Query $query -ConnectionTimeout 5
} #Get-SqlVersion2
#######################
function Test-Main
{
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)] [ValidateSet("Ping","WMI","SMB","Port","SQL","Database","SSIS","Agent")] [string]$Test,
[Parameter(Position=1, Mandatory=$false)] [string]$GroupName,
[Parameter(Position=2, Mandatory=$false)] [string]$SqlVersion='2008'
)
#HTML colorize code adapted from post by Joel Bennet
#http://stackoverflow.com/questions/4559233/technique-for-selectively-formatting-data-in-a-powershell-pipeline-and-output-as
switch ($test)
{
'Ping' { $html = Get-CMServer $Script:CMServer $GroupName | ConvertTo-ComputerName | Test-Ping | ConvertTo-Html }
'WMI' { $html = Get-CMServer $Script:CMServer $GroupName | ConvertTo-ComputerName | Test-WMI | ConvertTo-Html }
'SMB' { $html = Get-CMServer $Script:CMServer $GroupName | ConvertTo-ComputerName | Test-SMB | ConvertTo-Html }
'Port' { $html = Get-CMServer $Script:CMServer $GroupName -UsePort | ConvertTo-NamePortNumber | foreach {Test-Port $_.ComputerName $_.PortNumber} | ConvertTo-Html }
'SQL' { $html = Get-CMServer $Script:CMServer $GroupName | Test-SQL | ConvertTo-Html }
'Database' { $html = Get-CMServer $Script:CMServer $GroupName | Test-DatabaseOnline | ConvertTo-Html }
'SSIS' { $html = Get-CMServer $Script:CMServer $GroupName | Get-SqlVersion2 | where {$_.version -eq $SqlVersion } | foreach {$_.server_name} | ConvertTo-ComputerName | Test-SSIS -Version $SqlVersion | ConvertTo-Html }
'Agent' { $html = Get-CMServer $Script:CMServer $GroupName | ConvertTo-ComputerName | Test-AgentService | ConvertTo-Html }
}
$xml = [System.Xml.Linq.XDocument]::Parse("$html")
# Find the index of the column you want to format:
$index = (($xml.Descendants("{http://www.w3.org/1999/xhtml}th") | Where-Object { $_.Value -eq "Result" }).NodesBeforeSelf() | Measure-Object).Count
# Format the column based on whatever rules you have:
switch($xml.Descendants("{http://www.w3.org/1999/xhtml}td") | Where { ($_.NodesBeforeSelf() | Measure).Count -eq $index } ) {
{'True' -eq $_.Value } { $_.SetAttributeValue( "style", "background: green;"); continue }
{'False' -eq $_.Value } { $_.SetAttributeValue( "style", "background: red;"); continue }
}
# Save the html out to a file
$xml.Save("$pwd/$test.html")
# Open the thing in your browser to see what we've wrought
ii .\\$test.html
} #Test-Main
|
combined_dataset/train/non-malicious/sample_3_21.ps1
|
sample_3_21.ps1
|
ConvertFrom-StringData @'
id_pstat=Process and Driver Information (pstat)
id_pstatrunning=Running pstat tool to obtain process information
id_pstatoutput=Pstat Output
'@
# SIG # Begin signature block
# MIIoQgYJKoZIhvcNAQcCoIIoMzCCKC8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD4yRyKeveIXxtP
# fjWWPVGTxAISaX9GfSXbANwCHxe5/KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK/Ln8AQ/GZyTPj7SCX1Yq1V
# cHOCad5uAS7pnO1xwPuvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAonpgy3l5kfLbY/1P2fd0e3oOX8kdFUPC5RQ0hUfOzAAGfZ0+JmVAGLX3
# VZgHTBrKMjqpj/mSLlFwK0OngqX9DBKZ0u9qhqOpUmyEDnupTUPlxFOIbfyjUVMW
# 3zDqzmxjUZSC1cl9WTsUwWlWo0TPKtLcBb3Kz91ZWZceLRJqLDmrCtviTU9ip+Pj
# O+qM8r73GKMkIeCJckepPuT1vCefGcE1fxeE314GIMcIuJcAKZdQeJ69/YqOO5rH
# 7Dpq+g3Aw/eGJWGkRq2jqWCCB7gdwtWkz1+4v0xEKT9VL98w80HNPZIcM0MfDLo2
# 4clHz2y9XFXL2Ol3QfGs+qA+lSUpUKGCF6wwgheoBgorBgEEAYI3AwMBMYIXmDCC
# F5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAbePUTcTxoc8Auq7FEbh9gqWaf21ANjXuAhunLwpbYGAIGZv8ZfhHR
# GBIyMDI0MTAyODExNDA0MS44MlowBIACAfSggdmkgdYwgdMxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
# OjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjQw
# NzI1MTgzMTA0WhcNMjUxMDIyMTgzMTA0WjCB0zELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NkIwNS0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDRQl4sxH831Y8FmG4pUUX5
# 5Ylnrxa6N2PhfolHTlzE7kJ6k1ejXutVrPBYuSbkCNpWHX1lWMMKEfOKbGyhpfE2
# 7wgOCArCle+kAAi2/hTHnR71La5XB8q/nun0kob5DtU41KG6OXU0IyRyBKs92Z3/
# zNyyaHNw2hsuiasIAg5FnwjCFjLiyJVCV/U0qGXIDOaRYkPQ37rQiKiAUHODfIhK
# y+ug7HTHXFKLY+JEhCVNcTvgyCBkMgMqof+Fv0VPaQr+dX9peO6j0syutGafjihh
# gAN7+s73kX5Ibe666F/4fgiuJevSH2m0DpLAck9LZWZs1YKNBarkbhiStyps8xrH
# u81dTC7tPrkTx8U93Ui4T1GwbhMwBXteRcGimY81+8vSGPGDjiSlCffzhXjqj7N1
# CrLkr10OVab8nq9m2nnIDU/IPfD4dsa5tLSeIRDUvrAY6s9/MibQV06f7EWjjwRG
# X4XHD/c69czkJjUSqfMTOc+PMlzs4nCElVHdVAMeMFwQVM69L0TR2I27V6hzD5kK
# TPg+7+hC/6CpT5t/Evx7s8WS19EOUzoXI7OM/jO4jbmAPy073MmDqDp9Glplzjf2
# YBuSXfMJXNMsOByG/pLFBqMm2++hBpnFB/S1GI9xuvYdZ8yiqp326JDSFNQSEbjg
# UFJN5Q9l4R6dEJZp0JbgbwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFEjBmwm45wl9
# Jw9Zxdm4EDgHz0ryMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDXeQGKsfVwe7VZ
# hHXKyPXbmiYa1DQ9pCQTPAZvvTG2pKgj6y9CKGyB1NjFo9+nYhUV2CNoxoGLzXAH
# z+e7zroV8Uop2F2nfCcxn3U+k/g6h7s1x/qogKSBK7CB0h1C+oTSHxVDlBbmwNXh
# DQmePh/sodjHg2IzwLiNPDxJC2y7FaJMfYeKR/dBgHvVrt0H3OAc6RbSGBQR5Y72
# aHbBaphL9DjwBKM6pjD+FrnihU59/bZZqgf78fF301MRT/i+W+xEgxZPSOyc0jvW
# NUCtPhD0G3pVKFbPKqtoTpIpShmsTAGlWwjQsyDZfeE4tuULW/Ezf7AzI6H3toU6
# zuwWe56a0jYx+PyqDXoFlMnFeWk+6tasb44GPgGhMOQL0DFdgHfIS27AyzulFYvL
# EjHD/BX1McpQab7H5UTQ84vCStIyCO6VJeSl8QsdZaIJWyUlsUggH/gCW/6NAlIo
# Am6j0IStubap4OT/OMliVhpUYzIq5hn65JFUoHaqQQ9wTMbV073MhrUynfYn7PNb
# c/uy4l+PDrazeEM4uT7qUxA5HTjH7ajXsbctx4uSTEmbjUSt2JOMCZ0KV6f3KXoe
# AykZLiiSMUIlf4Kk4VfuAEDc9XFBa5uKwBBsvkeBMUG1A0TNwJ2HUZjD/qfPM023
# 7QZCeehsF1184CKqTO8i2peO8bIrVDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYwgdMxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
# OjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAVT15Kl3GzRrTokUi4YUciP8j7fqCBgzCB
# gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA
# AgUA6sni7zAiGA8yMDI0MTAyODEwMTYxNVoYDzIwMjQxMDI5MTAxNjE1WjB0MDoG
# CisGAQQBhFkKBAExLDAqMAoCBQDqyeLvAgEAMAcCAQACAhX6MAcCAQACAhKgMAoC
# BQDqyzRvAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGlQVTj69kkXJSZV
# v5ZlYhibznBaRqpRAwhcNrz0AlF0Qg1kFhi4olkfAZd68jJxqojkxwaDbxSdeVPz
# n5UsdxFvYGpMGqVQN/JYwMNKLj83LWj6KEWiGGz+6NC7GSHaWx+7d/xE76sfK/Kh
# zppViheluxiw+y9aGU/lUhjfJc7vO0H1N2+hdd+xIwgaAg5RE2MLn6Yf6vhHSCSC
# s7/1mQFJZrH8OgBAYQ4BDL2zpZ+E9b09PEgGSNticTHDziPU9b/to9WFq/Ogd9PR
# 8/t6H14I1j1rH4Behr+k46u4XOmMwvf/ej1VGCWrLqO9wHE7SHpR/0WSqcfCDsGw
# xwhaKq8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAfaDLyZqVF0iwQABAAAB9jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI
# hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCD+yrx68HH4pLKy
# 6hjVRUouzYQ1KCzlTIqAKoYAgpjYdTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw
# gb0EICthTPGUXqblRItLh/w1cv/xqg0RV2wJlGYX4uVCMbaiMIGYMIGApH4wfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYw
# IgQgWtoGCTjFdqMwAjrytRALJJQ4oYNF4QBBQ4C6+EjDACUwDQYJKoZIhvcNAQEL
# BQAEggIAC1hI0qNdt1Wk6lUuDkKQc6vN2cZhxZpOnHA8FhSvsemKci61RYXkqBrB
# KbQlZdE42FPtaon0jtzHlyOAgGDgN6YHYlCS+/V2L4hErRSvs8bhMP77FtFMGpje
# sOS+RnA5Ly+0TaqlZAqHF1T39xTdRWwcc5fBoCi0rrAOfvbS7jtaNvWMm2B5DJcU
# whfeOTHJ70aSuSyLZ1hX9ewTd6TwpGb0tveSihqzNt8IChKOydLJP8Xroqp5/1N4
# 4zRaFx9Oe/A6Acu4QQo72G0Ucq8zzuufCyLVFXAoo+UR98fTDnxhqnPyyTLSpZ59
# IUvzh3uP7+fWkTKtnvggnBWTqzWlOrDu8zlMTYYLjUyTYRCx0YTv4gL4Qp+OaZ2Q
# ZwULgFWub1rVWHM4nV3FJquAiuMvOKnb1oldHg4QaB/nKWoznms8PiqqWhJOtTPz
# Y9W/pIrg5QJTjAqRVVUprMzk0YoK9RSU7uLSfjKKs/XLTkkrL1B3hWaCOtyvFbXq
# Plaqc4sZJJWfB3Jsm/XnKeBHLJiAaYmDyFydnt40o0qc8LBT2ppZwUc1DfeW6NiZ
# rU3ALE/xkmZZRlTQKR/zMAJCTN4FyN7tanB9QO6cAZl0RlcuvL+8IL5lbwtPRYCD
# yYbn/2RxHaaKo98jYqU7sY5de5HzwBp5HYcUciClH8jUCzxLB3U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_24_29.ps1
|
sample_24_29.ps1
|
ConvertFrom-StringData @'
EnvironmentErrorAlreadyExists=此名稱和類型的環境變數已存在。
EnvironmentErrorDoesNotExists=此名稱和類型的環境變數不存在。
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+q3Y9x2K/NoP3
# G6fKLijOxXbvTZPXwJNztnWJnMPqxaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMjR
# jQrrHaMw//N97/jvJ8qS/4Uv3BliNzMv6cE5UTNOMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA5V2R8INOCExdLYxq8ZhCjGDjr84wLNo2KGn3
# 6zaXA9fuEXKjkhH0qn5rGFZdhCGDY4IxIjQ4xAnZ7xpNsnzSdLKhncIaqYCZCLMC
# +lzLFffwtLW12lLMiD44QpO+zH4n2OsreZ8NxJqssUfAtMtOAsdkvHwsVmUzU+OH
# cfF0FR149nkMXLKCE3LqBCFwTVAiPQtTdlebqxyo5HZWackufqO2ampx1jSe9ZW3
# JBaOQ0DiCFbIJElbxa13A/0DtrAqD3GIBpdWL6C5mXbkJ615ZmR1GNGOj6mgan28
# rXgPNKhbfW2WnS2ekqHNAOZ6kBLjluE8DTIl3+16rj11ejIElaGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBz+p7Oiv+O7YHsZ9QF7aC77MOWM1HHYRWm
# 64ztSINbMQIGZhfVdsMMGBMyMDI0MDQxNzE3MDQ0NS45MzNaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB
# AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM
# v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO
# GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE
# 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh
# 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj
# UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr
# /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI
# GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP
# kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68
# UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf
# itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74
# BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4
# dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c
# C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk
# 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN
# nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5
# FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun
# bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6
# +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL
# BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj
# ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le
# hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um
# r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5
# 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6co7nDAi
# GA8yMDI0MDQxNzEyMTQyMFoYDzIwMjQwNDE4MTIxNDIwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDpyjucAgEAMAcCAQACAgNnMAcCAQACAhOyMAoCBQDpy40cAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF7SDe/TQWwiwJwefuJ1MvxjtJvJ
# 3vgMIzyR9yGptyKZ6NitqL9XbD90jNQOksndIxTFaOrM/6crO8FurjKlnebgj/w3
# 5LNgSiUD1qUmqmn4QrjSez6CYZNFlOHUaBkwcqADO7QDPsRusJ2VtJCvX15Q4Nh7
# /pJ3ii30WfZmy9x+de7aH3HCwjcril3qXmiDfNvkALV+UQQcmw4bL4XQAjBB50g8
# 0IxI7m0qFEIBzRp3URPIDnvugbeq7Pomd3lk52fWjHdQNYESL/+OIy9U/vC2SfRB
# nEKlkIo8L+hRPe7QTvXal7zYyPDaOyMz96p+155dke0ZJZVRPxgElJpk7c0xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu
# jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCALHAuUQmpEnUxYXQ03ANstxS+o
# g869+jWSu7kN1R84UzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12
# aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgZ+AvDXuL
# UatHjYteJe6L9fJgIwRUMQF6ocnrSbQ+tywwDQYJKoZIhvcNAQELBQAEggIAVHz6
# 2FgmSO5ZZVKMJ0+RU4V8tJdYMF1Yem+gTAqrRXCiuz+8ngYCD/SlJbA3SzlowTHK
# 3y092y6xhgkWd5QK2WFdy/C5ZCWqluJYMMLUCZjuuxnIuaB6ZnWAuw+3p39OpTgm
# nxZSfAhAg6B1xxdlPOeC70TWJ5wjnn22QHIZgpXlbleVdrivt9UzjL547BT1/336
# mzGYo1s/IF/ffVE70tT8fv9b3PMLdkD5lYlswnAc/rGQQHtr+NyPsTRyvui/QI9f
# PW6RlSgml+KgdMqYRaexy0EoZO1dFkpG7uXNegspIktTLTe7HqOQPoY8JIQQgQ4m
# ZvxNzKL8D46u2l+UYO+vkXfFY0In1lRS7FOrsm9mpEkpkAwGyU7fcbQpbY7gSoPs
# 7uBK1Mylx/gK7NDnjQj3bay3mp1uyGzrJGhu3tRNMQsrhJUT7EoUfJJdfOPR3cEr
# sdRV3FG9OWlbjAuGQOM569agUYXrsC6lqCHYCcszJgodOrtZrYIiY3i7/+8CXfSX
# XcMpzgjE+eYxwcqnpzd/B/onohLI15BmCPHmWTiZmDQO0lC4ZvXBfaQ+hH3o6OvJ
# ITTZvQjocXK5hruaPb1LNwQ4qglb+eN8JOYPuxi7Hlt0YRxbOp3BX1EmB8bKlbBj
# aIxMrU6Bon0OLuXu5Z8soNXTQIxQh3Wwjq3n9g0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_41_39.ps1
|
sample_41_39.ps1
|
#
# Module manifest for module 'OCI.PSModules.Announcementsservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Announcementsservice.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4260cf9c-0dfb-4f1c-ac46-7d08fcbebbf2'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Announcementsservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Announcementsservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAnnouncementsserviceAnnouncement',
'Get-OCIAnnouncementsserviceAnnouncementsList',
'Get-OCIAnnouncementsserviceAnnouncementsPreference',
'Get-OCIAnnouncementsserviceAnnouncementsPreferencesList',
'Get-OCIAnnouncementsserviceAnnouncementSubscription',
'Get-OCIAnnouncementsserviceAnnouncementSubscriptionsList',
'Get-OCIAnnouncementsserviceAnnouncementUserStatus',
'Move-OCIAnnouncementsserviceAnnouncementSubscriptionCompartment',
'New-OCIAnnouncementsserviceAnnouncementsPreference',
'New-OCIAnnouncementsserviceAnnouncementSubscription',
'New-OCIAnnouncementsserviceFilterGroup',
'Remove-OCIAnnouncementsserviceAnnouncementSubscription',
'Remove-OCIAnnouncementsserviceFilterGroup',
'Update-OCIAnnouncementsserviceAnnouncementsPreference',
'Update-OCIAnnouncementsserviceAnnouncementSubscription',
'Update-OCIAnnouncementsserviceAnnouncementUserStatus',
'Update-OCIAnnouncementsserviceFilterGroup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Announcementsservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-WindowsExperience_1.ps1
|
Get-WindowsExperience_1.ps1
|
function Get-WindowsExperienceRating {
#.Synopsis
# Gets the Windows Experience Ratings
#.Parameter ComputerName
# The name(s) of the computer(s) to get the Windows Experience (WinSat) numbers for.
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string[]]$ComputerName='localhost'
)
process {
Get-WmiObject -ComputerName $ComputerName Win32_WinSAT | ForEach-Object {
if($_.WinSatAssessmentState -ne 1) {
Write-Warning "WinSAT data for '$($_.__SERVER)' is out of date ($($_.WinSatAssessmentState))"
}
$_
} | Select-Object -Property @{name="Computer";expression={$_.__SERVER}}, *Score #, WinSPRLevel
}
}
|
combined_dataset/train/non-malicious/sample_56_65.ps1
|
sample_56_65.ps1
|
#
# Module manifest for module 'OCI.PSModules.Workrequests'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Workrequests.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'bfd147d7-2910-4621-842b-b948c79cda01'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Workrequests Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Workrequests.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWorkrequestsList', 'Get-OCIWorkrequestsWorkRequest',
'Get-OCIWorkrequestsWorkRequestErrorsList',
'Get-OCIWorkrequestsWorkRequestLogsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Workrequests'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-MWSOrder_2.ps1
|
Get-MWSOrder_2.ps1
|
// --------------------------------------------------------------------------------------------------------------------
// <copyright file="GetOrderCmdlet.cs" company="Huddled Masses">
// Copyright (c) 2011 Joel Bennett
// </copyright>
// <summary>
// Defines the Get-Order Cmdlet for Amazon Marketplace Orders WebService.
// </summary>
// --------------------------------------------------------------------------------------------------------------------
namespace PoshOrders
{
using System;
using System.Management.Automation;
// I'm using Amazon's MarketplaceWebServiceOrders Apache-licensed web-service access code.
using MarketplaceWebServiceOrders;
using MarketplaceWebServiceOrders.Model;
/// <summary>
/// Get Amazon Marketplace Orders from the WebService
/// </summary>
[Cmdlet(VerbsCommon.Get, "Order")]
public class GetOrderCmdlet : Cmdlet
{
// Access Key ID and Secret Access Key ID for the Amazon MWS
/// <summary>The Amazon Access Key ID</summary>
private const string AccessKeyId = "INSERT YOUR MWS ACCESS KEY HERE";
/// <summary>The Amazon Secret Key</summary>
private const string SecretAccessKey = "INSERT YOUR MWS SECRET ACCESS KEY HERE";
/// <summary>The Application Name is sent to MWS as part of the HTTP User-Agent header</summary>
private const string ApplicationName = "INSERT YOUR APPLICATION NAME HERE";
/// <summary>The Application Version is sent to MWS as part of the HTTP User-Agent header</summary>
private const string ApplicationVersion = "1.0";
/// <summary>Default value for the service URL is for the USA</summary>
private string serviceUrl = "https://mws.amazonservices.com/Orders/2011-01-01";
/// <summary>The web service client</summary>
private MarketplaceWebServiceOrdersClient marketplaceWebServiceOrdersClient;
/// <summary>Default value for "Created After" is 1 day ago.</summary>
private DateTime createdAfter = DateTime.MinValue;
/// <summary>Default value for "Created Before" is infinitely in the future</summary>
private DateTime createdBefore = DateTime.MaxValue;
/// <summary>The Default order status is Unshipped or PartiallyShipped</summary>
private OrderStatusEnum[] orderStatus = new[] { OrderStatusEnum.Unshipped, OrderStatusEnum.PartiallyShipped };
/// <summary>
/// Gets or sets the merchant id.
/// </summary>
/// <value>
/// The merchant id.
/// </value>
[Parameter(Mandatory = true, Position = 0, ValueFromPipelineByPropertyName = true)]
public string MerchantId
{
get;
set;
}
/// <summary>
/// Gets or sets the marketplace id.
/// </summary>
/// <value>
/// The marketplace id.
/// </value>
[Parameter(Mandatory = true, ValueFromPipelineByPropertyName = true)]
public string[] Marketplace
{
get;
set;
}
/// <summary>
/// Gets or sets the service URL.
/// Defaults to the USA service URL.
/// </summary>
/// <value>
/// The service URL.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public string ServiceUrl
{
get
{
return this.serviceUrl;
}
set
{
this.serviceUrl = value;
}
}
/// <summary>
/// Gets or sets a date orders must prescede.
/// </summary>
/// <value>
/// The date.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public DateTime CreatedBefore
{
get
{
return this.createdBefore;
}
set
{
this.createdBefore = value;
}
}
/// <summary>
/// Gets or sets a date the orders must come aftercreated after.
/// </summary>
/// <value>
/// The created after.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public DateTime CreatedAfter
{
get
{
return this.createdAfter;
}
set
{
this.createdAfter = value;
}
}
/// <summary>
/// Gets or sets the order status.
/// </summary>
/// <value>
/// The order status.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public OrderStatusEnum[] OrderStatus
{
get
{
return orderStatus;
}
set
{
orderStatus = value;
}
}
/// <summary>
/// Gets or sets the buyer email.
/// </summary>
/// <value>
/// The buyer email.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public string BuyerEmail
{
get;
set;
}
/// <summary>
/// Gets or sets the seller order id.
/// </summary>
/// <value>
/// The seller order id.
/// </value>
[Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)]
public string SellerOrderId
{
get;
set;
}
/// <summary>
/// Gets or sets whether to include the Order Items
/// </summary>
/// <value>
/// True to included the Order Items
/// </value>
[Parameter(Mandatory = false)]
public SwitchParameter IncludeItems
{
get;
set;
}
/// <summary>
/// Implement the Begin step for PowerShell Cmdlets
/// </summary>
protected override void BeginProcessing()
{
base.BeginProcessing();
var config = new MarketplaceWebServiceOrdersConfig
{
ServiceURL = "https://mws.amazonservices.com/Orders/2011-01-01"
};
this.marketplaceWebServiceOrdersClient = new MarketplaceWebServiceOrdersClient(
ApplicationName, ApplicationVersion, AccessKeyId, SecretAccessKey, config);
}
/// <summary>
/// Implement the Process step for PowerShell Cmdlets
/// </summary>
protected override void ProcessRecord()
{
base.ProcessRecord();
/*
// If no dates are specificied, start a day ago ...
if (CreatedBefore == DateTime.MaxValue && CreatedAfter == DateTime.MinValue)
{
CreatedAfter = DateTime.UtcNow.AddDays(-1);
}
*/
// Amazon's policy doesn't allow calling with a CreatedBefore after two minutes before the request time
if (CreatedBefore == DateTime.MaxValue)
{
CreatedBefore = DateTime.Now.AddMinutes(-2);
}
var orderRequest = new ListOrdersRequest
{
MarketplaceId = new MarketplaceIdList(),
OrderStatus = new OrderStatusList(),
BuyerEmail = this.BuyerEmail,
SellerId = this.MerchantId,
SellerOrderId = this.SellerOrderId,
CreatedAfter = this.CreatedAfter,
CreatedBefore = this.CreatedBefore
};
orderRequest.OrderStatus.Status.AddRange(OrderStatus);
orderRequest.MarketplaceId.Id.AddRange(Marketplace);
var response = marketplaceWebServiceOrdersClient.ListOrders(orderRequest);
foreach (var order in response.ListOrdersResult.Orders.Order)
{
var output = new PSObject(order);
if (IncludeItems.ToBool())
{
var itemRequest = new ListOrderItemsRequest
{
AmazonOrderId = order.AmazonOrderId,
SellerId = this.MerchantId,
};
var items = marketplaceWebServiceOrdersClient.ListOrderItems(itemRequest);
output.Properties.Add(new PSNoteProperty("Items", items.ListOrderItemsResult.OrderItems.OrderItem));
}
WriteObject(output);
}
}
}
}
|
combined_dataset/train/non-malicious/3185.ps1
|
3185.ps1
|
function New-IPRange {
[cmdletbinding()]
param (
[parameter( Mandatory = $true,
Position = 0 )]
[System.Net.IPAddress]$Start,
[parameter( Mandatory = $true,
Position = 1)]
[System.Net.IPAddress]$End,
[int[]]$Exclude = @( 0, 1, 255 )
)
Write-Verbose "Parsed Start as '$Start', End as '$End'"
$ip1 = $start.GetAddressBytes()
[Array]::Reverse($ip1)
$ip1 = ([System.Net.IPAddress]($ip1 -join '.')).Address
$ip2 = ($end).GetAddressBytes()
[Array]::Reverse($ip2)
$ip2 = ([System.Net.IPAddress]($ip2 -join '.')).Address
for ($x=$ip1; $x -le $ip2; $x++)
{
$ip = ([System.Net.IPAddress]$x).GetAddressBytes()
[Array]::Reverse($ip)
if($Exclude -notcontains $ip[3])
{
$ip -join '.'
}
}
}
|
combined_dataset/train/non-malicious/sample_31_82.ps1
|
sample_31_82.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function set-AMTMPSClient {
<#
.Synopsis
Add and remove clients from the Intel Fast Call for Help Management Presence Server (MPS) interface
.Description
Add and remove clients from the Intel Fast Call for Help Management Presence Server (MPS) interface
.Notes
The valid parameters for –action are {add, remove}
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
set-AMTMPSClient -action add -hostname DemoClient
Added DemoClient to MPS client list
.Example
set-AMTMPSClient -action remove -hostname DemoClient
Removed DemoClient from MPS client list
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname")] [String] $Hostname,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="add | remove")] [ValidateSet("add", "remove")] [String] $Action
)
Process {
[System.Reflection.Assembly]::LoadWithPartialName("Intel.Management.Wsman")
$mps = new-object Intel.Management.Wsman.MpsManager
if ($Action -eq "ADD")
{
$mps.AddHost($Hostname)
write-output "Added $Hostname to MPS client list"
}
if ($Action -eq "REMOVE")
{
$mps.RemoveHost($Hostname)
write-output "Removed $Hostname from MPS client list"
}
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDnljS91Hpq4vaA
# g11SeVbZ+plYHO153q6o7dikRhD736CCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgSeIbQsLb22PSvHyd
# J5GOk84aCtsj+AjIatGPvOkuT1owDQYJKoZIhvcNAQEBBQAEggGAQ5y3SyfgOlIs
# CjaiaehAKkjz+YOMevmq7/wQ+BsDBCf/uUsBAVm+mc4FUFpOuhTUWdDr2uQM+BQ9
# T7qSlefwaKk2A7OkR3XixHSdDSwVz+OTOQPqxL2RVK+KKBJqj37q2J08JpjQ4693
# QEQd438oFTDlX3dZf7g/RkQT9EQWKJQZEZCUleguytimDiq2aPzNFfZT2NGJsqL/
# e5iLx1vjw8KZc7XdzhCA6SrRzn67OXirZWNGEinZ/vaupVRTOTGbRFy6CVMXQZ31
# tqNmf8XXS7+nsavKUhYXYn7h/KV6BtoznFGXg6EwQQ8TbPa3W0G0OQ7MB3JCpy0O
# cpvQNOXMIVuQoQcW3ww8qGjfry21/LiiUCcC9DyC6Q2m4tFw7IEcepe1DWpkNf7L
# q8pzInDvAqniXKpgpkua5Y4t6IHUoMMGyLuff0m67rqpWOr5KeFoLkvCjY/JQ0j1
# KS2f4p+QZmAeXkrpvKbxbR6/9y4hMD0uJ2YEcN8ynxbToOMNuv/UoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIHVDhf8uR/3ymq8UKaEXYutj+GjdwyAMkKvw
# rtbnl3wWAhUA4JsgQwgI+/zwZABVXxh4M/OhWzoYDzIwMjEwNzE5MTYzMTIxWqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMDcxOTE2MzEyMVowPwYJKoZIhvcNAQkEMTIEMFCm8asOOjmJ
# XumFx8ZKmfvbzqdcaIfeTV6IP3uAZodVenic0+NC8TFprxAjF6aJ+zCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgA3w6BEWtE3ihhSAKngCaMzZldDH7SRk2FN3cUUVjCjrzG7CQHV
# fHkJmZ/uOSuwGMOupm9C5HIA8H/Zm0OCWdTo6cjCI8/QbSJ7XnOdJ1aVpY0ZqKdu
# Z+6P5pQedndhAxrl6P4Wxb/KcEG7OUbxuExpoEsRQaZqbWZ1TJ/ONhklhLYRXrLV
# YTY3bGTKjBAYXEogShJF86S/QtFx7Op2GWkSJno9ilgv25Xjm1TXJ6lhdQfCqqiN
# yUJj/s2MuWoeJpPKbrw8+qllx7fR/rz4Lmcvp/TnzPVevTpHYO3OfZs2b+lUAeGR
# IrDVWx8BwgVvqO5qnQ97rVmWTX4FgZZOmOyAXDCYPiwR9JMHxHlXMhAuscYvqkU9
# 763r2oHjFi1TApua5Ti50mRIQrEE0ZqNWjGw8OEdSDwW993FSw/RkJL6pTa5vDHw
# Dr/Daua0WNFAbawY57CcE4YNoyN0Q/+oiDJGsQ6Xa7TP70q/77ntxRl3+Eo1bkjj
# zG8Vp+DNgoNaeapRWVv31r26FZmkE9mT5TFx6s5ytcoSyJCz+OKS8wO/HIRys+gu
# ySJ1jYguMX4z3r/dLDFveuM21VFU6D13HTy5f+YPYWoFLyezJZxWRBI0Q7Q1O/5s
# KXXeih0BV2lJQ9V13XbbqvyKCuKDChXne+mdwp4ZnrQYG3vWgEdHZThbXg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/Move-LockedFile.ps1
|
Move-LockedFile.ps1
|
##############################################################################\n##\n## Move-LockedFile\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nRegisters a locked file to be moved at the next system restart.\n\n.EXAMPLE\n\nMove-LockedFile c:\\temp\\locked.txt c:\\temp\\locked.txt.bak\n\n#>\n\nparam(\n ## The current location of the file to move\n $Path,\n\n ## The target location of the file\n $Destination\n)\n\nSet-StrictMode -Version Latest\n\n## Convert the the path and destination to fully qualified paths\n$path = (Resolve-Path $path).Path\n$destination = $executionContext.SessionState.`\n Path.GetUnresolvedProviderPathFromPSPath($destination)\n\n## Define a new .NET type that calls into the Windows API to\n## move a locked file.\n$MOVEFILE_DELAY_UNTIL_REBOOT = 0x00000004\n$memberDefinition = @'\n[DllImport("kernel32.dll", SetLastError=true, CharSet=CharSet.Auto)]\npublic static extern bool MoveFileEx(\n string lpExistingFileName, string lpNewFileName, int dwFlags);\n'@\n$type = Add-Type -Name MoveFileUtils `\n -MemberDefinition $memberDefinition -PassThru\n\n## Move the file\n$type::MoveFileEx($path, $destination, $MOVEFILE_DELAY_UNTIL_REBOOT)
|
combined_dataset/train/non-malicious/PurgeFile script..ps1
|
PurgeFile script..ps1
|
<#
.SYNOPSIS
Purgefiles - recursively remove files with given extension and maximum age from a given path.
.DESCRIPTION
Read the synopsis
Example
PurgeFiles.psq -path C:\\temp -ext .tmp -max 24
.EXAMPLE
PurgeFiles.psq -path C:\\temp -ext .tmp -max 24
#>
# HISTORY
# 2010/01/29
# rluiten Created
param(
[Parameter(Mandatory=$true)][string] $path
,[Parameter(Mandatory=$true)][string] $extension
,[Parameter(Mandatory=$true)][int] $maxHours
,[switch] $deleteMode = $false
,[switch] $listMode = $false
)
function delete-file([string]$path, [string]$extension, [datetime]$oldestAllowed, [bool] $deleteMode, [bool] $listMode)
{
$filesToRemove = Get-Childitem $path -recurse |
?{ !$_.PSIsContainer -and
$($_.LastWriteTime -lt $oldestAllowed) -and
($_.Extension -eq $extension)
}
if ($listMode -and $filesToRemove) {
$filesToRemove | %{write-host "FILE: $($_.LastWriteTime) ""$($_.FullName)""`r`n"}
}
if ($deleteMode -and $filesToRemove) {
write-host "Removing Files...`r`n"
$filesToRemove | remove-item -force
}
}
$oldestAllowed = (get-date).AddHours(-$maxHours)
if (-not $deleteMode) {
write-host "Running in trial mode, no files will be deleted.`r`n"
}
delete-file $path $extension $oldestAllowed $deleteMode $listMode
|
combined_dataset/train/non-malicious/5e6d3b3f-4cf8-4c50-95a0-a300d6f0b630.ps1
|
5e6d3b3f-4cf8-4c50-95a0-a300d6f0b630.ps1
|
# to load c:\\powershellscripts\\cluster_utils.ps1 if it isn't already loaded
@@. require cluster_utils
Here are the functions:
$global:loaded_scripts=@{}
function require([string]$filename){
if (!$loaded_scripts[$filename]){
. c:\\powershellscripts\\$filename
$loaded_scripts[$filename]=get-date
}
}
function reload($filename){
. c:\\powershellscripts\\$filename.ps1
$loaded_scripts[$filename]=get-date
}
|
combined_dataset/train/non-malicious/Paraimpu.ps1
|
Paraimpu.ps1
|
# This requires JSON 1.7 ( http://poshcode.org/2930 ) and the HttpRest ( http://poshcode.org/2097 ) modules
# It's a first draft at Paraimpu cmdlets
# I'm not sure yet that using Paraimpu with my Chumby gets me what I want, since it only shows one item and can't go back to old ones.
#
# YOU SHOULD SET THE $Token DEFAULT VALUES TO YOUR "Thing"'s Token!
ipmo json, httprest
function Send-Paraimpu {
#.Synopsis
# Send data to paraimpu!
#.Description
# Send JSON data to Paraimpu (don't forget JSON is case sensitive)
#.Example
# Send-Paraimpu @{
# text = "This is a test message for my chumby, so I'm sending an image and sound too!"
# image = "http://www.blogsdna.com/wp-content/uploads/2009/12/PowerShell-Logo.png"
# sound = "http://www.frogstar.com/audio/download/14250/gong.mp3"
# }
#.Notes
# Remember javascript is case sensitive!
param(
# The data you want to send to Paraimpu
[Hashtable]$Data,
# The token of the paraimpu "Generic Sensor" to send the data to
[Guid]$Token = "a9988bbd-cb35-4b2d-ba23-69198d36977b"
)
$json = New-JSON @{
token = $Token
'content-type' = "application/json"
data = $Data
}
http post http://paraimpu.crs4.it/data/new -content $json
}
function Send-ParaChumby {
#.Synopsis
# Send data to paraimpu with an image and sound for Chumby
#.Description
# Send JSON data to Paraimpu ...
#.Example
# Send-Paraimpu "This is a test message for my chumby, and has default image and sound."
param(
[Parameter(Position=0,ValueFromPipeline=$true,Mandatory=$true)]
$InputObject,
[Parameter(Position=1)]
$Image,
[Parameter(Position=2)]
$Sound = "http://www.frogstar.com/audio/download/14250/gong.mp3",
[Switch]$Collect,
[Int]$Width = 30,
[Guid]$Token = "a9988bbd-cb35-4b2d-ba23-69198d36977b"
)
begin {
if($Collect) {
$output = New-Object System.Collections.ArrayList
}
}
process {
if(!$Collect) {
Send-Paraimpu @{ text = ($InputObject | Out-String -Width $Width | Tee -var dbug) -replace "`r`n","`n"; image = $Image; sound = $Sound } -Token:$Token
Write-Verbose $dbug
} else {
$null = $Output.Add($InputObject)
}
}
end {
if($Collect) {
Send-Paraimpu @{ text = ($Output | Out-String -Width $Width | Tee -var dbug) -replace "`r`n","`n"; image = $Image; sound = $Sound } -Token:$Token
Write-Verbose $dbug
}
}}
|
combined_dataset/train/non-malicious/sample_1_72.ps1
|
sample_1_72.ps1
|
[
Version("1_0_1"),
Description("This object shall contain information detailing "
"the HTTP and JSON payload information for executing this job."),
Invisible
]
class DCIM_JobPayload {
[Description("This property shall contain a URI referencing a "
"location to be used as the target for an HTTP operation.")
]
string TargetUri;
[Description("This property shall contain the HTTP operation to "
"execute for this job.")
]
string HttpOperation;
[Description("The value of this property shall be an array of HTTP"
" headers used in the execution of this job.")
]
string HttpHeaders[];
[Description("The value of this property shall be JSON formatted "
"payload used for this job.")
]
string JsonBody;
};
/* SIG # Begin signature block */
/* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDq8g0oG1B0MjlW */
/* /JAI/kxSxw9AR4AmQtlItCKKS9hkraCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCZ9HcU5CmY */
/* 0GP5SbHtkHOI3zGRTyHZ8xvWmxRC5t5d+jBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYCJaqWVX4yYo4fOfqVA/R7CSx4m98930JqUaduok+sL0zkP */
/* xaFaCbnZ3WUa2lJe1YmEeO2KC5jKS4LmwuDVQrgPv9V0pwdp4HMo90RBWoBbPuAm */
/* UI/c08DAphig82u0mwIDrtnHvLsD0s7hgnqWzb/PO1JhgK8+9xv19ABE3y1eDrID */
/* TFa49CqCJ5yfJPcvgGy/h6EPWZfCJg2PMDy5IIaN1hnlXvHmupCYCatrS5YXKshw */
/* EHvzTvuQKoE3xU+rdwaoflgPNzDM5E0TMBPZ4eQixoUp0om21kus1Oyo37pWTIYF */
/* 9sdgADhxihS0heQuaziLZrDPGSlSL1X3xP1kQcnppqnNFQbjknJzugWMbJQ/tjul */
/* +icHeBnx2HNMQncEFvfQL12h0YBBM0XZh4yGGxc84dzrR8wcnjnGyE+LGLj3fEZo */
/* OoyECLsI7Ooow+4W5ZTMsTODbm6wy15rPHbqMEoHMERBf46OzZte3vGUWFb8ofBJ */
/* vsNx3EYagLUmLrYX4xehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */
/* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */
/* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQguGFG2xn2Fjwv */
/* Gy86y48Werx6JIUNlyhNpI69f/aC6EQCEGL3avUPKqm1rCVrpNProTAYDzIwMjQw */
/* OTIwMDcwMTA0WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */
/* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */
/* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */
/* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */
/* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */
/* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */
/* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */
/* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */
/* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */
/* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */
/* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */
/* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */
/* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */
/* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */
/* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */
/* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */
/* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */
/* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */
/* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */
/* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */
/* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */
/* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */
/* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */
/* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */
/* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */
/* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */
/* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */
/* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */
/* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */
/* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */
/* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */
/* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */
/* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */
/* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */
/* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */
/* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */
/* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */
/* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */
/* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */
/* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */
/* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */
/* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */
/* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */
/* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */
/* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */
/* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */
/* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */
/* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */
/* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */
/* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */
/* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */
/* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */
/* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */
/* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */
/* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */
/* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */
/* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */
/* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */
/* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */
/* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */
/* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */
/* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */
/* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */
/* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */
/* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */
/* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */
/* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */
/* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */
/* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */
/* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */
/* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */
/* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */
/* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */
/* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */
/* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */
/* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */
/* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */
/* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */
/* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */
/* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */
/* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */
/* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */
/* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */
/* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */
/* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */
/* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */
/* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */
/* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */
/* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */
/* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */
/* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */
/* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */
/* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */
/* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */
/* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */
/* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */
/* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */
/* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */
/* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */
/* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */
/* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */
/* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */
/* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */
/* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */
/* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */
/* MDcwMTA0WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */
/* GZzPQDAvBgkqhkiG9w0BCQQxIgQg9sFHVRiDCZNiXDrE9Rf5AGGoIp9V4fEFabRR */
/* +M+1vgcwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */
/* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAc4mouSfzhYIt+j86N15K */
/* prK3dPRaP+qHtzt34urZZ3YBANwkQLt2QzlOGONpTb5vWTOp6dZBP5ZLWWdQs3Bz */
/* C7zaYJ9naaEDfdLe5MxJJYR5S4CcRLNPhacgpYmas9OmYUQfYbG0Dtl60kOmelwy */
/* 4tDPID3c8EcfjMxqVzN3z7LUVRbBlQ9bykmyDEfe6XhlhFD44JCrI4mFLET1n0fm */
/* TEQQ/3FvCIHkfoFbjk9h74+B80v14/o616xUzS8dXq1UkbrQQM7Ud29Uxxv14eJT */
/* /il9DQA4b6Tr02pzTPH4qcJgXkPMFIVXJXcArwaQ4zR3IV66vDoL4epqacD9fBQZ */
/* 3WUUKrK02q3MAkcPJIfzoNdufH0nFqdoUarAICTewF5iiyXo22aEycWLX/Zng9ZP */
/* iRP9qAnQn5PUV8Fcq6sWPXCp46KL4nDWmuUXf7VovVRoBnd2RU7r73eAP9odVtuj */
/* JLSIp7tdZoVkqN7uGjKrdZ8RZgEMmSI/FST24WTy7EgUgkS8DUElxAAprKfbJPpA */
/* k1Ek+MxzkA/uUi0d6Gd+RRjp9fqjHQczDlrJYnWNB0BsqdWqncCww9FqUzeKb3ak */
/* rWNtYEOkMRiqJ1VZe1Fo6npwsVbjEHeUrbG1IvG7z4epyW0SP6wdNui9FiVQyz7M */
/* nqGwauabTNH9zHc39L5H3AI= */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_6_51.ps1
|
sample_6_51.ps1
|
#************************************************
# DC_ProxyConfiguration.ps1
# Version 1.0: Proxy Configuration for IE User, WinHTTP, Firewall Client, PAC Files, Network Isolation
# Version 1.1: Added Proxy Configuration for IE System
# Version 1.2 (4/28/14): Edited table of contents.
# Create date: 12/5/2012
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects Proxy Configuration information from IE, WinHTTP and Forefront Firewall Client.
# Called from: Networking Diagnostics
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationIEUser -Status $ScriptVariable.ID_CTSProxyConfigurationIEUserDescription
$sectionDescription = "Proxy Configuration Information"
$OutputFile= $Computername + "_ProxyConfiguration.TXT"
#INTRO
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Proxy Configuration" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Overview" | Out-File -FilePath $OutputFile -encoding ASCII -append
"----------------------------------------------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"The Proxy Configuration script shows the proxy configuration of the following:" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 1. IE User Proxy Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 2. IE System Proxy Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 3. WinHTTP Proxy Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 4. BITS Proxy Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 5. TMG/ISA Firewall Client Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 6. Displays PAC file names and locations" | Out-File -FilePath $OutputFile -encoding ASCII -append
" 7. Collects the PAC files on the system into a compressed file." | Out-File -FilePath $OutputFile -encoding ASCII -append
" 8. Network Isolation settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n`n`n`n`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
#IE
#"[info]: Starting Proxy Configuration script" | WriteTo-StdOut
# Check if ProxySettingsPerUser is set causing the IE settings to be read from HKLM
if (test-path "HKLM:\Software\Policies\Windows\CurrentVersion\Internet Settings")
{
$ieProxyConfigProxySettingsPerUserP = (Get-ItemProperty -path "HKLM:\Software\Policies\Windows\CurrentVersion\Internet Settings").ProxySettingsPerUser
}
if (test-path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings")
{
$ieProxyConfigProxySettingsPerUserM = (Get-ItemProperty -path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxySettingsPerUser
}
If ( ($ieProxyConfigProxySettingsPerUserP -eq 0) -or ($ieProxyConfigProxySettingsPerUserM -eq 0) )
{
#----------determine os architecture
Function GetComputerArchitecture()
{
if (($Env:PROCESSOR_ARCHITEW6432).Length -gt 0) #running in WOW
{
$Env:PROCESSOR_ARCHITEW6432
} else {
$Env:PROCESSOR_ARCHITECTURE
}
}
$OSArchitecture = GetComputerArchitecture
# $OSArchitecture | WriteTo-StdOut
if ($OSArchitecture -eq "AMD64")
{
#IE Proxy Config from HKLM
$ieProxyConfigAutoConfigURL = (Get-ItemProperty -path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").AutoConfigURL
$ieProxyConfigProxyEnable = (Get-ItemProperty -path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyEnable
$ieProxyConfigProxyServer = (Get-ItemProperty -path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyServer
$ieProxyConfigProxyOverride = (Get-ItemProperty -path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyOverride
# Get list of regvalues in "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
$ieConnections = (Get-Item -Path "Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections") | Select-Object -ExpandProperty Property
$regHive = "HKLM (x64)"
}
if ($OSArchitecture -eq "x86")
{
#IE Proxy Config from HKLM
$ieProxyConfigAutoConfigURL = (Get-ItemProperty -path "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings").AutoConfigURL
$ieProxyConfigProxyEnable = (Get-ItemProperty -path "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyEnable
$ieProxyConfigProxyServer = (Get-ItemProperty -path "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyServer
$ieProxyConfigProxyOverride = (Get-ItemProperty -path "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyOverride
# Get list of regvalues in "HKLM\Software\WOW6432Node\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
$ieConnections = (Get-Item -Path "Registry::HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Connections") | Select-Object -ExpandProperty Property
$regHive = "HKLM (x86)"
}
}
else
{
#IE Proxy Config from HKCU
$ieProxyConfigAutoConfigURL = (Get-ItemProperty -path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").AutoConfigURL
$ieProxyConfigProxyEnable = (Get-ItemProperty -path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyEnable
$ieProxyConfigProxyServer = (Get-ItemProperty -path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyServer
$ieProxyConfigProxyOverride = (Get-ItemProperty -path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings").ProxyOverride
# Get list of regvalues in "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
$ieConnections = (Get-Item -Path "Registry::HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections") | Select-Object -ExpandProperty Property
$regHive = "HKCU"
}
#"[info]: ProxyServer array being created" | WriteTo-StdOut
#Find all entries in the Proxy Server Array
if ($null -ne $ieProxyConfigProxyServer)
{
$ieProxyConfigProxyServerArray = ($ieProxyConfigProxyServer).Split(';')
$ieProxyConfigProxyServerArrayLength = $ieProxyConfigProxyServerArray.length
}
#"[info]: ProxyOverride array being created" | WriteTo-StdOut
#Find all entries in Proxy Override Array
if ($null -ne $ieProxyConfigProxyOverride)
{
[array]$ieProxyConfigProxyOverrideArray = ($ieProxyConfigProxyOverride).Split(';')
$ieProxyConfigProxyOverrideArrayLength = $ieProxyConfigProxyOverrideArray.length
}
#"[info]: Starting Proxy Configuration: IE User Settings section" | WriteTo-StdOut
"`n`n`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: IE User Settings (" + $regHive + ")" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
for($i=0;$null -ne $ieConnections[$i];$i++)
{
#IE Proxy Configuration Array: Detection Logic for each Connection
[string]$ieConnection = $ieConnections[$i]
# Main UI Checkboxes (3)
$ieProxyConfigArray = (Get-ItemProperty -path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections").$ieConnection
[int]$ieProxyConfigUI = $ieProxyConfigArray[8]
# Manual Proxy Server setting
[int]$ieProxyConfigUIManualProxyOffset = 12
[int]$ieProxyConfigUIManualProxyLength = $ieProxyConfigArray[$ieProxyConfigUIManualProxyOffset]
[int]$ieProxyConfigUIManualProxyStart = $ieProxyConfigUIManualProxyOffset + 4
[int]$ieProxyConfigUIManualProxyEnd = $ieProxyConfigUIManualProxyStart + $ieProxyConfigUIManualProxyLength
# Convert decimal to ASCII string
[string]$ieProxyConfigUIManualProxyValue = ""
for ($j=$ieProxyConfigUIManualProxyStart;$j -lt $ieProxyConfigUIManualProxyEnd;$j++)
{
[string]$ieProxyConfigUIManualProxyValue = $ieProxyConfigUIManualProxyValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIManualProxyValueArray = ($ieProxyConfigUIManualProxyValue).Split(';')
$ieProxyConfigUIManualProxyValueArrayLength = $ieProxyConfigUIManualProxyValueArray.length
# BypassProxy
[int]$ieProxyConfigUIBypassProxyOffset = $ieProxyConfigUIManualProxyStart + $ieProxyConfigUIManualProxyLength
[int]$ieProxyConfigUIBypassProxyLength = $ieProxyConfigArray[$ieProxyConfigUIBypassProxyOffset]
[int]$ieProxyConfigUIBypassProxyStart = $ieProxyConfigUIBypassProxyOffset + 4
[int]$ieProxyConfigUIBypassProxyEnd = $ieProxyConfigUIBypassProxyStart + $ieProxyConfigUIBypassProxyLength
# Bypass Proxy Checkbox
If ($ieProxyConfigUIBypassProxyLength -ne 0)
{
#BypassProxy Checked
$ieProxyConfigUIBypassProxyEnabled = $true
}
else
{
#BypassProxy Unchecked
$ieProxyConfigUIBypassProxyEnabled = $false
}
# Convert decimal to ASCII string
[string]$ieProxyConfigUIBypassProxyValue = ""
for ($j=$ieProxyConfigUIBypassProxyStart;$j -lt $ieProxyConfigUIBypassProxyEnd;$j++)
{
[string]$ieProxyConfigUIBypassProxyValue = $ieProxyConfigUIBypassProxyValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIBypassProxyValueArray = ($ieProxyConfigUIBypassProxyValue).Split(';')
$ieProxyConfigUIBypassProxyValueArrayLength = $ieProxyConfigUIBypassProxyValueArray.length
#AutoConfig
[int]$ieProxyConfigUIAutoConfigOffset = $ieProxyConfigUIBypassProxyStart + $ieProxyConfigUIBypassProxyLength
[int]$ieProxyConfigUIAutoConfigLength = $ieProxyConfigArray[$ieProxyConfigUIAutoConfigOffset]
[int]$ieProxyConfigUIAutoConfigStart = $ieProxyConfigUIAutoConfigOffset + 4
[int]$ieProxyConfigUIAutoConfigEnd = $ieProxyConfigUIAutoConfigStart + $ieProxyConfigUIAutoConfigLength
# Convert decimal to ASCII string
[string]$ieProxyConfigUIAutoConfigValue = ""
for ($j=$ieProxyConfigUIAutoConfigStart;$j -lt $ieProxyConfigUIAutoConfigEnd;$j++)
{
[string]$ieProxyConfigUIAutoConfigValue = $ieProxyConfigUIAutoConfigValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIAutoConfigValueArray = ($ieProxyConfigUIAutoConfigValue).Split(';')
$ieProxyConfigUIAutoConfigValueArrayLength = $ieProxyConfigUIAutoConfigValueArray.length
If ($ieConnection -eq "DefaultConnectionSettings")
{
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Local Area Network (LAN) Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
elseif ($ieConnection -eq "SavedLegacySettings")
{
# skipping SavedLegacySettings to trim output
$i++
[string]$ieConnection = $ieConnections[$i]
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
" " + "Automatic Configuration" | Out-File -FilePath $OutputFile -encoding ASCII -append
# "Automatically detect settings:
If ( ($ieProxyConfigUI -eq 9) -or ($ieProxyConfigUI -eq 11) -or ($ieProxyConfigUI -eq 13) -or ($ieProxyConfigUI -eq 15) )
{
" " + "[X] Automatically detect settings:" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
" " + "[ ] Automatically detect settings:" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
# "Use automatic configuration script:"
If ( ($ieProxyConfigUI -eq 5) -or ($ieProxyConfigUI -eq 7) -or ($ieProxyConfigUI -eq 13) -or ($ieProxyConfigUI -eq 15) )
{
" " + "[X] Use automatic configuration script:" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " " + "Address: " | Out-File -FilePath $OutputFile -encoding ASCII -append
# " " + " " + $ieProxyConfigAutoConfigURL
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIAutoConfigValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIAutoConfigValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + "[ ] Use automatic configuration script:" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " " + "Address: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
" " + "Proxy Server" | Out-File -FilePath $OutputFile -encoding ASCII -append
# "Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections)."
If ( ($ieProxyConfigUI -eq 3) -or ($ieProxyConfigUI -eq 7) -or ($ieProxyConfigUI -eq 11) -or ($ieProxyConfigUI -eq 15) )
{
# MANUAL PROXY (from Connection)
" " + "[X] Use a proxy server for your LAN (These settings will not apply " | Out-File -FilePath $OutputFile -encoding ASCII -append
If ($ieConnection -eq "DefaultConnectionSettings")
{
" " + " to dial-up or VPN connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
" " + " to other connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Address: and Port: " | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIManualProxyValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIManualProxyValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
# BYPASS PROXY (from Connection)
If ($ieProxyConfigUIBypassProxyEnabled -eq $true)
{
" " + " [X] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIBypassProxyValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIBypassProxyValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + " [ ] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + "[ ] Use a proxy server for your LAN (These settings will not apply to" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " dial-up or VPN connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Address:Port " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " [ ] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationIESystem -Status $ScriptVariable.ID_CTSProxyConfigurationIESystemDescription
#----------Proxy Configuration: IE System Settings: Initialization
#"[info]: ProxyConfiguration: IE System Settings: Initialization" | WriteTo-StdOut
$regHive = "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: IE System Settings (" + $regHive + ")" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
#----------
# Verifying HKU is in the psProviderList. If not, add it
#----------
#
# HKU may not be in the psProviderList, so we need to add it so we can reference it
#
#"[info]: Checking the PSProvider list because we need HKU" | WriteTo-StdOut
$psProviderList = Get-PSDrive -PSProvider Registry
$psProviderListLen = $psProviderList.length
for ($i=0;$i -le $psProviderListLen;$i++)
{
if (($psProviderList[$i].Name) -eq "HKU")
{
$hkuExists = $true
$i = $psProviderListLen
}
else
{
$hkuExists = $false
}
}
if ($hkuExists -eq $false)
{
#"[info]: Creating a new PSProvider to enable access to HKU" | WriteTo-StdOut
[void]( New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS)
}
#----------
# Verify "\Internet Settings\Connections" exists, if not display message that IE System Context is not configured.
# $ieConnectionsCheck and associated code block added 10/11/2013
#----------
#$ieConnections = $null
# Get list of regvalues in "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
$ieConnectionsCheck = Test-path "HKU:\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
if ($ieConnectionsCheck -eq $true)
{
$ieConnections = (Get-Item -Path "Registry::HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections") | Select-Object -ExpandProperty Property
for($i=0;$null -ne $ieConnections[$i];$i++)
{
#IE Proxy Configuration Array: Detection Logic for each Connection
[string]$ieConnection = $ieConnections[$i]
#"[info]: Get-ItemProperty on HKU registry location." | WriteTo-StdOut
# Main UI Checkboxes (3)
[array]$ieProxyConfigArray = $null
[array]$ieProxyConfigArray = (Get-ItemProperty -path "HKU:\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections").$ieConnection
[int]$ieProxyConfigUI = $ieProxyConfigArray[8]
#"[info]: Retrieving manual proxy server setting." | WriteTo-StdOut
# Manual Proxy Server setting
[int]$ieProxyConfigUIManualProxyOffset = 12
[int]$ieProxyConfigUIManualProxyLength = $ieProxyConfigArray[$ieProxyConfigUIManualProxyOffset]
[int]$ieProxyConfigUIManualProxyStart = $ieProxyConfigUIManualProxyOffset + 4
[int]$ieProxyConfigUIManualProxyEnd = $ieProxyConfigUIManualProxyStart + $ieProxyConfigUIManualProxyLength
# Convert decimal to ASCII string
[string]$ieProxyConfigUIManualProxyValue = ""
for ($j=$ieProxyConfigUIManualProxyStart;$j -lt $ieProxyConfigUIManualProxyEnd;$j++)
{
[string]$ieProxyConfigUIManualProxyValue = $ieProxyConfigUIManualProxyValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIManualProxyValueArray = ($ieProxyConfigUIManualProxyValue).Split(';')
$ieProxyConfigUIManualProxyValueArrayLength = $ieProxyConfigUIManualProxyValueArray.length
#"[info]: Retrieving BypassProxy setting." | WriteTo-StdOut
# BypassProxy
[int]$ieProxyConfigUIBypassProxyOffset = $ieProxyConfigUIManualProxyStart + $ieProxyConfigUIManualProxyLength
[int]$ieProxyConfigUIBypassProxyLength = $ieProxyConfigArray[$ieProxyConfigUIBypassProxyOffset]
[int]$ieProxyConfigUIBypassProxyStart = $ieProxyConfigUIBypassProxyOffset + 4
[int]$ieProxyConfigUIBypassProxyEnd = $ieProxyConfigUIBypassProxyStart + $ieProxyConfigUIBypassProxyLength
# Bypass Proxy Checkbox
If ($ieProxyConfigUIBypassProxyLength -ne 0)
{
#BypassProxy Checked
$ieProxyConfigUIBypassProxyEnabled = $true
}
else
{
#BypassProxy Unchecked
$ieProxyConfigUIBypassProxyEnabled = $false
}
# Convert decimal to ASCII string
[string]$ieProxyConfigUIBypassProxyValue = ""
for ($j=$ieProxyConfigUIBypassProxyStart;$j -lt $ieProxyConfigUIBypassProxyEnd;$j++)
{
[string]$ieProxyConfigUIBypassProxyValue = $ieProxyConfigUIBypassProxyValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIBypassProxyValueArray = ($ieProxyConfigUIBypassProxyValue).Split(';')
$ieProxyConfigUIBypassProxyValueArrayLength = $ieProxyConfigUIBypassProxyValueArray.length
#"[info]: Retrieving AutoConfig setting." | WriteTo-StdOut
#AutoConfig
[int]$ieProxyConfigUIAutoConfigOffset = $ieProxyConfigUIBypassProxyStart + $ieProxyConfigUIBypassProxyLength
[int]$ieProxyConfigUIAutoConfigLength = $ieProxyConfigArray[$ieProxyConfigUIAutoConfigOffset]
[int]$ieProxyConfigUIAutoConfigStart = $ieProxyConfigUIAutoConfigOffset + 4
[int]$ieProxyConfigUIAutoConfigEnd = $ieProxyConfigUIAutoConfigStart + $ieProxyConfigUIAutoConfigLength
# Convert decimal to ASCII string
[string]$ieProxyConfigUIAutoConfigValue = ""
for ($j=$ieProxyConfigUIAutoConfigStart;$j -lt $ieProxyConfigUIAutoConfigEnd;$j++)
{
[string]$ieProxyConfigUIAutoConfigValue = $ieProxyConfigUIAutoConfigValue + [CHAR][BYTE]$ieProxyConfigArray[$j]
}
# Split on semicolons
$ieProxyConfigUIAutoConfigValueArray = ($ieProxyConfigUIAutoConfigValue).Split(';')
$ieProxyConfigUIAutoConfigValueArrayLength = $ieProxyConfigUIAutoConfigValueArray.length
If ($ieConnection -eq "DefaultConnectionSettings")
{
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Local Area Network (LAN) Settings" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
elseif ($ieConnection -eq "SavedLegacySettings")
{
# skipping SavedLegacySettings to trim output
$i++
[string]$ieConnection = $ieConnections[$i]
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-----Connection: " + $ieConnection + "-----" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
" " + "Automatic Configuration" | Out-File -FilePath $OutputFile -encoding ASCII -append
# "Automatically detect settings:
If ( ($ieProxyConfigUI -eq 9) -or ($ieProxyConfigUI -eq 11) -or ($ieProxyConfigUI -eq 13) -or ($ieProxyConfigUI -eq 15) )
{
" " + "[X] Automatically detect settings:" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
" " + "[ ] Automatically detect settings:" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
# "Use automatic configuration script:"
If ( ($ieProxyConfigUI -eq 5) -or ($ieProxyConfigUI -eq 7) -or ($ieProxyConfigUI -eq 13) -or ($ieProxyConfigUI -eq 15) )
{
" " + "[X] Use automatic configuration script:" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " " + "Address: " | Out-File -FilePath $OutputFile -encoding ASCII -append
# " " + " " + $ieProxyConfigAutoConfigURL
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIAutoConfigValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIAutoConfigValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + "[ ] Use automatic configuration script:" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " " + "Address: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
" " + "Proxy Server" | Out-File -FilePath $OutputFile -encoding ASCII -append
# "Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections)."
If ( ($ieProxyConfigUI -eq 3) -or ($ieProxyConfigUI -eq 7) -or ($ieProxyConfigUI -eq 11) -or ($ieProxyConfigUI -eq 15) )
{
# MANUAL PROXY (from Connection)
" " + "[X] Use a proxy server for your LAN (These settings will not apply " | Out-File -FilePath $OutputFile -encoding ASCII -append
If ($ieConnection -eq "DefaultConnectionSettings")
{
" " + " to dial-up or VPN connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
" " + " to other connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Address: and Port: " | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIManualProxyValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIManualProxyValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
# BYPASS PROXY (from Connection)
If ($ieProxyConfigUIBypassProxyEnabled -eq $true)
{
" " + " [X] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
for ($j=0;$j -le $ieProxyConfigUIBypassProxyValueArrayLength;$j++)
{
" " + " " + $ieProxyConfigUIBypassProxyValueArray[$j] | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + " [ ] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
else
{
" " + "[ ] Use a proxy server for your LAN (These settings will not apply to" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " dial-up or VPN connections)." | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Address:Port " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " [ ] Bypass proxy server for local addresses" | Out-File -FilePath $OutputFile -encoding ASCII -append
" " + " Exceptions: " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
}
Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationWinHTTP -Status $ScriptVariable.ID_CTSProxyConfigurationWinHTTPDescription
#"[info]: ProxyConfiguration: WinHTTP" | WriteTo-StdOut
#WinHTTP
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: WinHTTP" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
Function RunNetSH ([string]$NetSHCommandToExecute="")
{
$NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6
"-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
"netsh $NetSHCommandToExecute" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + "| Out-File -FilePath $OutputFile -encoding ASCII -append"
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
RunNetSH -NetSHCommandToExecute "winhttp show proxy"
#BITS
# update for BITS proxy: Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationWinHTTP -Status $ScriptVariable.ID_CTSProxyConfigurationWinHTTPDescription
#"[info]: ProxyConfiguration: BITS" | WriteTo-StdOut
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: BITS" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
function RunBitsAdmin ([string]$BitsAdminCommandToExecute="")
{
$BitsAdminCommandToExecuteLength = $BitsAdminCommandToExecute.Length + 6
"-" * ($BitsAdminCommandToExecuteLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
"bitsadmin $BitsAdminCommandToExecute" | Out-File -FilePath $OutputFile -encoding ASCII -append
"-" * ($BitsAdminCommandToExecuteLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
$CommandToExecute = "cmd.exe /c bitsadmin.exe " + $BitsAdminCommandToExecute + "| Out-File -FilePath $OutputFile -encoding ASCII -append"
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
RunBitsAdmin -BitsAdminCommandToExecute " /util /getieproxy localsystem"
RunBitsAdmin -BitsAdminCommandToExecute " /util /getieproxy networkservice"
RunBitsAdmin -BitsAdminCommandToExecute " /util /getieproxy localservice"
#Firewall Client
Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationFirewallClient -Status $ScriptVariable.ID_CTSProxyConfigurationFirewallClientDescription
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: Firewall Client" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
#----- Is the Firewall Client installed?
$processActive = Get-Process fwcagent -ErrorAction SilentlyContinue
if ($null -ne $processActive)
{
"The Firewall Client appears to be installed. Gathering output." | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
$firewallClientProcessPath = (get-process fwcagent).path
$firewallClientProcess = $firewallClientProcessPath.substring(0,$firewallClientProcessPath.Length-12) + "fwctool.exe"
$firewallClientProcess
$firewallClientArgs = " printconfig"
$firewallClientCmd = "`"" + $firewallClientProcess + "`"" + $firewallClientArgs
$firewallClientCmdLength = $firewallClientCmd.length
# Output header and command that will be run
"`n" + "-" * ($firewallClientCmdLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" + "`"" + $firewallClientProcess + " " + $firewallClientArgs + "`"" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" + "-" * ($firewallClientCmdLength) | Out-File -FilePath $OutputFile -encoding ASCII -append
# Run the command
$CommandToExecute = "cmd.exe /c " + $firewallClientCmd + " | Out-File -FilePath $OutputFile -encoding ASCII -append"
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
else
{
"The Firewall Client is not installed." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
#PAC files
Write-DiagProgress -Activity $ScriptVariable.ID_CTSProxyConfigurationPACFiles -Status $ScriptVariable.ID_CTSProxyConfigurationPACFilesDescription
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
" Proxy Configuration: PAC Files" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
# Where are PAC files referenced?
# HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad
#-----PAC files
# Outside of SDP = Inside SDP
# "c:\users\bbenson = $env:USERPROFILE + "
# "c:\windows = $env:windir + "
#
#-----array*.script and wpad*.dat files in User Profile
$pacUserProfPath = $env:USERPROFILE + "\AppData\Local\Microsoft\Windows\Temporary Internet Files\*"
# Added Sort-Object to sort the array on creation
# | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
if (Test-Path $pacUserProfPath)
{
[array]$pacUserProf = Get-ChildItem $pacUserProfPath -include array*.script,wpad*.dat -force -recurse | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
$pacUserProfLen = $pacUserProf.length
if ($null -eq $pacUserProfLen)
{
$pacUserProfLen = 0
}
else
{
if ($pacUserProfLen -ne 0)
{
[array]$pacArray = [array]$pacUserProf
$pacArrayLen = $pacArray.length
}
}
}
#-----array*.script and wpad*.dat files in Windir Sys32
$pacWindirSys32Path = $env:windir + "\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\*"
# Added Sort-Object to sort the array on creation
# | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
if (Test-Path $pacWindirSys32Path)
{
[array]$pacWindirSys32 = Get-ChildItem $pacWindirSys32Path -include array*.script,wpad*.dat -force -recurse | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
$pacWindirSys32Len = $pacWindirSys32.length
if ($null -eq $pacWindirSys32Len)
{
$pacWindirSys32Len = 0
}
else
{
if ($pacWindirSys32Len -ne 0)
{
[array]$pacArray = [array]$pacArray + [array]$pacWindirSys32
$pacArrayLen = $pacArray.length
}
}
}
#-----array*.script and wpad*.dat files in Windir Syswow64
$pacWindirSysWow64Path = $env:windir + "\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\*"
# Added Sort-Object to sort the array on creation
# | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
if (Test-Path $pacWindirSysWow64Path)
{
[array]$pacWindirSysWow64 = Get-ChildItem $pacWindirSysWow64Path -include array*.script,wpad*.dat -force -recurse | sort-object -property @{Expression={$_.LastAccessTime}; Ascending=$false}
$pacWindirSysWow64Len = $pacWindirSysWow64.length
if ($null -eq $pacWindirSysWow64Len)
{
$pacWindirSysWow64Len = 0
}
else
{
if ($pacWindirSysWow64Len -ne 0)
{
[array]$pacArray = [array]$pacArray + [array]$pacWindirSysWow64
$pacArrayLen = $pacArray.length
}
}
}
#-----Engineer message indicating where the script searched for the files.
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Searching for PAC files named wpad*.dat or array*.script in the following locations: " | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
" %userprofile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\*" | Out-File -FilePath $OutputFile -encoding ASCII -append
" %windir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\*" | Out-File -FilePath $OutputFile -encoding ASCII -append
" %windir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\*" | Out-File -FilePath $OutputFile -encoding ASCII -append
# dir "%userprofile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\wpad*.dat" /s
# dir "%userprofile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\array*.script" /s
# dir "%windir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\wpad*.dat" /s
# dir "%windir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\array*.script" /s
# dir "%windir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\wpad*.dat" /s
# dir "%windir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\array*.script" /s
if ($null -eq $pacArrayLen)
{
$pacArrayLen = 0
}
#-----Display the array
if ($pacArrayLen -eq 0)
{
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Found " + $pacArrayLen + " PAC files." | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"There are " + $pacArrayLen + " PAC files named wpad*.dat or array*.script located within `"Temporary Internet Files`" for the user and/or the system." | Out-File -FilePath $OutputFile -encoding ASCII -append
}
elseif ($pacArrayLen -eq 1)
{
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Found " + $pacArrayLen + " PAC file." | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
#-----Show FullName, LastWriteTime and LastAccessTime
for($i=0;$i -lt $pacArrayLen;$i++)
{
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"[#" + ($i+1) + "]" | Out-File -FilePath $OutputFile -encoding ASCII -append
"FullName : " + ($pacArray[$i]).FullName | Out-File -FilePath $OutputFile -encoding ASCII -append
# "LastWriteTime : " + ($pacArray[$i]).LastWriteTime | Out-File -FilePath $OutputFile -encoding ASCII -append
"LastAccessTime : " + ($pacArray[$i]).LastAccessTime | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
elseif ($pacArrayLen -gt 1)
{
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Found " + $pacArrayLen + " PAC files (in descending showing the most recent LastAccessTime first)" | Out-File -FilePath $OutputFile -encoding ASCII -append
"--------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
#-----Show FullName, LastWriteTime and LastAccessTime
for($i=0;$i -lt $pacArrayLen;$i++)
{
# Sort the array by LastAccessTime
$pacArray | Sort-Object LastAccessTime -Descending
# Text Output with no sorting
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"[#" + ($i+1) + "]" | Out-File -FilePath $OutputFile -encoding ASCII -append
"FullName : " + ($pacArray[$i]).FullName | Out-File -FilePath $OutputFile -encoding ASCII -append
#"LastWriteTime : " + ($pacArray[$i]).LastWriteTime | Out-File -FilePath $OutputFile -encoding ASCII -append
"LastAccessTime : " + ($pacArray[$i]).LastAccessTime | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
}
}
If ($pacArrayLen -gt 0)
{
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
" " | Out-File -FilePath $OutputFile -encoding ASCII -append
"------------------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Collecting PAC files" | Out-File -FilePath $OutputFile -encoding ASCII -append
"------------------------" | Out-File -FilePath $OutputFile -encoding ASCII -append
# Initialize array for PAC files with FullName
for ($i=0;$i -lt $pacArrayLen;$i++) { $pacFilesArray += @($i) }
# Create array of PAC Files with FullName
for ($i=0;$i -lt $pacArrayLen;$i++)
{
$pacFilesArray[$i] = "`"" + ($pacArray[$i]).FullName + "`""
$pacFilesArray[$i] | Out-File -FilePath $OutputFile -encoding ASCII -append
#copy to temp dir
$CommandToExecute = "cmd.exe /c copy " + $pacFilesArray[$i] + " " + $PWD
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
# This function fails because of file not found, but I know the file exists. Probably because of [] in name.
# CollectFiles -filesToCollect $pacFilesArray[$i]
#Collect PAC files
$destFileName = $env:COMPUTERNAME + "_Proxy-PACFiles.zip"
# CollectFiles -filesToCollect $pacFilesArray
$pacFilesWpadDat = join-path $PWD "wpad*.dat"
$pacFilesArrScript = join-path $PWD "array*.script"
CompressCollectFiles -filestocollect $pacFilesWpadDat -DestinationFileName $destFileName
CompressCollectFiles -filestocollect $pacFilesArrScript -DestinationFileName $destFileName
}
#Network Isolation Policies
"`n`n`n`n`n`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"Network Isolation Policy Configuration (W8/WS2012+)" | Out-File -FilePath $OutputFile -encoding ASCII -append
"====================================================" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
if (test-path HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation)
{
$netIsolationDomainLocalProxies = (Get-ItemProperty -path "HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation").DomainLocalProxies
$netIsolationDomainProxies = (Get-ItemProperty -path "HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation").DomainProxies
$netIsolationDomainSubnets = (Get-ItemProperty -path "HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation").DomainSubnets
$netIsolationDProxiesAuthoritive = (Get-ItemProperty -path "HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation").DProxiesAuthoritive
$netIsolationDSubnetsAuthoritive = (Get-ItemProperty -path "HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation").DSubnetsAuthoritive
"RegKey : HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation" | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegValue: DomainLocalProxies" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegData : " + $netIsolationDomainLocalProxies | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegValue: DomainProxies" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegData : " + $netIsolationDomainProxies | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegValue: DomainSubnets" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegData : " + $netIsolationDomainSubnets | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegValue: DProxiesAuthoritive" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegData : " + $netIsolationDProxiesAuthoritive | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegValue: DSubnetsAuthoritive" | Out-File -FilePath $OutputFile -encoding ASCII -append
"RegData : " + $netIsolationDSubnetsAuthoritive | Out-File -FilePath $OutputFile -encoding ASCII -append
"`n" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
else
{
"Network Isolation policies are not configured. This location does not exist: HKLM:\Software\Policies\Microsoft\Windows\NetworkIsolation" | Out-File -FilePath $OutputFile -encoding ASCII -append
}
CollectFiles -filesToCollect $OutputFile -fileDescription "Proxy Configuration Information" -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAs71Ar5tO5gIX5
# WyBmRAgOLdhK9E9a2l6yJYASIeIFAqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN++y+YG+6QN0oCgQ5YFIpRZ
# oR3WgtahSznFT3mhTEJPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUO8Likv4HoBXLmGQ7saKlXKIqGfSOBgvq0YNTy3yVAj1LsDTZcCVsb9k
# /so/LUDvH1gKGCmf1D5ZwXplm1BrgshjRq52gfBCSpOQkuaNcTI2qGS/x3zb8nXv
# 9cdoFGuCSD8cJlPv81iLw9+uwLEwKVoq8MX51jC62XRuEEzRu4r23dhONMyoaiiv
# m2gLgHPmI5XWleL1+3e0VCxYV2Sb1paIPjAA+gocbzpDgw0seM3id3rdaTZBHxMo
# 808KeYqI7VkOkyP1H7jxZxtp5Kz/QQ6DRFt3XGGSybuj3gwHPkvaFpMsggYLq5QL
# p+7gs+K+1frtsvEnTJYJ+QWGdH9lmKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCjOiimmQf9+RraVRwisJzzvWZsczbqgeTiUPOblHckPgIGZut4BYy+
# GBMyMDI0MTAyODExNDA0My43ODVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJlLzxxlCMAAEAAAH1MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjY1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzO90cFQTWd/WP84IT7JM
# IW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot387LjE0TCiG93e6I0HzIFQ
# BnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxICfw5t/pTyIOHjKvo1lQOT
# WZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1DcmXjym2wFWv10sBH40aj
# Jfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMAao0SNR/R1J1Y6sLkiCJO
# 3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpTM4vc0xDLCmc6PGv03CtW
# u2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbBY5j+HvS0l3dXkjP3Hon8
# b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wou+T6Se6oa5LDiQgPTfWR
# /j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0PiaXsmgudNwVqn51zr+B
# i3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ884Yb9DFNcigmeVTYkyUXZ
# 6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvveU6p0+frthbF7MXv+i5q
# cD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRV4Hxb9Uo0
# oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAcwxmVPaA9xHf
# fuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/8/G6fGIQMr0zlpau8jy8
# 3I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4Lut4bbPfT0FEp77G76hh
# ysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6I0EnneotMqFs0Q3zHgVV
# r4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGaQnLzq+No8VEgq0UG7W1E
# LZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV5JtISBklTuVAlEkzXi9L
# IjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zSs+ul9WmzI0F8zImbhnZh
# UziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5WqXbS5s9OdMdUlW1gTI1
# r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q0Cycpa9QUH/Dy01k6tQo
# mNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSKCRoFE1Lkma31SyIaynbd
# YEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUiTWSKvv1DJadR1SUCO/Od
# 21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5YRg3WSBQCyjzdkvaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0MTAyOTAwNTA0NFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEAAgIUjDAHAgEAAgIUCjAK
# AgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCjXPh2fTsMuBQC
# 04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3UQpZXoPQDP+vfvum15Jd
# ooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gSTwUk7hZ060ozBQBEDelh
# GRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3FyMaE9PqRohkoHLhl8vm
# IdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KORL3KvFgrx7XzEQvr2WlE
# waAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIBNChydfZETThcPXRdrz53
# AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQghy6fe0kSX/ZQ
# PDRWCYbcSYOZGaJETBPt1wEZ0X8GGl8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GThqaPNTCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9ZkJlLzxxlCMAAEAAAH1
# MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1KYILMA0GCSqGSIb3DQEB
# CwUABIICAIe1cRxvR130GixRAbWPpVczKbfNc7xrnYCGLNtPmUM2wVTWuChgLz0c
# 2feji76+X6zrjuJtEzNiZdJVGmSZhC/cmQ7p4X1wwr/ItmdMUF+YXC1yC1W45vfm
# L6pPFJ3eedWFTMdM2sTMRRdsBJQjeAhoFvk3ZOhXiycqZExn//rgn8+rI+XEdoqC
# o8zWpaour0iuwTU2CKB/QJXU07ffjwPOSfMRdhZz4PNCUMpQ+l42TVzVdxFOl2s4
# QDv22CeIyHBz8XezCHSzYNgXpHwwOqT0PEr86C0BzyxphVVqzUPFiLhJ6WxPkr0Z
# yqO+wnaOZ3RdxHEzLUUqPETAmi96FZMc14Z81x7Y7zmL8nNGNIVbvv72pLyizyW/
# Fvj/qatOcWMciDUv+C+NM6RdmcZKHCCbPbaJ6+pWho2hrbhX0yPyKTL/VVCNm4vO
# 71IPSCOmpeo004JsxKAT1jknTbay1PP5d7HGCTxu+bnX2xct93pid7dtBWO60yOk
# mMvMrXaovrTNRgo9u01MYfDgfb6gBEFaLs/zHQFJXwNYNJOuaatxZRwzSrAtcNWG
# 4AeYDbj3m4cbep7VgzgNVGXxGiyXXDuiCyxcViLr017mAjNNr8nQIjSbn5Wj3fNK
# Zg/fcHhOZRwh4uXRUZWRf7ISZjtqdlWNP9gC+VYigLB+novRhYxZ
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_55_0.ps1
|
sample_55_0.ps1
|
# region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.Autoscale.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.Monitor.Autoscale.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.Autoscale.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDjelZQzd1o+dPx
# 7AGPfuFDFVlBIvVvkSqcZKB+BhVc4aCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAJk
# 6BBdMnQo8TsXWwPhpUiaRlCJ1JROUdz58zQ3siU5MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA7yJ6VqJV44pMQaZTtCFEuXCfOE9SCbMd+MWj
# mEZfpauY782t/DNe47PPC/vGFOoXv7ty8QX0ahU+JlskFRUDbH/MSq0JTf/Ez0wp
# MxAc9Vqnu1/MXlVeQnI5TbQ5XqNrEsRg84mjPsvIeV1FzT+3s/ffic3OJApZahsR
# vQF4Ok8fpYtTHYZrJ7r2KbaWkhgLWoFdGjU4HAtAUb+yVGYf8ot3Nim68JQFehfk
# oGWicUVoZSpLaJCnAYxmcdRt+pBmwi/e/2XPlG5/GBJY1iCQiW+sdRQ2HFReM35M
# gxMMRwC78kHDwLjlknys+J99UR+TdqZM+HGVNKiM9WqFwT6O3aGCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBcKcl/l1sqzu/RmxhlgOxCL+Py84BdKa/R
# 0rKndWUG9wIGZjOqm5niGBIyMDI0MDUxNjA2NDIxNC42M1owBIACAfSggdikgdUw
# gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
# VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDz
# PbQLowABAAAB5TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDAeFw0yMzEwMTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv
# ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU
# U1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T
# dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvg
# Otq7Y7osusk7cfJO871pdqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhL
# IkeOQwhQaa6HSs9Xn/b5QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2
# u7YbKaa3WusZw17zTQJwPp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpw
# z95ae2RAyzSUrTOYJ8f4G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASL
# Nj68WaDH7MO65T8YKEMruSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlW
# qk/d2ko8A//i502qlHkch5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/x
# xnXWRyjUm9TI5DzH8kOQwWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5B
# HsVXt4KpX+V9qOguk83H/3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbP
# Yv3pN3Gcg7Y4aZjEEABkBagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz
# 9Sn+OkV9CK0t+N3vVxL5wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0n
# MmcayRUnmjOGOLRhGxy/VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1Ud
# DgQWBBTf/5+Hu01zMSJ8ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0
# 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB
# /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC
# AgEAM/rCE4WMPVp3waQQn2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaA
# UGJbAjpc6DDzaF2iUOIwMEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mA
# Ljwj5v7bHZU2AYlSxAjI9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTA
# V47n7ehJfgl4I1m+DJQ7MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CCh
# iKltpO+/vGaLFQkZNuLFiJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNh
# nJ4fIDKwwQAtsiF1eAcSHrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51
# y2dcIbnkm4zD/BvtzvVEqKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfp
# OqXzhV+lh72IebLs+qrGowXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64
# n8wHrXJG9PWZTHeXKmk7bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML
# 5N1lCWP5UyAibxl4QhE0XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgW
# nEFlQTyacsq4OVihuOvGHuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgEC
# AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg
# Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa
# Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
# gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
# RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X
# D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP
# z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+
# tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas
# AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b
# fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv
# XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg
# 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF
# a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP
# nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
# IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB
# MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv
# Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC
# NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w
# HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg
# R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj
# Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF
# BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D
# ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs
# H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
# wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
# btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg
# vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId
# w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2
# zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K
# jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu
# yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/
# tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm
# jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj
# U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN
# aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo
# YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg
# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3
# zkSkzpGLCqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G
# CSqGSIb3DQEBBQUAAgUA6e/zTTAiGA8yMDI0MDUxNjEwNTE1N1oYDzIwMjQwNTE3
# MTA1MTU3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7/NNAgEAMAcCAQACAgbb
# MAcCAQACAhQwMAoCBQDp8UTNAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# T9m8PC6DLo2djIgNXu45ItaL+5/JD7T7yg//PYQUtZW3U89X1yQPA5d8zJlSuZ5b
# Xex8c0L8jFTEU6jijp/OWdXuMYPasoXUDgcfOvPbmo0ChgiFKbJdbGUSdBKyNp+x
# upnid5tYsKmKx/1e+mQUP27FVLZqNBUvFEjhO1K30+MxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB
# 5TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCANBQfASPjS7STvRECi8i7P7Jn9pKtq4Nj8WSMU8U9s
# EjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vw
# j+kCh/TULCFvFQf1Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwIgQgBudLzh4eFQFRhUrhFkc/ehpc
# EAhXMY3lTR1W1VjO6dUwDQYJKoZIhvcNAQELBQAEggIAT9ixt62rCbIjyFhMA0ca
# ACo9+fEcCw8I/tLfegX1IyScoUsVjfRYG50hB0wUX9LcM0X0VUOyTeX2Ho3CUYVB
# MrMvltj+5xX6kkjdS4ROVQPI2yaiLr4HNuT5CqBbVpfSNuyMpDnPE4hAmNsm2x44
# 99CTnJEo/f7KH/YqNZjp3X76w4RSgyU2eARku42ibOu4/x+ILllezw/nQrS1jDmK
# DFK546gqNf5b7w1w8Ofd2HQ9X0+3OgoT9PHH5NmtXzQBh4iyyKazSctJ47MKW0Os
# YR/63eXatvy1lVYPZcwaXTrelCWIDBWjkpfsSZJKGKGw7UQkFdKOBQTyq8KlQyRE
# 6VYAe4ahnN/8hfofdfdTWgTUxFk5tu+v8vXZbaesp7393vXeWCYouOK9mHZSDen1
# SXzqjl81v0tup9ceQmr7cnKT9pCba1+Dul2VAfbuGbbB3X47CaVQG500jVPZzrpE
# pZbkMZboPSZD5upOTkNwmBkEsMFReDaR7SZrwo5gjvm0imRav5Ysoxnv5gWywRVT
# vs6wThc1Sf0bOKPNMZCxCPNVqWHgw2zN9SOLaZf+PLuvOZpayRxdfbMJx84YxzSH
# yiwg1PaXf+oIZcN4yKIGgxdnByxDshISfL03C5kMJrNatsVljx5QGQuA479WPZ1a
# ERCEaQvuaTKTRh/hlIdhhbU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_47_76.ps1
|
sample_47_76.ps1
|
# Copyright (C) Microsoft Corporation. All rights reserved.
#
# File: LAPS.psm1
# Author: jsimmons@microsoft.com
# Date: April 13, 2023
#
# This file implements the Get-LapsDiagnostics and Get-LapsAADPasswordPowerShell cmdlets.
function RunProcess()
{
Param (
[Parameter(Mandatory=$true)]
[string]$fileName,
[Parameter(Mandatory=$true)]
[string]$args
)
Write-Verbose "Running process: $fileName $args"
$process = New-Object System.Diagnostics.Process
$process.StartInfo.Filename = $fileName
$process.StartInfo.Arguments = $args
$process.StartInfo.RedirectStandardError = $true
$process.StartInfo.RedirectStandardOutput = $true
$process.StartInfo.UseShellExecute = $false
$process.Start() | Out-Null
$process.WaitForExit() | Out-Null
if ($process.ExitCode -ne 0)
{
Write-Error "$fileName returned an error code: $process.ExitCode"
}
}
function StartLapsWPPTracing()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
$etlFile = "$DataFolder\" + "LAPSTrace.etl"
$logman = $Env:windir + "\system32\logman.exe"
$logmanArgs = "start LAPSTrace"
$logmanArgs += " -o $etlFile"
$logmanArgs += " -p {177720b0-e8fe-47ed-bf71-d6dbc8bd2ee7} 0x7FFFFFFF 0xFF"
$logmanArgs += " -ets"
Write-Verbose "Starting log trace"
RunProcess $logman $logmanArgs
}
function StopLapsWPPTracing()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
$logman = $Env:windir + "\system32\logman.exe"
$logmanArgs = "stop LAPSTrace -ets"
Write-Verbose "Stopping log trace"
RunProcess $logman $logmanArgs
}
function StartLdapTracing()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Services\ldap\tracing -Name lsass.exe -Force | Out-Null
$etlFile = "$DataFolder\" + "LdapTrace.etl"
$logmanLdap = $Env:windir + "\system32\logman.exe"
$logmanLdapArgs = "start LdapTrace"
$logmanLdapArgs += " -o $etlFile"
$logmanLdapArgs += " -p Microsoft-Windows-LDAP-Client 0x1a59afa3 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096"
$logmanLdapArgs += " -ets"
Write-Verbose "Starting Ldap trace"
RunProcess $logmanLdap $logmanLdapArgs
}
function StopLdapTracing()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
$logmanLdap = $Env:windir + "\system32\logman.exe"
$logmanLdapArgs = "stop LdapTrace -ets"
Write-Verbose "Stopping Ldap trace"
RunProcess $logmanLdap $logmanLdapArgs
Remove-Item -Path HKLM:\SYSTEM\CurrentControlSet\Services\ldap\tracing\lsass.exe -Force
}
function StartNetworkTrace()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
$netsh = $Env:windir + "\system32\netsh.exe"
$traceFile = "$DataFolder\" + "netsh.etl"
$netshArgs = "trace start"
$netshArgs += " capture=yes"
$netshArgs += " persistent=no"
$netshArgs += " maxSize=250"
$netshArgs += " perfMerge=no"
$netshArgs += " sessionname=$DataFolder"
$netshArgs += " tracefile=$traceFile"
Write-Verbose "Starting network trace"
RunProcess $netsh $netshArgs
}
function StopNetworkTrace()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
$netsh = $Env:windir + "\system32\netsh.exe"
$netshArgs = "trace stop"
$netshArgs += " sessionname=$DataFolder"
Write-Verbose "Stopping network trace - may take a moment..."
RunProcess $netsh $netshArgs
}
function CopyOSBinaries()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
Copy-Item "$env:SystemRoot\system32\samsrv.dll" -Destination $DataFolder
Copy-Item "$env:SystemRoot\system32\wldap32.dll" -Destination $DataFolder
Copy-Item "$env:SystemRoot\system32\laps.dll" -Destination $DataFolder
Copy-Item "$env:SystemRoot\system32\lapscsp.dll" -Destination $DataFolder
Copy-Item "$env:SystemRoot\system32\windowspowershell\v1.0\modules\laps\lapspsh.dll" -Destination $DataFolder
Copy-Item "$env:SystemRoot\system32\windowspowershell\v1.0\modules\laps\lapsutil.dll" -Destination $DataFolder
}
function ExportLAPSEventLog()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
# Export individual LAPS log entries to csv file for easy viewing
$exportedCsvLogEntries = $DataFolder + "\laps_events.csv"
Write-Verbose "Exporting Microsoft-Windows-LAPS/Operational event log entries to $exportedCsvLogEntries"
Get-WinEvent -LogName "Microsoft-Windows-LAPS/Operational" | Select RecordId,TimeCreated,Id,LevelDisplayName, @{n='Message';e={$_.Message -replace '\s+', " "}} ,Version,ProviderName,ProviderId,LogName,ProcessId,ThreadId,MachineName,UserId,ActivityId | Export-CSV $exportedCsvLogEntries -NoTypeInformation
# Export the entire LAPS event log to an evtx file as well
$exportedLog = $DataFolder + "\laps_events.evtx"
$wevtutil = $Env:windir + "\system32\wevtutil.exe"
$wevtutilArgs = "epl Microsoft-Windows-LAPS/Operational $exportedLog"
Write-Verbose "Exporting Microsoft-Windows-LAPS/Operational event log to $exportedLog"
RunProcess $wevtutil $wevtutilArgs
}
function PostProcessRegistryValue()
{
Param (
[Parameter(Mandatory=$true)]
[string]$Name,
[Parameter(Mandatory=$true)]
[string]$Value
)
switch ($Name)
{
'BackupDirectory'
{
switch ($Value)
{
'0' { $notes = "Disabled" }
'1' { $notes = "AAD" }
'2' { $notes = "AD" }
default { $notes = "<unrecognized>" }
}
}
'PolicySource'
{
switch ($Value)
{
'1' { $notes = "CSP" }
'2' { $notes = "GPO" }
'3' { $notes = "Local" }
'4' { $notes = "LegacyLAPS" }
default { $notes = "<unrecognized>" }
}
}
# Convert 64-bit UTC timestamp values into human-readable string
'LastPasswordUpdateTime'
{
$dateTime = [DateTime]::FromFileTimeUtc($Value)
$notes = $dateTime.ToString("O")
}
'AzurePasswordExpiryTime'
{
$dateTime = [DateTime]::FromFileTimeUtc($Value)
$notes = $dateTime.ToString("O")
}
'PostAuthResetDeadline'
{
$dateTime = [DateTime]::FromFileTimeUtc($Value)
$notes = $dateTime.ToString("O")
}
'PostAuthResetAuthenticationTime'
{
$dateTime = [DateTime]::FromFileTimeUtc($Value)
$notes = $dateTime.ToString("O")
}
default
{
$notes = ""
}
}
return $notes
}
function ExportRegistryKey()
{
Param (
[Parameter(Mandatory=$true)]
[object]$RegistrySettingsTable,
[Parameter(Mandatory=$true)]
[string]$Source,
[Parameter(Mandatory=$true)]
[string]$RegistryKey
)
$keyPath = "HKLM:\$RegistryKey"
$keyExists = Test-Path -Path $keyPath
if ($keyExists)
{
$rowToAdd = $RegistrySettingsTable.NewRow()
$rowToAdd.Source = $Source
$rowToAdd.KeyName = $RegistryKey
$RegistrySettingsTable.Rows.Add($rowToAdd)
$key = Get-Item $keyPath
$valueNames = $key | Select-Object -ExpandProperty Property
foreach ($valueName in $valueNames)
{
$valueData = Get-ItemProperty -LiteralPath $keyPath -Name $valueName | Select-Object -ExpandProperty $valueName
if ($valueName -eq "(default)")
{
$valueType = $key.GetValueKind("")
}
else
{
$valueType = $key.GetValueKind($valueName)
}
$rowToAdd = $RegistrySettingsTable.NewRow()
$rowToAdd.Source = ""
$rowToAdd.ValueName = $valueName
$rowToAdd.ValueData = $valueData
$rowToAdd.ValueType = $valueType
$rowToAdd.Notes = PostProcessRegistryValue -Name $valueName -Value $valueData
$rowToAdd.KeyName = $RegistryKey
$RegistrySettingsTable.Rows.Add($rowToAdd)
}
}
else
{
$rowToAdd = $RegistrySettingsTable.NewRow()
$rowToAdd.Source = $Source + " - key not found"
$rowToAdd.KeyName = $RegistryKey
$RegistrySettingsTable.Rows.Add($rowToAdd)
}
$rowToAdd = $RegistrySettingsTable.NewRow()
$rowToAdd.Source = ""
$RegistrySettingsTable.Rows.Add($rowToAdd)
}
function ExportRegistryKeys()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder
)
Write-Verbose "Collecting registry key data of interest"
$registrySettingsTable = New-Object System.Data.DataTable
$registrySettingsTable.Columns.Add("Source", "string") | Out-Null
$registrySettingsTable.Columns.Add("ValueName", "string") | Out-Null
$registrySettingsTable.Columns.Add("ValueData", "string") | Out-Null
$registrySettingsTable.Columns.Add("ValueType", "string") | Out-Null
$registrySettingsTable.Columns.Add("Notes", "string") | Out-Null
$registrySettingsTable.Columns.Add("KeyName", "string") | Out-Null
$source = "CSP"
$regKey = "Software\Microsoft\Policies\LAPS"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$source = "GPO"
$regKey = "Software\Microsoft\Windows\CurrentVersion\Policies\LAPS"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$source = "LegacyLaps"
$regKey = "Software\Policies\Microsoft Services\AdmPwd"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$source = "LocalConfig"
$regKey = "Software\Microsoft\Windows\CurrentVersion\LAPS\Config"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$source = "LocalState"
$regKey = "Software\Microsoft\Windows\CurrentVersion\LAPS\State"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$source = "LegacyLAPSGPExtension"
$regKey = "Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}"
ExportRegistryKey -RegistrySettingsTable $registrySettingsTable -Source $source -RegistryKey $regKey
$exportedKeys = $DataFolder + "\laps_registry.csv"
Write-Verbose "Exporting registry key data to $exportedKeys"
$registrySettingsTable | Export-Csv $exportedKeys -NoTypeInformation
Write-Verbose "Done exporting registry keys"
}
function LapsDiagnosticsPrologue()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder,
[Parameter(Mandatory=$true)]
[bool]$CollectNetworkTrace
)
Write-Verbose "Get-LapsDiagnostics: LapsDiagnosticsPrologue starting"
StartLapsWPPTracing $DataFolder
StartLdapTracing $DataFolder
if ($CollectNetworkTrace)
{
StartNetworkTrace $DataFolder
}
}
function LapsDiagnosticsEpilogue()
{
Param (
[Parameter(Mandatory=$true)]
[string]$DataFolder,
[Parameter(Mandatory=$true)]
[bool]$CollectNetworkTrace
)
Write-Verbose "Get-LapsDiagnostics: LapsDiagnosticsEpilogue starting"
if ($CollectNetworkTrace)
{
StopNetworkTrace $DataFolder
}
StopLapsWPPTracing $DataFolder
StopLdapTracing $DataFolder
CopyOSBinaries $DataFolder
ExportLAPSEventLog $DataFolder
ExportRegistryKeys $DataFolder
Write-Verbose "Get-LapsDiagnostics: LapsDiagnosticsEpilogue ending"
}
# The Get-LapsDiagnostics cmdlet gathers configuration state, health info, and other
# info useful to have when diagnosing issues. Trace logs are also captured, either
# across a process-policy directive (the default) or across a forced reset-password
# operation (if specified).
function Get-LapsDiagnostics
{
[CmdletBinding(HelpUri="https://go.microsoft.com/fwlink/?linkid=2234481")]
Param (
[string]$OutputFolder,
[Parameter()]
[Switch]$CollectNetworkTrace,
[Parameter()]
[Switch]$ResetPassword
)
Write-Verbose "Get-LapsDiagnostics: starting OutputFolder:$OutputFolder CollectNetworkTrace:$CollectNetworkTrace ResetPassword:$ResetPassword"
# Must run in a native bitness host to ensure proper exporting of registry keys
if ([Environment]::Is64BitOperatingSystem -and ![Environment]::Is64BitProcess)
{
Write-Error "You must run this cmdlet in a 64-bit PowerShell window"
Exit
}
if (!($OutputFolder))
{
$OutputFolder = "$env:TEMP\LapsDiagnostics"
Write-Verbose "Get-LapsDiagnostics: OutputFolder not specified - defaulting to $OutputFolder"
}
# Verify or create root output folder
$exists = Test-Path $OutputFolder
if ($exists)
{
Write-Verbose "Get-LapsDiagnostics: '$OutputFolder' already exists - using it"
}
else
{
Write-Verbose "Get-LapsDiagnostics: folder '$OutputFolder' does not exist - creating it"
New-Item $OutputFolder -Type Directory | Out-Null
Write-Verbose "Get-LapsDiagnostics: created output folder '$OutputFolder'"
}
# Create a temporary destination folder
$currentTime = Get-Date -Format yyyyMMddMM_HHmmss
$baseName = "LapsDiagnostics_" + $env:ComputerName + "_" + $currentTime
$dataFolder = $OutputFolder + "\" + $baseName
New-Item $dataFolder -Type Directory | Out-Null
Write-Verbose "Get-LapsDiagnostics: all data for this run will be collected in $dataFolder"
# Create a zip file name
$dataZipFile = $OutputFolder + "\" + $baseName + ".zip"
Write-Verbose "Get-LapsDiagnostics: final data for this run will be written to $dataZipFile"
try
{
LapsDiagnosticsPrologue $dataFolder $CollectNetworkTrace
if ($ResetPassword)
{
Write-Verbose "Get-LapsDiagnostics: calling Reset-LapsPassword cmdlet"
Reset-LapsPassword -ErrorAction Ignore
if ($? -eq $true)
{
Write-Verbose "Get-LapsDiagnostics: Reset-LapsPassword cmdlet succeeded"
}
else
{
Write-Verbose "Get-LapsDiagnostics: Reset-LapsPassword cmdlet failed - see logs"
}
}
else
{
Write-Verbose "Get-LapsDiagnostics: calling Invoke-LapsPolicyProcessing cmdlet"
Invoke-LapsPolicyProcessing -ErrorAction Ignore
if ($? -eq $true)
{
Write-Verbose "Get-LapsDiagnostics: Invoke-LapsPolicyProcessing succeeded"
}
else
{
Write-Verbose "Get-LapsDiagnostics: Invoke-LapsPolicyProcessing failed - - see logs"
}
}
}
catch
{
Write-Error "Caught exception:"
Write-Error $($_.Exception)
}
finally
{
LapsDiagnosticsEpilogue $dataFolder $CollectNetworkTrace
# Zip up the folder
Compress-Archive -DestinationPath $dataZipFile -LiteralPath $dataFolder -Force
# Delete the folder
Remove-Item -Recurse -Force $dataFolder -ErrorAction Ignore
}
Write-Verbose "Get-LapsDiagnostics: finishing"
Write-Host "Get-LapsDiagnostics: all data for this run was written to the following zip file:"
Write-Host
$dataZipFile
Write-Host
}
# ConvertBase64ToSecureString (internal helper function - not exported)
function ConvertBase64ToSecureString()
{
Param (
[string]$Base64
)
if ([string]::IsNullOrEmpty($Base64))
{
throw
}
$bytes = [System.Convert]::FromBase64String($Base64)
$plainText = [System.Text.Encoding]::UTF8.GetString($bytes)
$secureString = ConvertTo-SecureString $plainText -AsPlainText -Force
$secureString
}
# ConvertBase64ToPlainText (internal helper function - not exported)
function ConvertBase64ToPlainText()
{
Param (
[string]$Base64
)
if ([string]::IsNullOrEmpty($Base64))
{
throw
}
$bytes = [System.Convert]::FromBase64String($Base64)
$plainText = [System.Text.Encoding]::UTF8.GetString($bytes)
$plainText
}
# ProcessOneDevice (internal helper function - not exported)
function ProcessOneDevice()
{
Param (
[string]$DeviceId,
[boolean]$IncludePasswords,
[boolean]$IncludeHistory,
[boolean]$AsPlainText
)
Write-Verbose "ProcessOneDevice starting for DeviceId:'$DeviceId' IncludePasswords:$IncludePasswords IncludeHistory:$IncludeHistory AsPlainText:$AsPlainText"
# Check if a guid was passed in. If it looks like a guid we assume it's the device id.
$guid = New-Object([System.Guid])
$isGuid = [System.Guid]::TryParse($DeviceId, [ref]$guid)
if (!$isGuid)
{
# $DeviceId is not a guid. Assume it's a DisplayName and look it up:
Write-Verbose "Querying device '$DeviceId' to get its device id"
$filter = "DisplayName eq '$DeviceId'"
try
{
$mgDevice = Get-MgDevice -Filter $filter
}
catch
{
$mgDevice = $null
}
if ($mgDevice -eq $null)
{
Write-Error "Failed to lookup '$DeviceId' by DisplayName"
return
}
$deviceName = $mgDevice.DisplayName
$DeviceId = $mgDevice.DeviceId
Write-Verbose "Device DisplayName: '$deviceName'"
Write-Verbose "Device DeviceId: '$DeviceId'"
# Use guid device id
$DeviceId = $mgDevice.DeviceId
}
# Build URI - beta graph endpoint for now
$uri = 'v1.0/directory/deviceLocalCredentials/' + $DeviceId
# Get actual passwords if requested; note that $select=credentials will cause the server
# to return all credentials, ie latest plus history. If -IncludeHistory was not actually
# specified then we will drop the older passwords down below when displaying the results.
if ($IncludePasswords)
{
$uri = $uri + '?$select=credentials'
}
# Create a new correlationID every time
$correlationID = [System.Guid]::NewGuid()
Write-Verbose "Created new GUID for cloud request correlation ID (client-request-id) '$correlationID'"
$httpMethod = 'GET';
$headers = @{}
$headers.Add('ocp-client-name', 'Get-LapsAADPassword Windows LAPS Cmdlet')
$headers.Add('ocp-client-version', '1.0')
$headers.Add('client-request-id', $correlationID)
try
{
Write-Verbose "Retrieving LAPS credentials for device id: '$DeviceId' with client-request-id:'$correlationID'"
$queryResults = Invoke-MgGraphRequest -Method $httpMethod -Uri $URI -Headers $headers -OutputType Json
Write-Verbose "Got LAPS credentials for device id: '$DeviceId':"
Write-Verbose ""
Write-Verbose $queryResults
Write-Verbose ""
}
catch [Exception]
{
Write-Verbose "Failed trying to query LAPS credential for $DeviceId"
Write-Verbose ""
Write-Error $_
Write-Verbose ""
return
}
if ([string]::IsNullOrEmpty($queryResults))
{
Write-Verbose "Response was empty - device object does not have any persisted LAPS credentials"
return
}
# Build custom PS output object
Write-Verbose "Converting http response to json"
$resultsJson = ConvertFrom-Json $queryResults
Write-Verbose "Successfully converted http response to json:"
Write-Verbose ""
Write-Verbose $resultsJson
Write-Verbose ""
# Grab device name
$lapsDeviceId = $resultsJson.deviceName
# Grab device id
$lapsDeviceId = New-Object([System.Guid])
$lapsDeviceId = [System.Guid]::Parse($resultsJson.id)
# Grab password expiration time (only applies to the latest password)
$lapsPasswordExpirationTime = Get-Date $resultsJson.refreshDateTime
if ($IncludePasswords)
{
# Copy the credentials array
$credentials = $resultsJson.credentials
# Sort the credentials array by backupDateTime.
$credentials = $credentials | Sort-Object -Property backupDateTime -Descending
# Note: current password (ie, the one most recently set) is now in the zero position of the array
# If history was not requested, truncate the credential array down to just the latest one
if (!$IncludeHistory)
{
$credentials = @($credentials[0])
}
foreach ($credential in $credentials)
{
$lapsDeviceCredential = New-Object PSObject
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "DeviceName" -Value $resultsJson.deviceName
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "DeviceId" -Value $lapsDeviceId
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "Account" -Value $credential.accountName
# Cloud returns passwords in base64, convert:
if ($AsPlainText)
{
$password = ConvertBase64ToPlainText -base64 $credential.passwordBase64
}
else
{
$password = ConvertBase64ToSecureString -base64 $credential.passwordBase64
}
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "Password" -Value $password
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "PasswordExpirationTime" -Value $lapsPasswordExpirationTime
$lapsPasswordExpirationTime = $null
$credentialUpdateTime = Get-Date $credential.backupDateTime
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "PasswordUpdateTime" -Value $credentialUpdateTime
# Note: cloud also returns an accountSid property - omitting it for now
Write-Output $lapsDeviceCredential
}
}
else
{
# Output a single object that just displays latest password expiration time
# Note, $IncludeHistory is ignored even if specified in this case
$lapsDeviceCredential = New-Object PSObject
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "DeviceName" -Value $resultsJson.deviceName
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "DeviceId" -Value $lapsDeviceId
Add-Member -InputObject $lapsDeviceCredential -MemberType NoteProperty -Name "PasswordExpirationTime" -Value $lapsPasswordExpirationTime
Write-Output $lapsDeviceCredential
}
}
# DumpMSGraphContext (internal helper function - not exported)
function DumpMSGraphContext
{
Param (
[object]$MsGraphContext
)
# Dump some of the MSGraph context details for diagnostics purposes
Write-Verbose "Dumping MSGraph context details:"
if ($mgContext.ClientId)
{
$verbOutput = [string]::Format(' ClientId: {0}', $mgContext.ClientId)
Write-Verbose $verbOutput
}
if ($mgContext.TenantId)
{
$verbOutput = [string]::Format(' TenantId: {0}', $mgContext.TenantId)
Write-Verbose $verbOutput
}
if ($mgContext.AuthType)
{
$verbOutput = [string]::Format(' AuthType: {0}', $mgContext.AuthType)
Write-Verbose $verbOutput
}
if ($mgContext.AuthProviderType)
{
$verbOutput = [string]::Format(' AuthProviderType: {0}', $mgContext.AuthProviderType)
Write-Verbose $verbOutput
}
if ($mgContext.Account)
{
$verbOutput = [string]::Format(' Account: {0}', $mgContext.Account)
Write-Verbose $verbOutput
}
if ($mgContext.AppName)
{
$verbOutput = [string]::Format(' AppName: {0}', $mgContext.AppName)
Write-Verbose $verbOutput
}
if ($mgContext.ContextScope)
{
$verbOutput = [string]::Format(' ContextScope: {0}', $mgContext.ContextScope)
Write-Verbose $verbOutput
}
if ($mgContext.PSHostVersion)
{
$verbOutput = [string]::Format(' PSHostVersion: {0}', $mgContext.PSHostVersion)
Write-Verbose $verbOutput
}
if ($mgContext.Scopes)
{
Write-Verbose " Scopes:"
foreach ($scope in $mgContext.Scopes)
{
$verbOutput = [string]::Format(' {0}', $scope)
Write-Verbose $verbOutput
}
}
}
# The Get-LapsAADPassword cmdlet is used to query LAPS passwords from Azure AD. At
# its core, it just submits MS graph queries and morphs the returned results into
# PowerShell objects.
#
# This cmdlet has a dependency on the MSGraph PowerShell library which may be
# installed like so:
#
# Set-PSRepository PSGallery -InstallationPolicy Trusted
# Install-Module Microsoft.Graph -Scope AllUsers
#
# Functional prerequisites:
#
# You must be logged into into MSGraph before running this cmdlet - see the docs
# on the Connect-MgGraph cmdlet.
#
# An app needs to be created in your tenant that that configures the appropriate
# scopes for querying DeviceLocalCredentials.
#
function Get-LapsAADPassword
{
[CmdletBinding(DefaultParameterSetName = "DeviceSpecificQuery",
HelpUri="https://go.microsoft.com/fwlink/?linkid=2234672")]
Param (
[Parameter(
ParameterSetName="DeviceSpecificQuery",
Mandatory=$true)
]
[string[]]$DeviceIds,
[Parameter()]
[Switch]$IncludePasswords,
[Parameter()]
[Switch]$IncludeHistory,
[Parameter()]
[Switch]$AsPlainText
)
Write-Verbose "Get-LapsAADPassword starting IncludePasswords:$IncludePasswords AsPlainText:$AsPlainText"
$now = Get-Date
$utcNow = $now.ToUniversalTime()
Write-Verbose "Local now: '$now' (UTC now: '$utcNow')"
$activityId = [System.Diagnostics.Trace]::CorrelationManager.ActivityId
Write-Verbose "Current activityId: $activityId"
if ($AsPlainText -and !$IncludePasswords)
{
Write-Warning "Note: specifying -AsPlainText has no effect unless -IncludePasswords is also specified"
$AsPlainText = $false
}
# Validate that admin has logged into MSGraph already
$msGraphAuthModule = Get-Module "Microsoft.Graph.Authentication"
if (!$msGraphAuthModule)
{
throw "You must install the MSGraph PowerShell module before running this cmdlet, for example by running 'Install-Module Microsoft.Graph -Scope AllUsers'."
}
# Validate that admin has logged into MSGraph already
$mgContext = Get-MgContext
if (!$mgContext)
{
throw "You must first authenticate to MSGraph first running this cmdlet; see Connect-MgGraph cmdlet."
}
# Dump MS graph context details when Verbose is enabled
if ($VerbosePreference -ne [System.Management.Automation.ActionPreference]::SilentlyContinue)
{
DumpMSGraphContext -MsGraphContext $mgContext
}
foreach ($DeviceId in $DeviceIds)
{
# Ignore empty strings
if ([string]::IsNullOrEmpty($DeviceId))
{
continue
}
ProcessOneDevice -DeviceId $DeviceId -IncludePasswords $IncludePasswords -IncludeHistory $IncludeHistory -AsPlainText $AsPlainText
}
}
|
combined_dataset/train/non-malicious/893.ps1
|
893.ps1
|
$gitrepo="https://github.com/Azure-Samples/app-service-web-dotnet-get-started.git"
$webappname="mywebapp$(Get-Random)"
$location="West Europe"
New-AzResourceGroup -Name myResourceGroup -Location $location
New-AzAppServicePlan -Name $webappname -Location $location -ResourceGroupName myResourceGroup -Tier Free
New-AzWebApp -Name $webappname -Location $location -AppServicePlan $webappname -ResourceGroupName myResourceGroup
$PropertiesObject = @{
repoUrl = "$gitrepo";
branch = "master";
isManualIntegration = "true";
}
Set-AzResource -PropertyObject $PropertiesObject -ResourceGroupName myResourceGroup -ResourceType Microsoft.Web/sites/sourcecontrols -ResourceName $webappname/web -ApiVersion 2015-08-01 -Force
|
combined_dataset/train/non-malicious/708.ps1
|
708.ps1
|
function Remove-RsRestCatalogItem
{
[CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'High')]
param(
[Parameter(Mandatory = $True)]
[string]
$RsItem,
[string]
$ReportPortalUri,
[Alias('ApiVersion')]
[ValidateSet("v2.0")]
[string]
$RestApiVersion = "v2.0",
[Alias('ReportServerCredentials')]
[System.Management.Automation.PSCredential]
$Credential,
[Microsoft.PowerShell.Commands.WebRequestSession]
$WebSession
)
Begin
{
$WebSession = New-RsRestSessionHelper -BoundParameters $PSBoundParameters
$ReportPortalUri = Get-RsPortalUriHelper -WebSession $WebSession
$catalogItemsUri = $ReportPortalUri + "api/$RestApiVersion/CatalogItems(Path='{0}')"
}
Process
{
if ($RsItem -eq '/')
{
throw "Root folder cannot be deleted!"
}
if ($PSCmdlet.ShouldProcess($RsItem, "Delete the item"))
{
try
{
Write-Verbose "Deleting item $RsItem..."
$catalogItemsUri = [String]::Format($catalogItemsUri, $RsItem)
if ($Credential -ne $null)
{
Invoke-WebRequest -Uri $catalogItemsUri -Method Delete -WebSession $WebSession -Credential $Credential -Verbose:$false | Out-Null
}
else
{
Invoke-WebRequest -Uri $catalogItemsUri -Method Delete -WebSession $WebSession -UseDefaultCredentials -Verbose:$false | Out-Null
}
Write-Verbose "Catalog item $RsItem was deleted successfully!"
}
catch
{
throw (New-Object System.Exception("Failed to delete catalog item '$RsItem': $($_.Exception.Message)", $_.Exception))
}
}
}
}
|
combined_dataset/train/non-malicious/sample_41_28.ps1
|
sample_41_28.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loggingsearch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loggingsearch.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6721daff-25e3-4454-8b3d-3eda7d2b1f62'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loggingsearch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingsearch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Invoke-OCILoggingsearchSearchLogs'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingsearch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Manage ASP_5.NET Providers.ps1
|
Manage ASP_5.NET Providers.ps1
|
# Manage_ASP_NET_Providers.ps1
# by Chistian Glessner
# http://iLoveSharePoint.com
# If you want to change the app config you have to restart PowerShell
param($appConfigPath=$null)
# App config path have to be set before loading System.Web.dll
[System.AppDomain]::CurrentDomain.SetData("APP_CONFIG_FILE", $appConfigPath )
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Web")
function global:Get-MembershipProvider($providerName=$null, [switch]$all)
{
if($all)
{
return [System.Web.Security.Membership]::Providers
}
if($providerName -eq $null)
{
return [System.Web.Security.Membership]::Provider
}
else
{
return [System.Web.Security.Membership]::Providers[$providerName]
}
}
function global:Add-MembershipUser($login=$(throw "-login is required"), $password=$(throw "$password is required"), $mail=$(throw "-mail is required"),$question, $answer, $approved=$true)
{
$provider = $input | select -First 1
if($provider -isnot [System.Web.Security.MembershipProvider])
{
$provider = Get-MembershipProvider
}
$status = 0
$provider.CreateUser($login, $password, $mail, $question, $answer, $approved, $null, [ref]$status)
return [System.Web.Security.MembershipCreateStatus]$status
}
function global:Get-MembershipUser($identifier, $maxResult=100)
{
$provider = $input | select -First 1
if($provider -isnot [System.Web.Security.MembershipProvider])
{
$provider = Get-MembershipProvider
}
if($identifier -ne $null)
{
$name = $provider.GetUserNameByEmail($identifier)
if($name -ne $null){$identifier = $name}
return $provider.GetUser($identifier,$false)
}
$totalUsers = 0
$users = $provider.GetAllUsers(0,$maxResult,[ref]$totalUsers)
$users
if($totalUsers -gt $maxResult)
{
throw "-maxResult limit exceeded"
}
}
function global:Reset-MembershipUserPassword($identifier=$(throw "-identifier is required"), $questionAnswer)
{
$provider = $input | select -First 1
if($provider -isnot [System.Web.Security.MembershipProvider])
{
$provider = Get-MembershipProvider
}
$name = $provider.GetUserNameByEmail($identifier)
if($name -ne $null){$identifier = $name}
return $provider.ResetPassword($identifier, $questionAnswer)
}
function global:Get-RoleProvider($providerName=$null, [switch]$all)
{
if($all)
{
return [System.Web.Security.Roles]::Providers
}
if($providerName -eq $null)
{
return [System.Web.Security.Roles]::Provider
}
else
{
return [System.Web.Security.Roles]::Providers[$providerName]
}
}
function global:Get-ProfileProvider($providerName=$null)
{
if($all)
{
return [System.Web.Security.ProfileManager]::Providers
}
if($providerName -eq $null)
{
return [System.Web.Profile.ProfileManager]::Provider
}
else
{
return [System.Web.Profile.ProfileManager]::Providers[$providerName]
}
}
|
combined_dataset/train/non-malicious/2237.ps1
|
2237.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server name with SMS Provider installed")]
[string]$SiteServer,
[parameter(Mandatory=$true, HelpMessage="Path to where the Driver Source root directory is located")]
[ValidatePattern("^\\\\\w+\\\w+")]
[ValidateScript({Test-Path -Path $_ -PathType Container})]
[string]$DriverSourcePath,
[parameter(Mandatory=$true, HelpMessage="Path to where the Driver Package root directory is located")]
[ValidatePattern("^\\\\\w+\\\w+")]
[ValidateScript({Test-Path -Path $_ -PathType Container})]
[string]$DriverPackagePath,
[parameter(Mandatory=$true, HelpMessage="Specify the name of the Distribution Point Group that new Driver Packages will be distributed to")]
[string]$DPGroupName,
[parameter(Mandatory=$false, HelpMessage="Specify an Operating System folder to be skipped when importing drivers")]
[string[]]$SkipOS,
[parameter(Mandatory=$false, HelpMessage="Only validate the driver folder structure")]
[switch]$Validate,
[parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation")]
[switch]$ShowProgress
)
Begin {
$CurrentLocation = Get-Location
try {
Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug "SiteCode: $($SiteCode)"
}
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
try {
$SiteDrive = $SiteCode + ":"
Import-Module (Join-Path -Path (($env:SMS_ADMIN_UI_PATH).Substring(0,$env:SMS_ADMIN_UI_PATH.Length-5)) -ChildPath "\ConfigurationManager.psd1") -Force -Verbose:$false
if ((Get-PSDrive $SiteCode -ErrorAction SilentlyContinue | Measure-Object).Count -ne 1) {
New-PSDrive -Name $SiteCode -PSProvider "AdminUI.PS.Provider\CMSite" -Root $SiteServer
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
if ($PSBoundParameters["ShowProgress"]) {
$CurrentDriverCount = 0
}
}
Process {
function Validate-FolderItem {
param(
[parameter(Mandatory=$true)]
$FolderItem,
[parameter(Mandatory=$true)]
[ValidateSet("OS","Make","Model")]
[string]$Type
)
if (-not((Get-ChildItem -Path $FolderItem.FullName) -eq $null)) {
foreach ($SubItem in (Get-ChildItem -Path $FolderItem.FullName)) {
if (($Type -like "OS") -or ($Type -like "Make")) {
if (-not((Get-Item -Path $SubItem.FullName).Attributes -like "Directory")) {
Write-Warning -Message "Unsupported files found in '$($SubItem.FullName)'"
$Script:ValidationResult = $false
}
}
else {
if ((Get-ChildItem -Path $SubItem.FullName -Recurse -Include *.inf, *.exe, *.zip) -eq $null) {
Write-Warning -Message "Supported driver files was not found in '$($SubItem.FullName)'"
$Script:ValidationResult = $false
}
}
}
}
else {
switch ($Type) {
"Model" { Write-Warning -Message "Unable to validate $($Type) folder: $($FolderItem.Parent.Parent.Name)\$($FolderItem.Parent.Name)\$($FolderItem.Name). Folder is empty" }
"Make" { Write-Warning -Message "Unable to validate $($Type) folder: $($FolderItem.Parent.Name)\$($FolderItem.Name). Folder is empty" }
"OS" { Write-Warning -Message "Unable to validate $($Type) folder: $($FolderItem.Name). Folder is empty" }
}
$Script:ValidationResult = $false
}
}
$ValidOSList = New-Object -TypeName System.Collections.ArrayList
$OSFolders = Get-ChildItem -Path $DriverSourcePath | Select-Object Name, FullName, CreationTime
Write-Verbose -Message "Starting validation of OS and Make folders"
foreach ($OSFolder in $OSFolders) {
$ValidationResult = $true
$CurrentOSFolder = Get-Item -Path $OSFolder.FullName
if ($CurrentOSFolder.Attributes -like "Directory") {
Write-Verbose -Message "OS folder: $($CurrentOSFolder.Name)"
Validate-FolderItem -FolderItem $CurrentOSFolder -Type OS
}
foreach ($MakeFolder in (Get-ChildItem -Path $CurrentOSFolder)) {
$CurrentMakeFolder = Get-Item -Path $MakeFolder.FullName
if ($CurrentMakeFolder.Attributes -like "Directory") {
Write-Verbose -Message "Make folder: $($CurrentMakeFolder.Name)"
Validate-FolderItem -FolderItem $MakeFolder -Type Make
}
foreach ($ModelFolder in (Get-ChildItem -Path $CurrentMakeFolder)) {
$CurrentModelFolder = Get-Item -Path $ModelFolder.FullName
if ($CurrentModelFolder.Attributes -like "Directory") {
Write-Verbose -Message "Model folder: $($CurrentModelFolder.Name)"
Validate-FolderItem -FolderItem $ModelFolder -Type Model
}
}
}
if ($ValidationResult -ne $false) {
if ($PSBoundParameters["SkipOS"]) {
foreach ($SkipOSItem in $SkipOS) {
if ($SkipOSItem -like $CurrentOSFolder.Name) {
Write-Verbose -Message "Skipping OS folder: $($CurrentOSFolder.Name)"
}
else {
$ValidOSList.Add($CurrentOSFolder.FullName) | Out-Null
}
}
}
else {
$ValidOSList.Add($CurrentOSFolder.FullName) | Out-Null
}
}
}
Write-Verbose -Message "Successfully completed validating OS, Make and Model folders"
if ($PSBoundParameters["Validate"]) {
foreach ($ValidOS in $ValidOSList) {
$PSObject = [PSCustomObject]@{
OperatingSystem = (Get-Item -Path $ValidOS | Select-Object -ExpandProperty Name)
Validated = $true
}
Write-Output $PSObject
}
}
if (-not($PSBoundParameters["Validate"])) {
Write-Verbose -Message "Starting to process objects"
foreach ($OS in $ValidOSList) {
$CurrentOSName = Get-Item -Path $OS | Select-Object -ExpandProperty Name
$CurrentOSPath = $OS
$MakeObjects = Get-ChildItem -Path $CurrentOSPath | Select-Object -Property Name, FullName
Write-Verbose -Message "Operating System: $($CurrentOSName)"
Write-Verbose -Message "Path: $($OS)"
Set-Location $SiteDrive -Verbose:$false
if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentOSName -Verbose:$false) -eq $null) {
Write-Verbose -Message "Creating new Driver Category: $($CurrentOSName)"
New-CMCategory -CategoryType DriverCategories -Name $CurrentOSName | Out-Null
}
Set-Location $CurrentLocation -Verbose:$false
foreach ($Make in $MakeObjects) {
$CurrentMakeName = $Make.Name
$CurrentMakePath = $Make.FullName
$ModelObjects = Get-ChildItem -Path $CurrentMakePath | Select-Object -Property Name, FullName
Write-Verbose -Message "-- Make: $($CurrentMakeName)"
Write-Verbose -Message "-- Path: $($CurrentMakePath)"
Set-Location $SiteDrive -Verbose:$false
if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false) -eq $null) {
Write-Verbose -Message "---- Creating new Driver Category: $($CurrentMakeName)"
New-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false | Out-Null
}
Set-Location $CurrentLocation -Verbose:$false
foreach ($Model in $ModelObjects) {
$CurrentModelName = $Model.Name
$CurrentModelPath = $Model.FullName
Write-Verbose -Message "---- Model: $($CurrentModelName)"
Write-Verbose -Message "---- Path: $($CurrentModelPath)"
$DriverINFs = Get-ChildItem -Path $CurrentModelPath -Recurse -Include *.inf
Write-Verbose -Message "------ Drivers: $(($DriverINFs | Measure-Object).Count)"
Set-Location $SiteDrive -Verbose:$false
if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false) -eq $null) {
Write-Verbose -Message "------ Creating new Driver Category: $($CurrentModelName)"
New-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false | Out-Null
}
$CurrentDriverPackageName = "$($CurrentMakeName) - $($CurrentModelName) - $($CurrentOSName)"
if ((Get-CMDriverPackage -Name $CurrentDriverPackageName -Verbose:$false) -eq $null) {
if ($DriverPackagePath.EndsWith("\")) {
$NewDriverPackagePath = "$($DriverPackagePath)$($CurrentOSName)\$($CurrentMakeName)\$($CurrentModelName)"
}
else {
$NewDriverPackagePath = "$($DriverPackagePath)\$($CurrentOSName)\$($CurrentMakeName)\$($CurrentModelName)"
}
Write-Verbose -Message "------ Creating new Driver Package: $($CurrentDriverPackageName)"
New-CMDriverPackage -Name $CurrentDriverPackageName -Path $NewDriverPackagePath -Verbose:$false | Out-Null
Start-CMContentDistribution -DriverPackageName $CurrentDriverPackageName -DistributionPointGroupName $DPGroupName -Verbose:$false | Out-Null
}
$CurrentDriverPackage = Get-CMDriverPackage -Name "$($CurrentDriverPackageName)" -Verbose:$false
if (($CurrentDriverPackage | Measure-Object).Count -ge 1) {
Write-Verbose -Message "------ Current Driver Package: $($CurrentDriverPackage.Name)"
}
$DriverCategoryArray = @()
$DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentOSName -Verbose:$false)
$DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false)
$DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false)
foreach ($Category in $DriverCategoryArray) {
Write-Verbose -Message "------ Categories: $($Category.LocalizedCategoryInstanceName)"
}
$DriverCount = ($DriverINFs | Measure-Object).Count
foreach ($DriverINF in $DriverINFs) {
$CurrentDriverCount++
if ($PSBoundParameters["ShowProgress"]) {
$ProgressArguments = @{
Id = 1
Activity = "Importing Drivers"
Status = "Processing driver $($CurrentDriverCount) of $($DriverCount)"
CurrentOperation = "Current model: $($CurrentModelName)"
PercentComplete = (($CurrentDriverCount / $DriverCount) * 100)
}
Write-Progress $ProgressArguments
}
try {
$DriverArguments = @{
UncFileLocation = $DriverINF.FullName
DriverPackage = $CurrentDriverPackage
EnableAndAllowInstall = $true
AdministrativeCategory = $DriverCategoryArray
ImportDuplicateDriverOption = "AppendCategory"
ErrorAction = "SilentlyContinue"
Verbose = $false
}
Write-Verbose -Message "Attempting to import driver: $($DriverINF.FullName)"
Import-CMDriver @DriverArguments | Out-Null
}
catch {
Write-Warning -Message "Failed to import: $($DriverINF.FullName)"
}
}
if ($PSBoundParameters["ShowProgress"]) {
Write-Progress -Id 1 -Activity "Importing Drivers" -Completed
}
Update-CMDistributionPoint -DriverPackageName $CurrentDriverPackageName -Verbose:$false
Set-Location $CurrentLocation -Verbose:$false
}
}
}
}
}
|
combined_dataset/train/non-malicious/New-ISEMenu_5.ps1
|
New-ISEMenu_5.ps1
|
Import-Module ShowUI
Function New-ISEMenu {
New-Grid -AllowDrop:$true -Name "ISEAddonCreator" -columns Auto, * -rows Auto,Auto,Auto,*,Auto,Auto -Margin 5 {
New-Label -Name Warning -Foreground Red -FontWeight Bold -Column 1
($target = New-TextBox -Name txtName -Column 1 -Row ($Row=1))
New-Label "Addon Menu _Name" -Target $target -Row $Row
($target = New-TextBox -Name txtShortcut -Column 1 -Row ($Row+=1))
New-Label "Shortcut _Key" -Row $Row -Target $target
($target = New-TextBox -Name txtScriptBlock -Column 1 -Row ($Row+=1) -MinHeight 141 -MinWidth 336 -AcceptsReturn:$true -HorizontalScrollBarVisibility Auto -VerticalScrollBarVisibility Auto)
New-Label "Script _Block" -Row $Row -Target $target
New-CheckBox "_Add to ISE Profile" -Name chkProfile -Row ($Row+=1)
New-StackPanel -Orientation Horizontal -Column 1 -Row ($Row+=1) -HorizontalAlignment Right {
New-Button "_Save" -Name btnSave -Width 75 -Margin "0,0,5,0" -IsDefault -On_Click {
if ($txtName.Text.Trim() -eq "" -or $txtShortcut.text.Trim() -eq "" -or $txtScriptBlock.text.Trim() -eq "") {
$Warning.Content = "You must supply all parameters"
} else {
$menuItems = $psise.CurrentPowerShellTab.AddOnsMenu.Submenus | Select -ExpandProperty DisplayName
if ($menuItems -Contains $txtName.Text) {
$Warning.Content = "Select another Name for the menu"
return
}
try {
$ScriptBlock = [ScriptBlock]::Create($txtScriptBlock.Text)
$psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add($txtName.Text,$ScriptBlock,$txtShortcut.Text) | Out-Null
}
catch {
$Warning.Content = "Fatal Error Creating MenuItem:`n$_"
return
}
if ($chkProfile.IsChecked) {
$profileText = "`n`#Added by ISE Menu Creator Addon if (`$psISE) { `$psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add(`"$($txtName.Text)`",`{$ScriptBlock`},`"$($txtShortcut.Text)`") | Out-Null } "
Add-Content -Path $profile -Value $profileText
}
$window.Close()
}
}
New-Button "Cancel" -Name btnCancel -Width 75 -IsCancel
}
} -show -On_Load { $txtName.Focus() }
}
# this will add a the "New ISE menu" menu item and load it every time you run this script!
$psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add("New ISE menu",{New-ISEMenu},"ALT+M") | Out-Null
|
combined_dataset/train/non-malicious/sample_49_14.ps1
|
sample_49_14.ps1
|
ConvertFrom-StringData @'
IPAddressDisplayNameFormat=Indirizzo IP: {0}
NetworkNameDisplayNameFormat=Nome: {0}
NetworkNameOfflineDisplayNameFormat=Indirizzo IP: indirizzo su "{0}"
CreateClusterProgressValidationStart=Convalida dell'idoneità dei server per un cluster di failover in corso.
CreateClusterProgressValidationEnd=Convalida dell'idoneità dei server per un cluster di failover completata.
CreateClusterProgressCreationStartFormat=Creazione del cluster di failover "{0}" in corso.
CreateClusterProgressCreationEndFormat=Creazione del cluster di failover "{0}" completata.
AddNodesProgressValidationStart=Convalida dell'idoneità dei nuovi server per un cluster di failover in corso.
AddNodesProgressValidationEnd=Convalida dell'idoneità dei nuovi server per un cluster di failover completata.
AddNodesProgressAdditionStartFormat=Aggiunta di nodi al cluster di failover "{0}" in corso.
AddNodesProgressAdditionEndFormat=Aggiunta di nodi al cluster di failover "{0}" completata.
'@
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAjeRC0t3ckvwF4
# opN7xBacKP/PLk1z3TMtoB2zNmqs4aCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKBA
# pKttkKdCO4hrJAfaQNbsZNyOliD90kkulWpKHDfZMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAJ8mEAOa1rqJ4oSaRzfWK4HQ1m7+vxqpqefOY
# ouENY21Hz/GawjstRPZdfGCcQuUZq0ZWteOvXDSnfqC9Wq9Ox93WDbjtquiyFxfE
# ikDJfVNGsCkt301szBqT++Wy+8ohj3H6K1XxIywQA4WRa5uO1xbYC8+mnIPaELGI
# AivQ9eGzUDQkRXUBCXA5cU6937jQ3s8BEm4gIl0ICNG6YTF/kwsMhMECgOIAOwzz
# le7eFeBidy4Bfl2hSinPXJ0D4aeQeuf0J4hgEiZzD4pQI/r/XJFdcPGskJJ9xLJB
# gOAC4W4qea4A7zU7AUP2mf4LEOjmR0bY5YF4DbuCc3wDyC+U3aGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCeIdcBqlEGLdeHk9tgCTXL25o3esdzXGaF
# rMAhniFV7wIGZbqiB1B9GBMyMDI0MDIyMDA3MjE1MS4xODZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd
# ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO
# A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g
# 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v
# FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm
# v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR
# KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj
# lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY
# C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834
# bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu
# YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w
# pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I
# l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy
# vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS
# mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx
# vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q
# Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k
# VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm
# i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp
# upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY
# h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW
# InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU
# hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi
# DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOl+LA0wIhgPMjAyNDAyMjAwMzM1NDFaGA8yMDI0MDIy
# MTAzMzU0MVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6X4sDQIBADAHAgEAAgIR
# PjAHAgEAAgIRbzAKAgUA6X99jQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AKPHxGJ5Su7VZLv3Ba5iIj2TiRK1Eknupo36VJhUAjdQqDfWRis9mEvoxrdnEgbq
# kN8kvth0bKsTjyHZIXU6yTLthrMcXeVNkT3oGX9wI2b1pr9RpgvhNr5RsfNCBgFT
# kvU/dnN4bPXGSyF3yX8c+9PL85HTQJfj4cxHKGqTctFzMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA
# Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgqopYFJS4w3CyZHsA1x1JDzwSo2YAOnXRvajP8LS1
# c/cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3
# 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIEXKm9pbP+lph9V+giwCh77C
# 3QoSB5DAVUezi4oA/U1KMA0GCSqGSIb3DQEBCwUABIICABwab2E3ghI1bkDvrx3V
# QufQiie4j4klBk+WQ/VjF4eU1qZJAxC/KcXE38g7M96aZRpiWCZ1wic2MHR79Jy1
# byNfhtn0uM+sNoCwMROhrff9eb2/HbGGiOU0vF79GzUDplWlqVsN5xelGOiKOr2k
# 5zRkDvLCLzMTVcWK0A8zZMb3g7ksMlNZS6PLI/KUmkdDWUDAjKo8dc/rxymPyz4a
# dxrR+MgFpUfJXWunEN29k53wu9eDmV/Y4LJMaR2yK9iLlTO5sLXTBgpCggfBCLth
# uFK5V4XMZkgS4hFx7X/JjUhnOfx/+SOpnZPvcTqwLixcefYZIwPgezXuJdfSQbTr
# BpDY7P1YzqzFLGSA1E2vnuvmrgEQXY/UdS0Z0sG8I+lAxCHWaP3/mR4PX0n7JkF7
# YK3QMmJyp66W3iEsMzHS5CE5JrOOteU8MRmSAW5oPtR3AL2g5RoNb3gBR30+Jxoy
# MGGI17NdHAnSW3X3B8WDdiSSQtxLZRJz3v8UW6P9YIClmMtaQahhVJkfgz24Wn09
# Pre3EdUTyTD4bNPnMlQa1Cte85hTiIYKzPp6F4HxYbZwMEyHl8AQHYhfdsJv1sNb
# f/zTh1gsY9z3WUnr39EEFvBddWHsjmvadr46MhlFP0BeSagmrNHrQEkXXG5fNo+N
# KTrSD8vafotSG8r4di+EnLPr
# SIG # End signature block
|
combined_dataset/train/non-malicious/0dbcab33-47ec-4c68-98cd-b9e906786e5a.ps1
|
0dbcab33-47ec-4c68-98cd-b9e906786e5a.ps1
|
$WarningPreference = "SilentlyContinue"
$password = Get-Content C:\\securestring.txt | convertto-securestring
$username = "PROD\\administrator"
$credentials = new-object -typename System.Management.Automation.PSCredential -argumentlist $username, $password
$uucenter = "uuoresund.dk"
$totalSize = 0
$session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://prod-exch1.prod.local/PowerShell/ -Credential $credentials
Import-PSSession $session -DisableNameChecking | out-null
foreach ($mbx in Get-Mailbox)
{
if($mbx.PrimarySMTPAddress -like '*uuoresund.dk*')
{
$size = (Get-MailboxStatistics $mbx.Identity).TotalItemSize
$position = $size.IndexOf("(")
$size = $size.Substring($position+1)
$position = $size.IndexOf(" ")
$size = $size.Substring(0, $position)
$totalSize = [long]$totalSize + [long]$size
}
}
$totalSize = $totalSize/1000000
Write-Host "<prtg>"
Write-Host " <result>"
Write-Host " <channel>$uucenter</channel>"
Write-Host " <value>$totalSize</value>"
Write-Host " <float>1</float>"
Write-Host " </result>"
Write-Host "</prtg>"
Remove-PSSession $session
Exit 0
|
combined_dataset/train/non-malicious/WpfBindingHelper.ps1
|
WpfBindingHelper.ps1
|
using System;
using System.Windows;
using System.ComponentModel;
using System.Windows.Markup;
using System.Windows.Data;
using System.Globalization;
namespace PoshWpf
{
public class BindingConverter : ExpressionConverter
{
public override bool CanConvertTo(ITypeDescriptorContext context, Type destinationType)
{
return (destinationType == typeof(MarkupExtension)) ? true : false;
}
public override object ConvertTo(ITypeDescriptorContext context, CultureInfo culture, object value, Type destinationType)
{
if (destinationType == typeof(MarkupExtension))
{
var bindingExpression = value as BindingExpression;
if (bindingExpression == null)
throw new Exception();
return bindingExpression.ParentBinding;
}
return base.ConvertTo(context, culture, value, destinationType);
}
}
public static class XamlHelper
{
static XamlHelper()
{
Register(typeof(System.Windows.Data.BindingExpression), typeof(PoshWpf.BindingConverter));
}
internal static void Register(Type T, Type TC)
{
var attr = new Attribute[] { new TypeConverterAttribute(TC) };
TypeDescriptor.AddAttributes(T, attr);
}
public static string ConvertToXaml(object ui)
{
var outstr = new System.Text.StringBuilder();
//this code need for right XML fomating
var settings = new System.Xml.XmlWriterSettings();
settings.Indent = true;
settings.OmitXmlDeclaration = true;
var writer = System.Xml.XmlWriter.Create(outstr, settings);
var dsm = new System.Windows.Markup.XamlDesignerSerializationManager(writer);
//this string need for turning on expression saving mode
dsm.XamlWriterMode = System.Windows.Markup.XamlWriterMode.Expression;
System.Windows.Markup.XamlWriter.Save(ui, dsm);
return outstr.ToString();
}
}
}
|
combined_dataset/train/non-malicious/2987.ps1
|
2987.ps1
|
Set-StrictMode -Version Latest
Describe "Module scope separation" {
Context "When users define variables with the same name as Pester parameters" {
$test = "This is a test."
It "does not hide user variables" {
$test | Should -Be 'This is a test.'
}
}
It "Does not expose Pester implementation details to the SUT" {
(Get-Item function:\ConvertTo-PesterResult -ErrorAction SilentlyContinue) | Should -Be $null
}
}
Describe "Executing test code inside a module" {
New-Module -Name TestModule {
function InternalFunction {
'I am the internal function'
}
function PublicFunction {
InternalFunction
}
Export-ModuleMember -Function PublicFunction
} | Import-Module -Force
It "Cannot call module internal functions, by default" {
{ InternalFunction } | Should -Throw
}
InModuleScope TestModule {
It "Can call module internal functions using InModuleScope" {
InternalFunction | Should -Be 'I am the internal function'
}
It "Can mock functions inside the module without using Mock -ModuleName" {
Mock InternalFunction { 'I am the mock function.' }
InternalFunction | Should -Be 'I am the mock function.'
}
}
It "Can execute bound ScriptBlock inside the module scope" {
$ScriptBlock = { Write-Output "I am a bound ScriptBlock" }
InModuleScope TestModule $ScriptBlock | Should -BeExactly "I am a bound ScriptBlock"
}
It "Can execute unbound ScriptBlock inside the module scope" {
$ScriptBlockString = 'Write-Output "I am an unbound ScriptBlock"'
$ScriptBlock = [ScriptBlock]::Create($ScriptBlockString)
InModuleScope TestModule $ScriptBlock | Should -BeExactly "I am an unbound ScriptBlock"
}
Remove-Module TestModule -Force
}
Describe "Get-ScriptModule behavior" {
Context "When attempting to mock a command in a non-existent module" {
It "should throw an exception" {
{
Mock -CommandName "Invoke-MyMethod" `
-ModuleName "MyNonExistentModule" `
-MockWith { write-host "my mock called!" }
} | Should Throw "No module named 'MyNonExistentModule' is currently loaded."
}
}
}
|
combined_dataset/train/non-malicious/2772.ps1
|
2772.ps1
|
Get-WmiObject win32_service | Select-Object Name, DisplayName, PathName, StartName, StartMode, State, TotalSessions, Description
|
combined_dataset/train/non-malicious/3283.ps1
|
3283.ps1
|
$platform = 'windows'
Add-Type -Path "$ModulePath/lib/$platform/Microsoft.ServiceBus.dll"
$factory = [Microsoft.ServiceBus.Messaging.MessagingFactory]::CreateFromConnectionString($connectionString)
$receiver = $factory.CreateMessageReceiver($QueueName, [Microsoft.ServiceBus.Messaging.ReceiveMode]::PeekLock)
$bindingFlags = [Reflection.BindingFlags] 'Public,Instance'
while (-not $receiver.IsClosed -and $ReceiverControl.ShouldRun) {
$msg = $receiver.ReceiveAsync($receiveTimeout).GetAwaiter().GetResult()
if ($msg) {
$receiver.CompleteAsync($msg.LockToken).GetAwaiter().GetResult() > $null
$stream = $msg.GetType().GetMethod('GetBody', $bindingFlags, $null, @(), $null).MakeGenericMethod([System.IO.Stream]).Invoke($msg, $null)
$streamReader = [System.IO.StreamReader]::new($stream)
$payload = $streamReader.ReadToEnd()
$streamReader.Dispose()
$stream.Dispose()
if (-not [string]::IsNullOrEmpty($payload)) {
$ReceiverMessages.Enqueue($payload) > $null
}
}
}
$receiver.Close()
|
combined_dataset/train/non-malicious/3224.ps1
|
3224.ps1
|
InModuleScope PoshBot {
describe 'Get-PoshBot' {
$script:botTracker = @{}
it 'Returns nothing if no jobs exist' {
Get-Poshbot | Should BeNullorEmpty
}
$guid1 = (New-Guid).ToString()
$guid2 = (New-Guid).ToString()
$script:botTracker.Add(1, @{
JobId = 1
Name = "PoshBot_$guid1"
State = 'Running'
InstanceId = $guid1
Config = [BotConfiguration]::new()
})
$script:botTracker.Add(2, @{
JobId = 1
Name = "PoshBot_$guid2"
State = 'Running'
InstanceId = $guid2
Config = [BotConfiguration]::new()
})
mock Get-Job { return 'Running' }
it 'Returns all running job instances' {
$j = Get-PoshBot
$j.Count | should be 2
}
it 'Returns a specific job instance' {
$j = Get-PoshBot -Id 1
$j | should not benullorempty
$j.Id | should be 1
}
it 'Accepts job IDs from the pipeline' {
$j = 1, 2 | Get-PoshBot
$j.Count | should be 2
}
}
}
|
combined_dataset/train/non-malicious/sample_53_30.ps1
|
sample_53_30.ps1
|
#
# Module manifest for module 'OCI.PSModules.Adm'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Adm.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Adm Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAdmRemediationRecipe',
'Get-OCIAdmApplicationDependencyRecommendationsList',
'Get-OCIAdmApplicationDependencyVulnerabilitiesList',
'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList',
'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList',
'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList',
'Get-OCIAdmStage', 'Get-OCIAdmStagesList',
'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList',
'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList',
'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList',
'Invoke-OCIAdmDeactivateRemediationRecipe',
'Move-OCIAdmKnowledgeBaseCompartment',
'Move-OCIAdmRemediationRecipeCompartment',
'Move-OCIAdmRemediationRunCompartment',
'Move-OCIAdmVulnerabilityAuditCompartment',
'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe',
'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit',
'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe',
'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit',
'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest',
'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe',
'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_30_14.ps1
|
sample_30_14.ps1
|
#
# Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance',
'Enable-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneAssignedSubscription',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList',
'Get-OCITenantmanagercontrolplaneAvailableRegionsList',
'Get-OCITenantmanagercontrolplaneDomain',
'Get-OCITenantmanagercontrolplaneDomainGovernance',
'Get-OCITenantmanagercontrolplaneDomainGovernancesList',
'Get-OCITenantmanagercontrolplaneDomainsList',
'Get-OCITenantmanagercontrolplaneLink',
'Get-OCITenantmanagercontrolplaneLinksList',
'Get-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneOrganization',
'Get-OCITenantmanagercontrolplaneOrganizationsList',
'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList',
'Get-OCITenantmanagercontrolplaneOrganizationTenancy',
'Get-OCITenantmanagercontrolplaneRecipientInvitation',
'Get-OCITenantmanagercontrolplaneRecipientInvitationsList',
'Get-OCITenantmanagercontrolplaneSenderInvitation',
'Get-OCITenantmanagercontrolplaneSenderInvitationsList',
'Get-OCITenantmanagercontrolplaneSubscription',
'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneSubscriptionMapping',
'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList',
'Get-OCITenantmanagercontrolplaneSubscriptionsList',
'Get-OCITenantmanagercontrolplaneWorkRequest',
'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList',
'Get-OCITenantmanagercontrolplaneWorkRequestLogsList',
'Get-OCITenantmanagercontrolplaneWorkRequestsList',
'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer',
'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation',
'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer',
'New-OCITenantmanagercontrolplaneChildTenancy',
'New-OCITenantmanagercontrolplaneDomain',
'New-OCITenantmanagercontrolplaneDomainGovernance',
'New-OCITenantmanagercontrolplaneSenderInvitation',
'New-OCITenantmanagercontrolplaneSubscriptionMapping',
'Receive-OCITenantmanagercontrolplaneRecipientInvitation',
'Remove-OCITenantmanagercontrolplaneDomain',
'Remove-OCITenantmanagercontrolplaneDomainGovernance',
'Remove-OCITenantmanagercontrolplaneGovernance',
'Remove-OCITenantmanagercontrolplaneLink',
'Remove-OCITenantmanagercontrolplaneOrganizationTenancy',
'Remove-OCITenantmanagercontrolplaneSubscriptionMapping',
'Restore-OCITenantmanagercontrolplaneOrganizationTenancy',
'Stop-OCITenantmanagercontrolplaneSenderInvitation',
'Update-OCITenantmanagercontrolplaneDomain',
'Update-OCITenantmanagercontrolplaneDomainGovernance',
'Update-OCITenantmanagercontrolplaneOrganization',
'Update-OCITenantmanagercontrolplaneRecipientInvitation',
'Update-OCITenantmanagercontrolplaneSenderInvitation'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_25_88.ps1
|
sample_25_88.ps1
|
# region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.LoadTesting.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.LoadTesting.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBaWoj2GaqA3sEg
# DeQHQxTO2s51DyS8tZKHBpFhEL1m6qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMi+Otxs1yJQ7MSJIwvMITtm
# iwnfmWafmRxlNXSIfwViMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAgoHi92lK5E7ylJHWYB8SWruQGa3zzloMd23bmwM0VEewqGBW3PAEssRf
# oQvpw6B2KWmvxtaBD3qUD+gtVZmHpDyW20kW/n7/W1SrKgtjETiVuY1DwviiONTN
# AWy3pYxiWuyrVZH5UNdFvN+eHZNg44TuJZI7jU96zEvphEMz8xHuFPXLQw+y2sFC
# uOlubFtHzZOM7KyWjn2NQHRHQoE93DedHOCwjbZhd5Bq1VGzJOX8EdMNolnrbDKh
# 9C3l1xGaY1kVcNWrbJFQs6nos31deGBHH8PgT1Znub4N2/0H71xBilA/zhFktJ/k
# 1bwVtGZzMbuZKueiFPKjoRleFEq7jKGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCNNxyz2ep9PuzxUoSx9nsXJPCHdbh9tMfiUvY4v22z+gIGZh/+xT8N
# GBIyMDI0MDQyMzEzMTUyMS4yNFowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAd1dVx2V1K2qGwABAAAB3TANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA3MDlaFw0yNTAxMTAxOTA3MDlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC
# Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqE4DlETqLnecdREfiWd8oun7
# 0m+Km5O1y1qKsLExRKs9LLkJYrYO2uJA/5PnYdds3aDsCS1DWlBltMMYXMrp3Te9
# hg2sI+4kr49Gw/YU9UOMFfLmastEXMgcctqIBqhsTm8Um6jFnRlZ0owKzxpyOEdS
# Z9pj7v38JHu434Hj7GMmrC92lT+anSYCrd5qvIf4Aqa/qWStA3zOCtxsKAfCyq++
# pPqUQWpimLu4qfswBhtJ4t7Skx1q1XkRbo1Wdcxg5NEq4Y9/J8Ep1KG5qUujzyQb
# upraZsDmXvv5fTokB6wySjJivj/0KAMWMdSlwdI4O6OUUEoyLXrzNF0t6t2lbRsF
# f0QO7HbMEwxoQrw3LFrAIS4Crv77uS0UBuXeFQq27NgLUVRm5SXYGrpTXtLgIqyp
# HeK0tP2o1xvakAniOsgN2WXlOCip5/mCm/5hy8EzzfhtcU3DK13e6MMPbg/0N3zF
# 9Um+6aOwFBCQrlP+rLcetAny53WcdK+0VWLlJr+5sa5gSlLyAXoYNY3n8pu94WR2
# yhNUg+jymRaGM+zRDucDn64HFAHjOWMSMrPlZbsEDjCmYWbbh+EGZGNXg1un6fvx
# yACO8NJ9OUDoNgFy/aTHUkfZ0iFpGdJ45d49PqEwXQiXn3wsy7SvDflWJRZwBCRQ
# 1RPFGeoYXHPnD5m6wwMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRuovW2jI9R2kXL
# IdIMpaPQjiXD8TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEALlTZsg0uBcgdZsxy
# pW5/2ORRP8rzPIsG+7mHwmuphHbP95o7bKjU6hz1KHK/Ft70ZkO7uSRTPFLInUhm
# SxlnDoUOrrJk1Pc8SMASdESlEEvxL6ZteD47hUtLQtKZvxchmIuxqpnR8MRy/cd4
# D7/L+oqcJBaReCGloQzAYxDNGSEbBwZ1evXMalDsdPG9+7nvEXFlfUyQqdYUQ0nq
# 6t37i15SBePSeAg7H/+Xdcwrce3xPb7O8Yk0AX7n/moGTuevTv3MgJsVe/G2J003
# l6hd1b72sAiRL5QYPX0Bl0Gu23p1n450Cq4GIORhDmRV9QwpLfXIdA4aCYXG4I7N
# OlYdqWuql0iWWzLwo2yPlT2w42JYB3082XIQcdtBkOaL38E2U5jJO3Rh6EtsOi+Z
# lQ1rOTv0538D3XuaoJ1OqsTHAEZQ9sw/7+91hSpomym6kGdS2M5//voMCFXLx797
# rNH3w+SmWaWI7ZusvdDesPr5kJV2sYz1GbqFQMEGS9iH5iOYZ1xDkcHpZP1F5zz6
# oMeZuEuFfhl1pqt3n85d4tuDHZ/svhBBCPcqCqOoM5YidWE0TWBi1NYsd7jzzZ3+
# Tsu6LQrWDwRmsoPuZo6uwkso8qV6Bx4n0UKpjWwNQpSFFrQQdRb5mQouWiEqtLsX
# CN2sg1aQ8GBtDOcKN0TabjtCNNswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2
# REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQA2I0cZZds1oM/GfKINsQ5yJKMWEKCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6dG9BDAiGA8yMDI0MDQyMzEyNTIyMFoYDzIwMjQwNDI0MTI1MjIwWjB0MDoGCisG
# AQQBhFkKBAExLDAqMAoCBQDp0b0EAgEAMAcCAQACAgf/MAcCAQACAhIoMAoCBQDp
# 0w6EAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAS0Al/1BBSR+eNqRakD9Z
# Mnizn13XJ13VgK7R2iJDvMqu2D589do75Sdx4MAET3umA9p1Deq70rSKSbVz9wxZ
# p/oXJHe3vN57c/CwQZOTYI8hTAsJisxqy6sRJgLKSOZzKjlp6KaxVVFIKvfq2dlh
# kt4PikTMOzqEDFtsx8OXbqcxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCBKFyr+EGKs0r/SjsW1igJ2LhMrKPO0kay1ydMMx6NZpjCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rAMWNm
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd
# ldStqhsAAQAAAd0wIgQg6ZUc0hmsCulGJPGt76i39JwatJGmMD0EVHaRkkCg5oAw
# DQYJKoZIhvcNAQELBQAEggIACvRH2bYiHP0Dpgd4JymZ5Eibexdm7zPaDkeyoXpt
# 0rc8dOSG0aahBtoKQqexDBY/a7Ih+ip2U8/mBq5DFMsRw5Vm01EnAxR2ZOvyyzay
# wY7PRWxdTVsEtL1n09lLzqJYBlarREz7eFPNwc3X6sQJP5edhwzffRUCi5YizuAp
# 2sGtUyrXNWm1Ou7OKWWJtb8dmKhRos7aNnzgQBIY40mD1YZCOtrTbWeZEPCY2Dwn
# ZQssx9Mc5TLvaMM8OXKRHS8QCWlKJFCasdlQYkU0An5JSg2iwWyiPQ+avF+cr8mL
# sCQ8BuWWqwax7FyzOGLnDqAoqdwkGaKjUx/EWLvinz0vBKfHuZddFUqVze/RqAnZ
# ycCoIk3F75l3aoI7FILE7KTMy0c3oN+rBC9/xOXN/8n+x2Y3MSuQULCO851j/AMw
# OlDaTi1zLgpWbIaeHnOoFZJbjqaMB2AE2NOVT4aMuqo7zj/IowHJWp/DWH7htSgI
# EW7h8jvsHsJfEGXFYOpfPUXgxV0unbKeWxoS2HntTwKqOjB7SYoKjhJRGcyJFyO/
# U7q4n0k8JbHr8inXcO/nVGRGGoqC9JsbehSX4O2OAiKDmmrECIfvItffnllF2VV1
# JiIXrTzwTAk5UGNCFdsNQMeRkfVmoFUis0S4ZDuCU0rvlPfLptm4k3P++S0gaSUP
# DCo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/825cfd12-39f8-4fa2-9843-880b0ab0e880.ps1
|
825cfd12-39f8-4fa2-9843-880b0ab0e880.ps1
|
$Raw = Whoami /groups
$Groups = $Raw | ?{ $_ -match "Enabled Group" } | %{$_.Split(" ,")[0] } | ?{ $_ -like "*\\*" }| Sort
$Groups
|
combined_dataset/train/non-malicious/sample_38_48.ps1
|
sample_38_48.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIImAQYJKoZIhvcNAQcCoIIl8jCCJe4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa
# BDCCGgACAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji
# Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2
# 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s
# NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9
# kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61
# /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC
# F5MwghePBgorBgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x
# 6jeF/KW0L7vYOjGQhAzBRAIGZWiuFmGYGBIyMDIzMTIxMzE5MTkwMS41M1owBIAC
# AfSggdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo3RjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB1akC
# z8WnyelaAAEAAAHVMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTIzMDUyNTE5MTIzMFoXDTI0MDIwMTE5MTIzMFowgcsxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jv
# c29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo3RjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMV9qTns6mH2
# +7G2WgAGItzp6dP7IofrX1v46EZ2TKGA3ORfzQpQYj+MSo5UxXhKq39Q8UWJ3Ha3
# u/ZIROPa0DO5Uq0N+rYcGm7zS9nS/JAPJ1W3gwMvi0lIqqBih8LEMgGtbMkmOAGi
# Up04nHW63ZPI5z5Q6bt73a1U8emN2D46Z/fVMtR/+ii7IA4n8iefaKHcBI/RBib4
# AVCOFgM0O7y7Mx3AcXlB3Cyxw1r09VIZ50t0Muj2MvoOg8Xg1ijTqW+8RC5In0ib
# Bl8EYvL/yGkTtEPh7C8kqYzX63p5C4SxNeOsYzZaORbXxKBRnyf5Wkva6ToCEOQJ
# rfnkjnfWnQmSqmiift0e4tR1lJA7jSqZUhDqpAJqe8iZOqY2AT+s8nSuCvSEw8j+
# 5HVP+JovSYSrhupqT7exrwj4UBg4j88LtX7MR6T6x3Ja1pf6d1saW/9ElvmZBoaf
# w26duR+8cPVC3kPSua0w56RgyrtCNioTcUQ//ABjhMO4nGy2OxrYdeLbJQMSDgwk
# vr8m+xBdOg5n4jFHopPm3l8HkWllgGlUsyZrembnPpVe+Retizfc1cmpVYvCKzBr
# s1QVXzsSzayi70h3DfIBmYchhaA5D4MhjWdjdobkM4OLA3WsnIRv6ZtYNqCt1XFy
# dyvpQoo7j16g1NcRb6xxR/obBcbQoTKZAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU
# r9Bco07flsEw7PdHmCJfsCVrY5owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo
# MSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5t
# aWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
# JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAK
# BggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAGZF
# 12q9C7KNGnHQcbG86p98WtuAUCDSPza/S/tH7/xrvRLZXi3vIpgpKxAYjqm+3UDw
# kaa5nKOYhebDbcCQjltmTG9KDCzyusG0nD29qQRyRxYVBvskbpvrXzHSz1DcMvR1
# GrjpBlGebtTrbfiV5y+Oy0CjDfR0/ROchpw9Yqk9zdCAH5YOeCU3Z91PWu5DpYhU
# F6eamOkb3KlEA0pTHk1Fyl0kBBbYWoQdNLc21v7S0KoiQ0cnloWwXp6FGi9ZmnQx
# gjP1ukkeLHRWuN0tUw6l7vC/ra33QTdSsTYqZXClDnCwwPphSxygKxJFBmsDkBvB
# M4Jkml4bbPe8Oj+G688rxN5MnYu278i1eDEiUg5Cn+1scCI3xem3D8mYhmD151D8
# WINogjAblgex+ba7tPA4XJ3o6ovDXxnmP8i8M/OWTBYnGTpEckXl1Lizd+fIvDcM
# cF7kNq/opgHifzH9wSYP9Hjj/yBLk9+4bWyuMt3LIa3KHQqJENKaPD59ruLVU+h6
# aJ0NY1nuSw1p0xp3hmgO+CSo5XgDpr43wchz8/qDSKut7MtZSBspdI3yIf1E/5Yk
# XHl8EcTgAXGtsBRDZmfmMOYcAjfBhxAOecRg/nUDvlYXA+y8Gt+tvX7prV+5MQfU
# Bh044zLx9fzEqjQTRiz7tvEi8U+xSlLN8WMGiWaHMIIHcTCCBVmgAwIBAgITMwAA
# ABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3Qg
# Q2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAw
# OTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJ
# KoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6c
# BwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN
# E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8
# OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6O
# U8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6
# BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75x
# qRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrb
# qn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XY
# cz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK
# 12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJR
# XRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnG
# rnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsG
# AQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe
# Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/Bggr
# BgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1Jl
# cG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQM
# HgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1Ud
# IwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0
# dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKG
# Pmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0
# XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEk
# W+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zR
# oZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1
# AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthIS
# EV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4s
# a3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32
# THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMB
# V0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5P
# ndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUx
# UYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi
# 6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6C
# baUFEMFxBmoQtB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3Nv
# ZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046
# N0YwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WiIwoBATAHBgUrDgMCGgMVAE4SL5L9lUV7rDUh3fWboqB7bqU0oIGDMIGA
# pH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQAC
# BQDpJE8sMCIYDzIwMjMxMjEzMTU0MTMyWhgPMjAyMzEyMTQxNTQxMzJaMHQwOgYK
# KwYBBAGEWQoEATEsMCowCgIFAOkkTywCAQAwBwIBAAICJeQwBwIBAAICE6gwCgIF
# AOkloKwCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC
# AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAcK8mQuIMpy4AoVrt
# IfD1X78yPGmmHfQuodurX53LBjYOslC9JYB+KmDe5uEuRSfngwUpOlJjbvlmztlB
# KgohgDwwd8kUltSYXsRKIzman4j+zYfarp/jMmInzuCEmWfnybDOcHORltQVab7X
# 8FX/PYaJtpEdJYBdN3YQNCH8Alh2FPKHc77JDaQhoGwCncNNL6B1ZB07HULieKkr
# 1uU4jdxFI49mkzBZJnZPBu+lU5ykEmgqXagWPkqXrOOu3ev1D5Z4+RUbMgFyUl51
# hlDjNRexu9/75lt0ZWoF5uyoEQ80nFr91LjWzxJkffQsYofY9qHKwZ6PdDbWWQwR
# ufaGWzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# AhMzAAAB1akCz8WnyelaAAEAAAHVMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG
# 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIOv/wKxgPa2cI+kk
# SW6tg0oXF/pOHJPNksYGdbsE5o1uMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCB
# vQQg2b8jhgzXrokwzsQohxi+VxuvYIeMoLQtQ6alkhsGwf8wgZgwgYCkfjB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdWpAs/Fp8npWgABAAAB1TAi
# BCBmO7XI5g/v3PYm8D1pNymZQKpuV8ETlloPXOQI1GtkvzANBgkqhkiG9w0BAQsF
# AASCAgBlW/JAarWqpfbSQWfEhiW0w0FBAPLg64TDG30Z1T/HZVKxZ3VDll5laugz
# ZjOsBXS22En5ymAab+iwev5NLBRaG0LHN+L41Uq8bW1zTms7QEVs5DJu6m0vBQpH
# QcHgjv8LVVxZjDKXE19WofcagYBIO2UY8CLlKDg7emmNm6asmxMP3awlFHCqEnGH
# B+9w5mxgEJ5df1d0jLpjsYMb6kNYh2Uzm3rnZdvnafY4/PPlLTibWm2PnH7uMvKp
# t5oZoIUknq0d+pQ729UmwmIKNcX9diF1P8difKCpZOr9lCQzejGP0a6M7pnM+R3N
# zXqszQrppw7iJakokI1ggMZOYzTX4y8hp6SD9Zwc1FmwdrrJyZF3ZHL/6EzON1LR
# ucWZLWPKoRYWzU4m3D2IPJCyIVGE8Wcw4pj92p+tIVj8dgLf0kjH3645B4RxiopC
# vv585GTYcD9D1j7IzxMEThmxNzaiZ3Fb5qwbQ6Vyfrl8JQvLkBXEiwzOWQKnlWO+
# 0zTcStUHvdpyDdRb0RdIo5I/POeSN5qcz32dUfltQkdtieO08FX/boOEURGabsoB
# xp85cF32IMWYzINR/KVuIxVRkM287YMcQRtLvN44FxUmHYZcSG1GtCCHUTVXHtsH
# E4Km9tkmFvmcPqyV+yFWpxpSX57d5MNxw+XElTzMzgF/NCOEnw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/1651.ps1
|
1651.ps1
|
c:
cd\
Get-ChildItem -Path $PSScriptRoot\*.ps1 | ? name -NotMatch 'Microsoft.PowerShell_profile' | Foreach-Object { . $_.FullName }
$env:path = @(
$env:path
'C:\Program Files (x86)\Notepad++\'
'C:\Users\admin\AppData\Local\GitHub\PortableGit_c7e0cbde92ba565cb218a521411d0e854079a28c\cmd'
'C:\Users\admin\AppData\Local\GitHub\PortableGit_c7e0cbde92ba565cb218a521411d0e854079a28c\usr\bin'
'C:\Users\admin\AppData\Local\GitHub\PortableGit_c7e0cbde92ba565cb218a521411d0e854079a28c\usr\share\git-tfs'
'C:\Users\admin\AppData\Local\Apps\2.0\C31EKMVW.15A\TWAQ6XY3.BAX\gith..tion_317444273a93ac29_0003.0000_328216539257acd4'
'C:\Users\admin\AppData\Local\GitHub\lfs-amd64_1.1.0;C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319'
) -join ';'
Update-TypeData "$PSScriptRoot\My.Types.Ps1xml"
function Out-Default {
if ($input.GetType().ToString() -ne 'System.Management.Automation.ErrorRecord') {
try {
$input | Tee-Object -Variable global:lastobject | Microsoft.PowerShell.Core\Out-Default
} catch {
$input | Microsoft.PowerShell.Core\Out-Default
}
} else {
$input | Microsoft.PowerShell.Core\Out-Default
}
}
function gj { Get-Job | select id, name, state | ft -a }
function sj ($id = '*') { Get-Job $id | Stop-Job; gj }
function rj { Get-Job | ? state -match 'comp' | Remove-Job }
function Test-Administrator {
$user = [Security.Principal.WindowsIdentity]::GetCurrent()
(New-Object Security.Principal.WindowsPrincipal $user).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
}
function Start-PsElevatedSession {
if (!(Test-Administrator)) {
if ($host.Name -match 'ISE') {
start PowerShell_ISE.exe -Verb runas
} else {
start powershell -Verb runas -ArgumentList $('-noexit ' + ($args | Out-String))
}
} else {
Write-Warning 'Session is already elevated'
}
}
Set-Alias -Name su -Value Start-PsElevatedSession
function Elevate-Process {
$file, [string]$arguments = $args
$psi = new-object System.Diagnostics.ProcessStartInfo $file
$psi.Arguments = $arguments
$psi.Verb = 'runas'
$psi.WorkingDirectory = Get-Location
[System.Diagnostics.Process]::Start($psi)
}
Set-Alias sudo Elevate-Process
function Get-Excuse {
(Invoke-WebRequest http://pages.cs.wisc.edu/~ballard/bofh/excuses -OutVariable excuses).content.split([Environment]::NewLine)[(get-random $excuses.content.split([Environment]::NewLine).count)]
}
function fourdigitpw {
$fpw = 1111
while ($fpw -split '' | ? {$_} | group | ? count -gt 1) {
$fpw = -join(1..4 | % {Get-Random -Minimum 0 -Maximum 10})
}
$fpw
}
function rpw {
$pw = ''
while (($pw -split '' | ? {$_} | group).count -ne 8) {
$pw = -join$($([char](65..90|Get-Random));$(1..3|%{[char](97..122|Get-Random)});$(1..4|%{0..9|Get-Random}))
}
$pw
}
function ej ([switch]$more) {
$count = 0
if ($more) {
$drives = [io.driveinfo]::getdrives() | ? {$_.drivetype -notmatch 'Network' -and !(dir $_.name users -ea 0)}
} else {
$drives = [io.driveinfo]::getdrives() | ? {$_.drivetype -match 'Removable' -and $_.driveformat -match 'fat32'}
}
if ($drives) {
write-host $($drives | select name, volumelabel, drivetype, driveformat, totalsize | ft -a | out-string)
$letter = Read-Host "Drive letter ($(if ($drives.count -eq 1) {$drives} else {'?'}))"
if (!$letter) {$letter = $drives.name[0]}
$eject = New-Object -ComObject Shell.Application
$eject.Namespace(17).ParseName($($drives | ? name -Match $letter)).InvokeVerb('Eject')
}
}
function py { . C:\Users\admin\AppData\Local\Programs\Python\Python35-32\python.exe }
$PSLogPath = ("{0}\Documents\WindowsPowerShell\log\{1:yyyyMMdd}-{2}.log" -f $env:USERPROFILE, (Get-Date), $PID)
if (!(Test-Path $(Split-Path $PSLogPath))) { md $(Split-Path $PSLogPath) }
Add-Content -Value "
Add-Content -Value "
function prompt {
$LastCmd = Get-History -Count 1
if ($LastCmd) {
$lastId = $LastCmd.Id
Add-Content -Value "
Add-Content -Value "$($LastCmd.CommandLine)" -Path $PSLogPath
Add-Content -Value '' -Path $PSLogPath
$howlongwasthat = $LastCmd.EndExecutionTime.Subtract($LastCmd.StartExecutionTime).TotalSeconds
}
$MajorVersion = $PSVersionTable.PSVersion.Major
$MinorVersion = $PSVersionTable.PSVersion.Minor
if ([System.IntPtr]::Size -eq 8) {
$ShellBits = 'x64 (64-bit)'
} elseif ([System.IntPtr]::Size -eq 4) {
$ShellBits = 'x86 (32-bit)'
}
$host.UI.RawUI.WindowTitle = "PowerShell v$MajorVersion.$MinorVersion $ShellBits | $env:USERNAME@$env:USERDNSDOMAIN | $env:COMPUTERNAME | $env:LOGONSERVER"
Write-Host(Get-Date -UFormat "%Y/%m/%d %H:%M:%S ($howlongwasthat) | ") -NoNewline -ForegroundColor DarkGreen
Write-Host(Get-Location) -ForegroundColor DarkGreen
if (Test-Administrator) {
Write-Host '
} else {
Write-Host '
}
Write-Host '»' -NoNewLine -ForeGroundColor Green
' '
}
function lunch {
sleep 3000
Write-Host •
MessageBox clock in
}
function wimi {
((iwr http://www.realip.info/api/p/realip.php).content | ConvertFrom-Json).IP
}
function java {
param (
[switch]$download
)
if ($download) {
$page = iwr http://java.com/en/download/windows_offline.jsp
$version = $page.RawContent -split "`n" | ? {$_ -match 'recommend'} | select -f 1 | % {$_ -replace '^[^v]+| \(.*$'}
$link = $page.links.href | ? {$_ -match '^http.*download'} | select -f 1
iwr $link -OutFile "c:\temp\Java $version.exe"
} else {
$(iwr http://java.com/en/download).Content.Split("`n") | ? {$_ -match 'version'} | select -f 1
}
}
|
combined_dataset/train/non-malicious/sample_15_14.ps1
|
sample_15_14.ps1
|
@{
GUID="{Fb6cc51d-c096-4b38-b78d-0fed6277096a}"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
RootModule="Microsoft.Management.Infrastructure.CimCmdlets"
RequiredAssemblies="Microsoft.Management.Infrastructure.CimCmdlets.dll","Microsoft.Management.Infrastructure.Dll"
FunctionsToExport = @()
CmdletsToExport= "Get-CimAssociatedInstance", "Get-CimClass", "Get-CimInstance", "Get-CimSession", "Invoke-CimMethod",
"New-CimInstance","New-CimSession","New-CimSessionOption","Register-CimIndicationEvent","Remove-CimInstance",
"Remove-CimSession","Set-CimInstance",
"Export-BinaryMiLog","Import-BinaryMiLog"
AliasesToExport = "gcim","scim","ncim", "rcim","icim","gcai","rcie","ncms","rcms","gcms","ncso","gcls"
HelpInfoUri="https://aka.ms/powershell72-help"
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVr9wtf0/6ef8P
# 7Oewmh6e4caAvboErstvAWik/E+xjqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIICntVmvnX2L67tr4qUz8bO/
# btN9gTrVPwly8+vDQWLNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqrp+HA+1Tc4ckT9CawnN3TgDg8wLX6bBLqDG4GRQ6AqpYUMeWnTLq7UC
# 15hai8Y/NMKI9M5woKAbrzYRt1NrXoKNFdMAo+uIJ223H42xijPTaM7Om6hwofXB
# nUgnNoHxN6HfaNmQgK8kPIjgr8qRTx9iaiiYYmo5ZxdD93vI9sWMNcdz8gh0+iQe
# 3KYh1CGJlRqVcViXStkGlmMah4IsmEXzoDENH5g+D/eGHVQkF2jmDrMd7IZnIeyx
# 7uQKG4e4jST27lsZ3jXeHHw1+xHKW/YKopB0eDuSIGaBNt/Ddp1pWXY+Uc/wSU80
# Hw08j8KeNUNQZqykrOkxjgYsv8a9BKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBoL6sie9laNs0LLxXBrbeDVU9bNXjvB6bMmwMpi5IRNwIGZh/SidLh
# GBMyMDI0MDQyMzAyMjQwOS40NjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA
# 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9
# 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i
# 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm
# CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgVVpok5wqBEAWxFJ9ul1y14t1nQoKSF0X+2VHpCosKNswgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi
# MA0GCSqGSIb3DQEBCwUABIICAKXcU1w3FYhoUndr7qalrwnoRAt3IU9bUic58WVF
# Gw/tovcu4G/9jJLFFSMlEKDbD5PEuidyiKM2S3OTxRgF805Q0UDQsE9buPZa+7zp
# OvSk+wZytPADPv+pL/0k5hZHim678iX8sIJ6Mf6x58Z/ndOaybZLjkTR62NWcQEq
# Iz39bbCBBWY1Ho9njcrd2zVcIu4HZwix5qXjt2imr8xuXiVI15onxT8256jSh5ax
# SL+W0kEwe3sAHyLOOh34MxLW7K7DJwr9fjL45HdCBo6nHeTIVMUrkVmAWhWp568v
# jIKh/DQICdbWdTmKoU4g+Uv4TW2zJeu/VLTVQ2Q2Ub5wZ5P9tcqthN59ftbzlJRF
# F4JojH3NlV507OmVfA4JIQ+Jz9RFJyQydNGK+JAEHY615czUnsdOdxtyYbeRbaDW
# OY/PUPRSBaVNGhzfK3BxgYLf7ZjNWfBp/+s3hks3lUHBGZSli5aNceLg9R3EMKyI
# XSNELZqPYTak5C16L7CUZKqP5V6+Z2ChRGoPhDFJq2mefJpQnEwqqF8bKtE6O/WW
# Lx5oZoic5kjTGOdTORjwrUpIpKCztnjJNd3+Ii/rcSSoYS5UI7t5dcqBJqZ+7I/k
# 8fadYse1zm4CcN/WapY7Hh+xvMIzwkImwhx1bVBG/EY1IdG8Ggjfg9tO2JuvyScy
# OuFF
# SIG # End signature block
|
combined_dataset/train/non-malicious/4189.ps1
|
4189.ps1
|
Set-Variable -Name ApplicationName -Scope Global -Force
Set-Variable -Name MSI -Scope Global -Force
Set-Variable -Name ProductCode -Scope Global -Force
function Get-RelativePath {
Set-Variable -Name RelativePath -Scope Local -Force
$RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
Return $RelativePath
Remove-Variable -Name RelativePath -Scope Local -Force
}
function Get-Architecture {
Set-Variable -Name Architecture -Scope Local -Force
$Architecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
$Architecture = $Global:Architecture.OSArchitecture
Return $Architecture
Remove-Variable -Name Architecture -Scope Local -Force
}
function ProcessTextFiles {
Set-Variable -Name RelativePath -Scope Local -Force
If ((Test-Path -Path $RelativePath"Installer.log") -eq $true) {
Remove-Item -Path $RelativePath"Installer.log" -Force
}
If ((Test-Path -Path $RelativePath"UserInput.txt") -eq $true) {
Remove-Item -Path $RelativePath"UserInput.txt" -Force
}
If ((Test-Path -Path $RelativePath"Report.txt") -eq $true) {
Remove-Item -Path $RelativePath"Report.txt" -Force
}
Remove-Variable -Name RelativePath -Scope Local -Force
}
function Get-MSIFile {
Set-Variable -Name FileCount -Value 1 -Scope Local -Force
Set-Variable -Name MSIFile -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
$RelativePath = Get-RelativePath
$MSIFile = Get-ChildItem $RelativePath -Filter *.msi
Write-Host $MSIFile.Count
If ($MSIFile.Count -eq 1) {
Return $MSIFile
} else {
Do {
Clear-Host
$FileCount = 1
Write-Host "Select MSI to process:"
foreach ($MSI in $MSIFile) {
Write-Host $FileCount" - "$MSI
$FileCount++
}
Write-Host
Write-Host "Selection:"
[int]$input = Read-Host
} while (($input -eq $null) -or ($input -eq "") -or ($input -gt $MSIFile.Count) -or (!($input -as [int] -is [int])))
$input = $input - 1
$MSIFile = $MSIFile[$input]
$global:MSI = $RelativePath + $MSIFile
}
Remove-Variable -Name FileCount -Scope Local -Force
Remove-Variable -Name MSIFile -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
}
function Get-MSIFileInfo {
param (
[parameter(Mandatory = $true)][IO.FileInfo]
$Path,
[parameter(Mandatory = $true)][ValidateSet("ProductCode", "ProductVersion", "ProductName")][string]
$Property
)
Set-Variable -Name MSIDatabase -Scope Local -Force
Set-Variable -Name Query -Scope Local -Force
Set-Variable -Name Record -Scope Local -Force
Set-Variable -Name Value -Scope Local -Force
Set-Variable -Name View -Scope Local -Force
Set-Variable -Name WindowsInstaller -Scope Local -Force
try {
$WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer
$MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($Path.FullName, 0))
$Query = "SELECT Value FROM Property WHERE Property = '$($Property)'"
$View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null)
$Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1)
return $Value
} catch {
Write-Output $_.Exception.Message
}
Remove-Variable -Name MSIDatabase -Scope Local -Force
Remove-Variable -Name Query -Scope Local -Force
Remove-Variable -Name Record -Scope Local -Force
Remove-Variable -Name Value -Scope Local -Force
Remove-Variable -Name View -Scope Local -Force
Remove-Variable -Name WindowsInstaller -Scope Local -Force
}
function New-UserInputFile {
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
$RelativePath = Get-RelativePath
If ((Test-Path -Path $RelativePath"UserInput.txt") -eq $true) {
Remove-Item -Path $RelativePath"UserInput.txt" -Force
}
Write-Host "Creating UserInput.txt File....." -NoNewline
$ErrCode = New-Item -Path $RelativePath"UserInput.txt" -Type File -Force
If ((Test-Path -Path $RelativePath"UserInput.txt") -eq $true) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
}
function Install-MSI {
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name Executable -Scope Local -Force
Set-Variable -Name MSI -Scope Local -Force
Set-Variable -Name Parameters -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name Switches -Scope Local -Force
$RelativePath = Get-RelativePath
$Global:ApplicationName = Get-MSIFileInfo -Path $global:MSI -Property 'ProductName'
$Global:ProductCode = Get-MSIFileInfo -Path $global:MSI -Property 'ProductCode'
If ((Test-Path -Path $RelativePath"Installer.log") -eq $true) {
Remove-Item -Path $RelativePath"Installer.log" -Force
}
$Executable = $Env:windir + "\system32\msiexec.exe"
$Switches = "/qb- /norestart"
$Parameters = "/x" + [char]32 + $Global:ProductCode + [char]32 + $Switches
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
Write-Host "Uninstalling"$Global:ApplicationName"....." -NoNewline
if (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
$Notepad = $env:windir + "\notepad.exe"
$Parameters = $RelativePath + "UserInput.txt"
$ErrCode = (Start-Process -FilePath $Notepad -ArgumentList $Parameters -PassThru).ExitCode
$Switches = "/norestart"
$Parameters = "/i " + [char]34 + $Global:MSI + [char]34 + [char]32 + $Switches + [char]32 + "/lvx " + [char]34 + $RelativePath + "Installer.log" + [char]34
Write-Host $Parameters
Write-Host "Installing"$Global:ApplicationName"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
if (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
Write-Host "Creating Log File....." -NoNewline
If ((Test-Path $RelativePath"Installer.log") -eq $true) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name Executable -Scope Local -Force
Remove-Variable -Name MSI -Scope Local -Force
Remove-Variable -Name Parameters -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name Switches -Scope Local -Force
}
function Uninstall-MSI {
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name Executable -Scope Local -Force
Set-Variable -Name Line -Scope Local -Force
Set-Variable -Name LogFile -Scope Local -Force
Set-Variable -Name MSI -Scope Local -Force
Set-Variable -Name Parameters -Scope Local -Force
Set-Variable -Name Process -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name Switches -Scope Local -Force
$RelativePath = Get-RelativePath
$Process = Get-Process -Name notepad -ErrorAction SilentlyContinue
If ($Process -ne $null) {
Stop-Process -Name notepad -ErrorAction SilentlyContinue -Force
}
$Executable = $Env:windir + "\system32\msiexec.exe"
$Switches = "/qb- /norestart"
$Parameters = "/x" + [char]32 + $Global:ProductCode + [char]32 + $Switches
Write-Host "Uninstalling"$Global:ApplicationName"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
if (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name Executable -Scope Local -Force
Remove-Variable -Name Line -Scope Local -Force
Remove-Variable -Name LogFile -Scope Local -Force
Remove-Variable -Name MSI -Scope Local -Force
Remove-Variable -Name Parameters -Scope Local -Force
Remove-Variable -Name Process -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name Switches -Scope Local -Force
}
function Get-ProductName {
Set-Variable -Name Database -Scope Local -Force
Set-Variable -Name MSIFileName -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
Set-Variable -Name PropertyName -Scope Local -Force
Set-Variable -Name PropertyValue -Scope Local -Force
Set-Variable -Name Record -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name View -Scope Local -Force
Set-Variable -Name WindowsInstaller -Scope Local -Force
$RelativePath = Get-RelativePath
$MSIFileName = $global:MSI
$OutputFile = $RelativePath + "Report.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "Product Name"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "------------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$WindowsInstaller = New-Object -com WindowsInstaller.Installer
$Database = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($MSIFileName, 0))
$View = $Database.GetType().InvokeMember("OpenView", "InvokeMethod", $Null, $Database, ("SELECT * FROM Property"))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $Null, $View, $Null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
while ($Record -ne $Null) {
$PropertyName = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 1)
[string]$PropertyValue = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 2)
IF ($PropertyName -like "*ProductName*") {
$Output = $PropertyValue
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
}
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
}
Remove-Variable -Name Database -Scope Local -Force
Remove-Variable -Name MSIFileName -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
Remove-Variable -Name PropertyName -Scope Local -Force
Remove-Variable -Name PropertyValue -Scope Local -Force
Remove-Variable -Name Record -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name View -Scope Local -Force
Remove-Variable -Name WindowsInstaller -Scope Local -Force
}
function Get-ProductCode {
Set-Variable -Name Database -Scope Local -Force
Set-Variable -Name MSIFileName -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
Set-Variable -Name PropertyName -Scope Local -Force
Set-Variable -Name PropertyValue -Scope Local -Force
Set-Variable -Name Record -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name View -Scope Local -Force
Set-Variable -Name WindowsInstaller -Scope Local -Force
$RelativePath = Get-RelativePath
$MSIFileName = $global:MSI
$OutputFile = $RelativePath + "Report.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "Product Code"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "------------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$WindowsInstaller = New-Object -com WindowsInstaller.Installer
$Database = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($MSIFileName, 0))
$View = $Database.GetType().InvokeMember("OpenView", "InvokeMethod", $Null, $Database, ("SELECT * FROM Property"))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $Null, $View, $Null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
while ($Record -ne $Null) {
$PropertyName = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 1)
[string]$PropertyValue = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 2)
IF ($PropertyName -like "*ProductCode*") {
$Output = $PropertyValue
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
}
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
}
Remove-Variable -Name Database -Scope Local -Force
Remove-Variable -Name MSIFileName -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
Remove-Variable -Name PropertyName -Scope Local -Force
Remove-Variable -Name PropertyValue -Scope Local -Force
Remove-Variable -Name Record -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name View -Scope Local -Force
Remove-Variable -Name WindowsInstaller -Scope Local -Force
}
function Get-MSIFileName {
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
$OutputFile = $RelativePath + "Report.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "MSI Filename"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "------------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = $global:MSI
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
}
function Get-Properties {
Set-Variable -Name Entries -Scope Local -Force
Set-Variable -Name Entry -Scope Local -Force
Set-Variable -Name File -Scope Local -Force
Set-Variable -Name FormattedEntry -Scope Local -Force
Set-Variable -Name Line -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
Set-Variable -Name Position -Scope Local -Force
Set-Variable -Name Property -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name Value -Scope Local -Force
$OutputArray = @()
$RelativePath = Get-RelativePath
$File = Get-Content -Path $RelativePath"Installer.log"
$OutputFile = $RelativePath+"Report.txt"
$Entries = Get-Content -Path $RelativePath"UserInput.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "Properties"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "----------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
If ($Entries -ne $null) {
foreach ($Line in $File) {
If ($Line -like "*PROPERTY CHANGE: Adding*") {
foreach ($Entry in $Entries) {
$FormattedEntry = [char]42 + [char]39 + $Entry + [char]39 + [char]42
If ($Line -like $FormattedEntry) {
$Property = $Line
$Value = $Line
$Property = $Property.split(':')[-1]
If ($Property[0] -eq "\") {
$Property = $Line
$Property = $Property.split(':')[-2]
}
$Property = $Property.Trim()
$Property = $Property.Trim("Adding")
$Property = $Property.Trim()
$Property = $Property.Trim(" ")
$Position = $Property.IndexOf(" ")
If ($Property -notlike "*:\*") {
$Property = $Property.Substring(0, $Position)
}
$Output = $Property + ": " + $Entry
$OutputArray += $Output
}
}
}
}
$OutputArray = $OutputArray | select -Unique
$OutputArray = $OutputArray | Sort
foreach ($Item in $OutputArray) {
Write-Host $Item
If ($Item -ne $null) {
Out-File -FilePath $OutputFile -InputObject $Item -Append -Force
}
}
} else {
$Output = "No User Input Properties Exist"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
}
Remove-Variable -Name Entries -Scope Local -Force
Remove-Variable -Name Entry -Scope Local -Force
Remove-Variable -Name File -Scope Local -Force
Remove-Variable -Name FormattedEntry -Scope Local -Force
Remove-Variable -Name Line -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
Remove-Variable -Name Position -Scope Local -Force
Remove-Variable -Name Property -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name Value -Scope Local -Force
}
function Get-Features {
Set-Variable -Name Entries -Scope Local -Force
Set-Variable -Name File -Scope Local -Force
Set-Variable -Name Line -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name Value -Scope Local -Force
Set-Variable -Name Values -Scope Local -Force
$RelativePath = Get-RelativePath
$OutputFile = $RelativePath + "Report.txt"
$Entries = Get-Content -Path $RelativePath"UserInput.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "Features"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "--------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
If ($Entries -ne $null) {
$File = Get-Content -Path $global:RelativePath"Installer.log"
foreach ($Line in $File) {
If ($Line -like "*ADDLOCAL*") {
$Value = $Line.split(' ')[-1]
$Value = $Value -replace '''', ''
$Value = $Value.SubString(0, $Value.Length - 1)
$Values = $Value.Split(",")
foreach ($Value in $Values) {
Write-Host $Value
Out-File -FilePath $OutputFile -InputObject $Value -Append -Force
}
}
}
} else {
$Output = "No User Input Features Exist"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
}
Remove-Variable -Name Entries -Scope Local -Force
Remove-Variable -Name File -Scope Local -Force
Remove-Variable -Name Line -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name Value -Scope Local -Force
Remove-Variable -Name Values -Scope Local -Force
}
function Get-Buttons {
Set-Variable -Name Database -Scope Local -Force
Set-Variable -Name Entries -Scope Local -Force
Set-Variable -Name Entry -Scope Local -Force
Set-Variable -Name MSIFileName -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name OutputFile -Scope Local -Force
Set-Variable -Name PropertyName -Scope Local -Force
Set-Variable -Name PropertyValue -Scope Local -Force
Set-Variable -Name Record -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
Set-Variable -Name View -Scope Local -Force
Set-Variable -Name WindowsInstaller -Scope Local -Force
$RelativePath = Get-RelativePath
$MSIFileName = $global:MSI
$Entries = Get-Content -Path $RelativePath"UserInput.txt"
$OutputFile = $RelativePath + "Report.txt"
$Output = [char]13
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "Buttons"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
$Output = "--------"
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
foreach ($Entry in $Entries) {
$WindowsInstaller = New-Object -com WindowsInstaller.Installer
$Database = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($MSIFileName, 0))
$View = $Database.GetType().InvokeMember("OpenView", "InvokeMethod", $Null, $Database, ("SELECT * FROM RadioButton"))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $Null, $View, $Null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
$Entry = "*" + $Entry + "*"
while ($Record -ne $Null) {
$PropertyName = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 1)
if (-not ($PropertyName -cmatch "[a-z]")) {
[string]$PropertyValue = $Record.GetType().InvokeMember("StringData", "GetProperty", $Null, $Record, 8)
IF ($PropertyValue -like $Entry) {
$Output = $PropertyName + " = " + $PropertyValue
Write-Host $Output
Out-File -FilePath $OutputFile -InputObject $Output -Append -Force
}
}
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $Null, $View, $Null)
}
}
Remove-Variable -Name Database -Scope Local -Force
Remove-Variable -Name Entries -Scope Local -Force
Remove-Variable -Name Entry -Scope Local -Force
Remove-Variable -Name MSIFileName -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name OutputFile -Scope Local -Force
Remove-Variable -Name PropertyName -Scope Local -Force
Remove-Variable -Name PropertyValue -Scope Local -Force
Remove-Variable -Name Record -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
Remove-Variable -Name View -Scope Local -Force
Remove-Variable -Name WindowsInstaller -Scope Local -Force
}
Clear-Host
ProcessTextFiles
Get-MSIFile
New-UserInputFile
Install-MSI
Uninstall-MSI
Get-ProductName
Get-ProductCode
Get-MSIFileName
Get-Properties
Get-Features
Get-Buttons
Remove-Variable -Name ApplicationName -Scope Global -Force
Remove-Variable -Name MSI -Scope Global -Force
Remove-Variable -Name ProductCode -Scope Global -Force
|
combined_dataset/train/non-malicious/Connect-AccessDB_3.ps1
|
Connect-AccessDB_3.ps1
|
# Functions for connecting to and working with Access databases
# Matt Wilson
# May 2009
function Connect-AccessDB ($global:dbFilePath) {
# Test to ensure valid path to database file was supplied
if (-not (Test-Path $dbFilePath)) {
Write-Error "Invalid Access database path specified. Please supply full absolute path to database file!"
}
# TO-DO: Add check to ensure file is either MDB or ACCDB
# Create a new ADO DB connection COM object, which will give us useful methods & properties such as "Execute"!
$global:AccessConnection = New-Object -ComObject ADODB.Connection
# Actually open the database so we can start working with its contents
# Access 00-03 (MDB) format has a different connection string than 2007
if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.mdb$") {
Write-Host "Access 2000-2003 format (MDB) detected! Using Microsoft.Jet.OLEDB.4.0."
$AccessConnection.Open("Provider = Microsoft.Jet.OLEDB.4.0; Data Source= $dbFilePath")
}
# Here's the check for if 2007 connection is necessary
if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.accdb$") {
Write-Host "Access 2007 format (ACCDB) detected! Using Microsoft.Ace.OLEDB.12.0."
$AccessConnection.Open("Provider = Microsoft.Ace.OLEDB.12.0; Persist Security Info = False; Data Source= $dbFilePath")
}
}
function Open-AccessRecordSet ($global:SqlQuery) {
# Ensure SQL query isn't null
if ($SqlQuery.length -lt 1) {
Throw "Please supply a SQL query for the recordset selection!"
}
# Variables used for the connection itself. Leave alone unless you know what you're doing.
$adOpenStatic = 3
$adLockOptimistic = 3
# Create the recordset object using the ADO DB COM object
$global:AccessRecordSet = New-Object -ComObject ADODB.Recordset
# Finally, go and get some records from the DB!
$AccessRecordSet.Open($SqlQuery, $AccessConnection, $adOpenStatic, $adLockOptimistic)
}
function Get-AccessRecordSetStructure {
# TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records
# Cycle through the fields in the recordset, but only pull out the properties we care about
Write-Output $AccessRecordSet.Fields | Select-Object Name,Attributes,DefinedSize,type
}
function Convert-AccessRecordSetToPSObject {
# TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records
# Get an array of field names which we will later use to create custom PoSh object names
$fields = Get-AccessRecordSetStructure
# Move to the very first record in the RecordSet before cycling through each one
$AccessRecordSet.MoveFirst()
# Cycle through each RECORD in the set and create that record to an object
do {
# Create a SINGLE blank object we can use in a minute to add properties/values to
$record = New-Object System.Object
# For every FIELD in the DB, lookup the CURRENT value of that field and add a new PoSh object property with that name and value
foreach ($field in $fields) {
$fieldName = $field.Name # This makes working with the name a LOT easier in Write-Host, etc.
#Write-Host "Working with field: $fieldName"
#Write-Host "Preparing to set value to: $($AccessRecordset.Fields.Item($fieldName).Value)"
$record | Add-Member -type NoteProperty -name $fieldName -value $AccessRecordSet.Fields.Item($fieldName).Value
}
# Output the custom object we just created
Write-Output $record
# Tell the recordset to advance forward one before doing this again with another object
$AccessRecordset.MoveNext()
} until ($AccessRecordset.EOF -eq $True)
}
function Execute-AccessSQLStatement ($query) {
$AccessConnection.Execute($query)
}
function Convert-AccessTypeCode ([string]$typeCode) {
# Build some lookup tables for our Access type codes so we can convert values pretty easily
$labelLookupHash = @{"AutoNumber"="3"; "Text"="202"; "Memo"="203"; "Date/Time"="7"; "Currency"="6"; "Yes/No"="11"; "OLE Object"="205"; "Byte"="17"; "Integer"="2"; "Long Integer"="3"; "Single"="4"; "Double"="5"}
$codeLookupHash = @{"3"="AutoNumber"; "202"="Text"; "203"="Memo"; "7"="Date/Time"; "6"="Currency"; "11"="Yes/No"; "205"="OLE Object"; "17"="Byte"; "2"="Integer"; "3"="Long Integer"; "4"="Single"; "5"="Double"}
# Convert a value depending on what type of data was supplied
if ($typeCode -match [regex]"^\\d{1,3}$") {
$valueFound = $codeLookupHash.$typeCode
if ($valueFound) {
Write-Output $valueFound
} else { Write-Output "Unknown" }
} else {
$valueFound = $labelLookupHash.$typeCode
if ($valueFound) {
Write-Output $valueFound
} else { Write-Output "Unknown" }
}
}
function Close-AccessRecordSet {
$AccessRecordSet.Close()
}
function Disconnect-AccessDB {
$AccessConnection.Close()
}
# Connect-AccessDB "C:\\fso\\ConfigurationMaintenance.accdb"
# Open-AccessRecordSet "SELECT * FROM printers"
# $printersDB = Convert-AccessRecordSetToPSObject | Select-Object caption,driverName | Format-Table -AutoSize; $printersDB
# Close-AccessRecordSet
# Disconnect-AccessDB
|
combined_dataset/train/non-malicious/3972.ps1
|
3972.ps1
|
function Test-AvailableSslOptions
{
$result = Get-AzApplicationGatewayAvailableSslOptions
Assert-NotNull $result
Assert-NotNull $result.DefaultPolicy
$result = Get-AzApplicationGatewaySslPredefinedPolicy
Assert-NotNull $result
Assert-True { $result.Count -gt 0 }
Assert-NotNull $result[0].MinProtocolVersion
Assert-True { $result[0].CipherSuites -gt 0 }
$result = Get-AzApplicationGatewaySslPredefinedPolicy -Name AppGwSslPolicy20170401
Assert-NotNull $result
Assert-NotNull $result.MinProtocolVersion
Assert-True { $result.CipherSuites -gt 0 }
$result = Get-AzApplicationGatewaySslPredefinedPolicy -Name AppGwSslPolicy*
Assert-NotNull $result
Assert-True { $result.Count -gt 0 }
Assert-NotNull $result[0].MinProtocolVersion
Assert-True { $result[0].CipherSuites -gt 0 }
}
function Test-AvailableWafRuleSets
{
$result = Get-AzApplicationGatewayAvailableWafRuleSets
Assert-NotNull $result
Assert-NotNull $result.Value
Assert-True { $result.Value.Count -gt 0 }
Assert-NotNull $result.Value[0].Name
Assert-NotNull $result.Value[0].RuleSetType
Assert-NotNull $result.Value[0].RuleSetVersion
Assert-NotNull $result.Value[0].RuleGroups
Assert-True { $result.Value[0].RuleGroups.Count -gt 0 }
Assert-NotNull $result.Value[0].RuleGroups[0].RuleGroupName
Assert-NotNull $result.Value[0].RuleGroups[0].Rules
Assert-True { $result.Value[0].RuleGroups[0].Rules.Count -gt 0 }
Assert-NotNull $result.Value[0].RuleGroups[0].Rules[0].RuleId
}
function Test-ApplicationGatewayCRUD
{
param
(
$basedir = "./"
)
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/applicationgateways"
$location = Get-ProviderLocation $resourceTypeParent
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$nicSubnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$fipconfig01Name = Get-ResourceName
$fipconfig02Name = Get-ResourceName
$poolName = Get-ResourceName
$nicPoolName = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$poolSetting02Name = Get-ResourceName
$listener01Name = Get-ResourceName
$listener02Name = Get-ResourceName
$rule01Name = Get-ResourceName
$rule02Name = Get-ResourceName
$nic01Name = Get-ResourceName
$nic02Name = Get-ResourceName
$authCertName = Get-ResourceName
$probe01Name = Get-ResourceName
$probe02Name = Get-ResourceName
$customError403Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError403Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError502Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/502.htm"
$customError502Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/502.htm"
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$nicSubnet = New-AzVirtualNetworkSubnetConfig -Name $nicSubnetName -AddressPrefix 10.0.2.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet, $nicSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$nicSubnet = Get-AzVirtualNetworkSubnetConfig -Name $nicSubnetName -VirtualNetwork $vnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$nic01 = New-AzNetworkInterface -Name $nic01Name -ResourceGroupName $rgname -Location $location -Subnet $nicSubnet
$nic02 = New-AzNetworkInterface -Name $nic02Name -ResourceGroupName $rgname -Location $location -Subnet $nicSubnet
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig01 = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfig01Name -PublicIPAddress $publicip
$fipconfig02 = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfig02Name -Subnet $gwSubnet
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses 1.1.1.1, 2.2.2.2, 3.3.3.3
$nicPool = New-AzApplicationGatewayBackendAddressPool -Name $nicPoolName
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$fp02 = New-AzApplicationGatewayFrontendPort -Name $frontendPort02Name -Port 8080
$authCertFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$authcert01 = New-AzApplicationGatewayAuthenticationCertificate -Name $authCertName -CertificateFile $authCertFilePath
$match1 = New-AzApplicationGatewayProbeHealthResponseMatch -Body "helloworld"
Assert-Null $match1.StatusCodes
$probe01 = New-AzApplicationGatewayProbeConfig -Name $probe01Name -Match $match1 -Protocol Http -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$connectionDraining01 = New-AzApplicationGatewayConnectionDraining -Enabled $True -DrainTimeoutInSec 42
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 80 -Protocol Http -Probe $probe01 -CookieBasedAffinity Disabled -ConnectionDraining $connectionDraining01
Assert-NotNull $poolSetting01.connectionDraining
Assert-AreEqual $True $poolSetting01.connectionDraining.Enabled
Assert-AreEqual 42 $poolSetting01.connectionDraining.DrainTimeoutInSec
Assert-NotNull $poolSetting01.Probe
$match2 = New-AzApplicationGatewayProbeHealthResponseMatch -Body "helloworld" -StatusCode "200"
Assert-NotNull $match2.StatusCodes
$match2.StatusCodes.RemoveAt(0)
Assert-AreEqual 0 $match2.StatusCodes.Count
$probe02 = New-AzApplicationGatewayProbeConfig -Name $probe02Name -Match $match2 -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$poolSetting02 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting02Name -Probe $probe02 -Port 443 -Protocol Https -CookieBasedAffinity Enabled -AuthenticationCertificates $authcert01
Assert-Null $poolSetting02.connectionDraining
Assert-NotNull $poolSetting02.Probe
Set-AzApplicationGatewayConnectionDraining -BackendHttpSettings $poolSetting02 -Enabled $False -DrainTimeoutInSec 3600
$connectionDraining02 = Get-AzApplicationGatewayConnectionDraining -BackendHttpSettings $poolSetting02
Assert-NotNull $connectionDraining02
Assert-AreEqual $False $connectionDraining02.Enabled
Assert-AreEqual 3600 $connectionDraining02.DrainTimeoutInSec
Remove-AzApplicationGatewayConnectionDraining -BackendHttpSettings $poolSetting02
Assert-Null $poolSetting02.connectionDraining
$ce01_listener = New-AzApplicationGatewayCustomError -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
$ce02_listener = New-AzApplicationGatewayCustomError -StatusCode HttpStatus502 -CustomErrorPageUrl $customError502Url01
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig01 -FrontendPort $fp01
$listener02 = New-AzApplicationGatewayHttpListener -Name $listener02Name -Protocol Http -FrontendIPConfiguration $fipconfig02 -FrontendPort $fp02 -CustomErrorConfiguration $ce01_listener,$ce02_listener
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$rule02 = New-AzApplicationGatewayRequestRoutingRule -Name $rule02Name -RuleType basic -BackendHttpSettings $poolSetting02 -HttpListener $listener02 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name WAF_Medium -Tier WAF -Capacity 2
$sslPolicy = New-AzApplicationGatewaySslPolicy -DisabledSslProtocols TLSv1_0, TLSv1_1
$disabledRuleGroup1 = New-AzApplicationGatewayFirewallDisabledRuleGroupConfig -RuleGroupName "crs_41_sql_injection_attacks" -Rules 981318,981320
$disabledRuleGroup2 = New-AzApplicationGatewayFirewallDisabledRuleGroupConfig -RuleGroupName "crs_35_bad_robots"
$exclusion1 = New-AzApplicationGatewayFirewallExclusionConfig -Variable "RequestHeaderNames" -Operator "StartsWith" -Selector "xyz"
$exclusion2 = New-AzApplicationGatewayFirewallExclusionConfig -Variable "RequestArgNames" -Operator "Equals" -Selector "a"
$firewallConfig = New-AzApplicationGatewayWebApplicationFirewallConfiguration -Enabled $true -FirewallMode Prevention -RuleSetType "OWASP" -RuleSetVersion "2.2.9" -DisabledRuleGroups $disabledRuleGroup1,$disabledRuleGroup2 -RequestBodyCheck $true -MaxRequestBodySizeInKb 80 -FileUploadLimitInMb 70 -Exclusion $exclusion1,$exclusion2
$ce01_appgw = New-AzApplicationGatewayCustomError -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url02
$ce02_appgw = New-AzApplicationGatewayCustomError -StatusCode HttpStatus502 -CustomErrorPageUrl $customError502Url02
$job = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -Probes $probe01, $probe02 -BackendAddressPools $pool, $nicPool -BackendHttpSettingsCollection $poolSetting01,$poolSetting02 -FrontendIpConfigurations $fipconfig01, $fipconfig02 -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01, $fp02 -HttpListeners $listener01, $listener02 -RequestRoutingRules $rule01, $rule02 -Sku $sku -SslPolicy $sslPolicy -AuthenticationCertificates $authcert01 -WebApplicationFirewallConfiguration $firewallConfig -AsJob -CustomErrorConfiguration $ce01_appgw,$ce02_appgw
$job | Wait-Job
$appgw = $job | Receive-Job
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
Assert-AreEqual "Running" $getgw.OperationalState
Compare-ConnectionDraining $poolSetting01 $getgw.BackendHttpSettingsCollection[0]
Compare-ConnectionDraining $poolSetting02 $getgw.BackendHttpSettingsCollection[1]
Compare-WebApplicationFirewallConfiguration $firewallConfig $getgw.WebApplicationFirewallConfiguration
$getgw = Get-AzApplicationGateway -Name $appgwName
Assert-AreEqual "Running" $getgw[0].OperationalState
Compare-ConnectionDraining $poolSetting01 $getgw[0].BackendHttpSettingsCollection[0]
Compare-ConnectionDraining $poolSetting02 $getgw[0].BackendHttpSettingsCollection[1]
Compare-WebApplicationFirewallConfiguration $firewallConfig $getgw[0].WebApplicationFirewallConfiguration
$getgw = Get-AzApplicationGateway -Name ($appgwName + "*")
Assert-AreEqual "Running" $getgw.OperationalState
Compare-ConnectionDraining $poolSetting01 $getgw.BackendHttpSettingsCollection[0]
Compare-ConnectionDraining $poolSetting02 $getgw.BackendHttpSettingsCollection[1]
Compare-WebApplicationFirewallConfiguration $firewallConfig $getgw.WebApplicationFirewallConfiguration
Assert-NotNull $getgw.Probes
Assert-AreEqual 2 $getgw.Probes.Count
Assert-NotNull $getgw.Probes[0]
Assert-NotNull $getgw.Probes[0].Match
Assert-Null $getgw.Probes[0].Match.StatusCodes
Assert-NotNull $getgw.Probes[1]
Assert-NotNull $getgw.Probes[1].Match
Assert-NotNull $getgw.Probes[1].Match.StatusCodes
Assert-AreEqual 1 $getgw.Probes[1].Match.StatusCodes.Count
$backendHealth = Get-AzApplicationGatewayBackendHealth -Name $appgwName -ResourceGroupName $rgname
Assert-Null $backendHealth.BackendAddressPools[0].BackendAddressPool.Name
$nicPool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $getgw -Name $nicPoolName
$nic01.IpConfigurations[0].ApplicationGatewayBackendAddressPools.Add($nicPool);
$nic02.IpConfigurations[0].ApplicationGatewayBackendAddressPools.Add($nicPool);
$nic01 = $nic01 | Set-AzNetworkInterface
$nic02 = $nic02 | Set-AzNetworkInterface
$probeName = Get-ResourceName
$frontendPort03Name = Get-ResourceName
$poolSetting03Name = Get-ResourceName
$listener03Name = Get-ResourceName
$rule03Name = Get-ResourceName
$PathRule01Name = Get-ResourceName
$PathRule02Name = Get-ResourceName
$urlPathMapName = Get-ResourceName
$getgw = Add-AzApplicationGatewayFrontendPort -ApplicationGateway $getgw -Name $frontendPort03Name -Port 8888
$fp = Get-AzApplicationGatewayFrontendPort -ApplicationGateway $getgw -Name $frontendPort03Name
$getgw = Add-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw -Name $probeName -Protocol Http -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$probe = Get-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw -Name $probeName
$fipconfig = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $getgw -Name $fipconfig02Name
$getgw = Add-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp -HostName TestHostName
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name
$pool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $getgw -Name $poolName
$getgw = Add-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $getgw -Name $poolSetting03Name -Port 80 -Protocol Http -CookieBasedAffinity Disabled -Probe $probe -RequestTimeout 66
$poolSetting = Get-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $getgw -Name $poolSetting03Name
$imagePathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRule01Name -Paths "/image" -BackendAddressPool $pool -BackendHttpSettings $poolSetting
$videoPathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRule02Name -Paths "/video" -BackendAddressPool $pool -BackendHttpSettings $poolSetting
$getgw = Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $getgw -Name $urlPathMapName -PathRules $videoPathRule, $imagePathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting
$urlPathMap = Get-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $getgw -Name $urlPathMapName
$getgw = Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $getgw -Name $rule03Name -RuleType PathBasedRouting -HttpListener $listener -UrlPathMap $urlPathMap
$job = Set-AzApplicationGateway -ApplicationGateway $getgw -AsJob
$job | Wait-Job
$getgw = Set-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway $getgw -Enabled $true -FirewallMode Detection
$firewallConfig2 = Get-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway $getgw
Assert-AreEqual "OWASP" $firewallConfig2.RuleSetType
Assert-AreEqual "3.0" $firewallConfig2.RuleSetVersion
Assert-AreEqual $null $firewallConfig2.DisabledRuleGroups
Assert-AreEqual $True $firewallConfig2.RequestBodyCheck
Assert-AreEqual 128 $firewallConfig2.MaxRequestBodySizeInKb
Assert-AreEqual 100 $firewallConfig2.FileUploadLimitInMb
Assert-AreEqual $null $firewallConfig2.Exclusions
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw
Compare-WebApplicationFirewallConfiguration $firewallConfig2 $getgw.WebApplicationFirewallConfiguration
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$getgw = Remove-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw -Name $probeName
$getgw = Remove-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $getgw -Name $urlPathMapName
$getgw = Set-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $getgw -Name $poolSetting03Name -Port 80 -Protocol Http -CookieBasedAffinity Disabled
$poolSetting = Get-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $getgw -Name $poolSetting03Name
$fp = Get-AzApplicationGatewayFrontendPort -ApplicationGateway $getgw -Name $frontendPort03Name
$fipconfig = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $getgw -Name $fipconfig02Name
$getgw = Set-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener03Name
$pool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $getgw -Name $poolName
$getgw = Set-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $getgw -Name $rule03Name -RuleType basic -HttpListener $listener -BackendHttpSettings $poolSetting -BackendAddressPool $pool
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener02Name
$ce = Get-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener -StatusCode HttpStatus403
Assert-AreEqual $customError403Url01 $ce.CustomErrorPageUrl
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$ce = Get-AzApplicationGatewayCustomError -ApplicationGateway $getgw -StatusCode HttpStatus403
Assert-AreEqual $customError403Url02 $ce.CustomErrorPageUrl
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener02Name
Set-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url02
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$updatedlistener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $updatedgw -Name $listener02Name
$ce = Get-AzApplicationGatewayHttpListenerCustomError -HttpListener $updatedlistener -StatusCode HttpStatus403
Assert-AreEqual $customError403Url02 $ce.CustomErrorPageUrl
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
Set-AzApplicationGatewayCustomError -ApplicationGateway $getgw -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$ce = Get-AzApplicationGatewayCustomError -ApplicationGateway $updatedgw -StatusCode HttpStatus403
Assert-AreEqual $customError403Url01 $ce.CustomErrorPageUrl
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener02Name
Remove-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener -StatusCode HttpStatus502
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$updatedlistener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $updatedgw -Name $listener02Name
$ceConfigs = Get-AzApplicationGatewayHttpListenerCustomError -HttpListener $updatedlistener
Assert-AreEqual 1 $ceConfigs.count
Assert-AreEqual HttpStatus403 $ceConfigs[0].StatusCode
Remove-AzApplicationGatewayCustomError -ApplicationGateway $getgw -StatusCode HttpStatus502
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$ceConfigs = Get-AzApplicationGatewayCustomError -ApplicationGateway $updatedgw
Assert-AreEqual 1 $ceConfigs.count
Assert-AreEqual HttpStatus403 $ceConfigs[0].StatusCode
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$listener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $getgw -Name $listener02Name
Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener -StatusCode HttpStatus502 -CustomErrorPageUrl $customError502Url01
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$updatedlistener = Get-AzApplicationGatewayHttpListener -ApplicationGateway $updatedgw -Name $listener02Name
$ceConfigs = Get-AzApplicationGatewayHttpListenerCustomError -HttpListener $updatedlistener
Assert-AreEqual 2 $ceConfigs.count
Add-AzApplicationGatewayCustomError -ApplicationGateway $getgw -StatusCode HttpStatus502 -CustomErrorPageUrl $customError502Url02
$updatedgw = Set-AzApplicationGateway -ApplicationGateway $getgw
$ceConfigs = Get-AzApplicationGatewayCustomError -ApplicationGateway $updatedgw
Assert-AreEqual 2 $ceConfigs.count
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw
Assert-AreEqual "Running" $getgw.OperationalState
$job = Stop-AzApplicationGateway -ApplicationGateway $getgw -AsJob
$job | Wait-Job
$getgw = $job | Receive-Job
Assert-AreEqual "Stopped" $getgw.OperationalState
Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayCRUD2
{
param
(
$basedir = "./"
)
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/applicationgateways"
$location = Get-ProviderLocation $resourceTypeParent
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$nicSubnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$listener02Name = Get-ResourceName
$sslCert01Name = Get-ResourceName
$sslCert02Name = Get-ResourceName
$poolName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$redirect01Name = Get-ResourceName
$redirect02Name = Get-ResourceName
$redirect03Name = Get-ResourceName
$rule01Name = Get-ResourceName
$rule02Name = Get-ResourceName
$probeHttpName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$nicSubnet = New-AzVirtualNetworkSubnetConfig -Name $nicSubnetName -AddressPrefix 10.0.2.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet, $nicSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$nicSubnet = Get-AzVirtualNetworkSubnetConfig -Name $nicSubnetName -VirtualNetwork $vnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$pw01 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$sslCert01Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert1.pfx"
$sslCert01 = New-AzApplicationGatewaySslCertificate -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 443
$fp02 = New-AzApplicationGatewayFrontendPort -Name $frontendPort02Name -Port 80
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Https -SslCertificate $sslCert01 -FrontendIPConfiguration $fipconfig -FrontendPort $fp01
$listener02 = New-AzApplicationGatewayHttpListener -Name $listener02Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp02
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$match = New-AzApplicationGatewayProbeHealthResponseMatch -Body "helloworld" -StatusCode "200-300","404"
$probeHttp = New-AzApplicationGatewayProbeConfig -Name $probeHttpName -Protocol Http -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -Match $match
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 80 -Protocol Http -Probe $probeHttp -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress
$redirect01 = New-AzApplicationGatewayRedirectConfiguration -Name $redirect01Name -RedirectType Permanent -TargetListener $listener01
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$rule02 = New-AzApplicationGatewayRequestRoutingRule -Name $rule02Name -RuleType basic -HttpListener $listener02 -RedirectConfiguration $redirect01
$sku = New-AzApplicationGatewaySku -Name Standard_Medium -Tier Standard -Capacity 2
$sslPolicy = New-AzApplicationGatewaySslPolicy -PolicyType Custom -MinProtocolVersion TLSv1_1 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_AES_128_GCM_SHA256"
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -Probes $probeHttp -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01, $fp02 -HttpListeners $listener01, $listener02 -RedirectConfiguration $redirect01 -RequestRoutingRules $rule01, $rule02 -Sku $sku -SslPolicy $sslPolicy -SslCertificates $sslCert01 -EnableHttp2
$redirect02 = Get-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name $redirect01Name
Assert-AreEqual $redirect01.TargetListenerId $redirect02.TargetListenerId
$getgw = Set-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name $redirect01Name -RedirectType Permanent -TargetUrl "https://www.bing.com"
$getgw = Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $getgw -Name $redirect03Name -RedirectType Permanent -TargetListener $listener01 -IncludePath $true
$getgw = Remove-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $getgw -Name $redirect03Name
Assert-AreEqual $getgw.EnableHttp2 $true
$sslPolicy01 = Get-AzApplicationGatewaySslPolicy -ApplicationGateway $getgw
Assert-AreEqual $sslPolicy.MinProtocolVersion $sslPolicy01.MinProtocolVersion
$getgw = Set-AzApplicationGatewaySslPolicy -ApplicationGateway $getgw -PolicyType Predefined -PolicyName AppGwSslPolicy20170401
$probeHttp01 = Get-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw -Name $probeHttpName
Assert-AreEqual $probeHttp.Match.Body $probeHttp01.Match.Body
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
Assert-NotNull $getgw.SslCertificates[0]
Assert-Null $getgw.SslCertificates[0].Password
$getgw = Set-AzApplicationGatewaySslCertificate -ApplicationGateway $getgw -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
Assert-NotNull $getgw.SslCertificates[0].Password
$pw02 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$sslCert02Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert2.pfx"
$getgw = Add-AzApplicationGatewaySslCertificate -ApplicationGateway $getgw -Name $sslCert02Name -CertificateFile $sslCert02Path -Password $pw02
$getgw.EnableHttp2 = $false
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw
Assert-AreEqual $getgw.EnableHttp2 $false
Assert-AreEqual "Running" $getgw.OperationalState
Assert-AreEqual 2 $getgw.SslCertificates.Count
Assert-NotNull $getgw.SslCertificates[0]
Assert-NotNull $getgw.SslCertificates[1]
Assert-Null $getgw.SslCertificates[0].Password
Assert-Null $getgw.SslCertificates[1].Password
$getgw = Stop-AzApplicationGateway -ApplicationGateway $getgw
Assert-AreEqual "Stopped" $getgw.OperationalState
Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayCRUDRewriteRuleSet
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "westus2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$poolName = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$rewriteRuleName = Get-ResourceName
$rewriteRuleSetName = Get-ResourceName
$rewriteRuleSetName2 = Get-ResourceName
$rule01Name = Get-ResourceName
$probeHttpName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$trustedRoot01 = New-AzApplicationGatewayTrustedRootCertificate -Name $trustedRootCertName -CertificateFile $certFilePath
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$probeHttp = New-AzApplicationGatewayProbeConfig -Name $probeHttpName -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -port 1234
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -Probe $probeHttp -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress -TrustedRootCertificate $trustedRoot01
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "abc" -HeaderValue "def"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet
$rewriteRuleSet = New-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -RewriteRule $rewriteRule
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool -RewriteRuleSet $rewriteRuleSet
$sku = New-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
$sslPolicy = New-AzApplicationGatewaySslPolicy -PolicyType Custom -MinProtocolVersion TLSv1_1 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_AES_128_GCM_SHA256"
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Zone 1,2 -Location $location -Probes $probeHttp -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -SslPolicy $sslPolicy -TrustedRootCertificate $trustedRoot01 -AutoscaleConfiguration $autoscaleConfig -RewriteRuleSet $rewriteRuleSet
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.RewriteRules.Count 1
Assert-NotNull $rewriteRuleSet.RewriteRules[0].ActionSet
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 1
Assert-AreEqual "Running" $getgw.OperationalState
Assert-NotNull $getgw.RewriteRuleSets
Assert-AreEqual 1 $getgw.RewriteRuleSets.Count
$reqRoutingRule = Get-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $getgw -Name $rule01Name
Assert-NotNull $reqRoutingRule.RewriteRuleSet
Assert-AreEqual $getgw.RewriteRuleSets[0].Id $reqRoutingRule.RewriteRuleSet.Id
$trustedRoot02 = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $getgw -Name $trustedRootCertName
Assert-NotNull $trustedRoot02
Assert-AreEqual $getgw.BackendHttpSettingsCollection[0].TrustedRootCertificates.Count 1
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
Assert-AreEqual $getgw.Zones.Count 2
$sslPolicy01 = Get-AzApplicationGatewaySslPolicy -ApplicationGateway $getgw
Assert-AreEqual $sslPolicy.MinProtocolVersion $sslPolicy01.MinProtocolVersion
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
Set-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -MinCapacity 3 -MaxCapacity 10
$autoscaleConfig02 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig02
Assert-AreEqual $autoscaleConfig02.MinCapacity 3
Assert-AreEqual $autoscaleConfig02.MaxCapacity 10
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
Assert-ThrowsLike { Add-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName -RewriteRule $rewriteRule } "*already exists*"
$rewriteRuleSet = Add-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName2 -RewriteRule $rewriteRule
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 2
$rewriteRuleSet = Remove-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName2
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 1
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "ghi" -HeaderValue "jkl"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule2 = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet
Assert-ThrowsLike { Set-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name "fakeName" -RewriteRule $rewriteRule2 } "*does not exist*"
$rewriteRuleSet = Set-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name $rewriteRuleSetName -RewriteRule $rewriteRule2
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name $rewriteRuleSetName
Assert-AreEqual $rewriteRuleSet.RewriteRules[0].Name $rewriteRule2.Name
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
Assert-NotNull $sku01
Assert-AreEqual $sku01.Capacity 2
Assert-AreEqual $sku01.Name Standard_v2
Assert-AreEqual $sku01.Tier Standard_v2
$probe01 = Get-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw01
Assert-NotNull $probe01
Assert-AreEqual $probe01.Port 1234
Assert-AreEqual $probe01.Host "probe.com"
Assert-AreEqual $probe01.Path "/path/path.htm"
Assert-AreEqual $probe01.Interval 89
Assert-AreEqual $probe01.Timeout 88
Assert-AreEqual $probe01.UnhealthyThreshold 8
Assert-ThrowsLike { Set-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw01 -Name "fakeName" -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -port 1234} "*does not exist*"
Assert-ThrowsLike { Add-AzApplicationGatewayProbeConfig -ApplicationGateway $getgw01 -Name $probeHttpName -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -port 1234} "*already exists*"
$getgw1 = Stop-AzApplicationGateway -ApplicationGateway $getgw01
Assert-AreEqual "Stopped" $getgw1.OperationalState
Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayCRUDRewriteRuleSetWithConditions
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "westus2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$poolName = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$rewriteRuleName = Get-ResourceName
$rewriteRuleSetName = Get-ResourceName
$rewriteRuleSetName2 = Get-ResourceName
$rule01Name = Get-ResourceName
$probeHttpName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01
$certFilePath = Join-Path $basedir "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$trustedRoot01 = New-AzApplicationGatewayTrustedRootCertificate -Name $trustedRootCertName -CertificateFile $certFilePath
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$probeHttp = New-AzApplicationGatewayProbeConfig -Name $probeHttpName -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -Probe $probeHttp -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress -TrustedRootCertificate $trustedRoot01
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "abc" -HeaderValue "def"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$condition = New-AzApplicationGatewayRewriteRuleCondition -Variable "var_request_uri" -Pattern "http" -IgnoreCase
$rewriteRule = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet -RuleSequence 102 -Condition $condition
$rewriteRuleSet = New-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -RewriteRule $rewriteRule
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool -RewriteRuleSet $rewriteRuleSet
$sku = New-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
$sslPolicy = New-AzApplicationGatewaySslPolicy -PolicyType Custom -MinProtocolVersion TLSv1_1 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_AES_128_GCM_SHA256"
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Zone 1,2 -Location $location -Probes $probeHttp -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -SslPolicy $sslPolicy -TrustedRootCertificate $trustedRoot01 -AutoscaleConfiguration $autoscaleConfig -RewriteRuleSet $rewriteRuleSet
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.RewriteRules.Count 1
Assert-NotNull $rewriteRuleSet.RewriteRules[0].ActionSet
Assert-NotNull $rewriteRuleSet.RewriteRules[0].Conditions
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 1
Assert-AreEqual "Running" $getgw.OperationalState
Assert-NotNull $getgw.RewriteRuleSets
Assert-AreEqual 1 $getgw.RewriteRuleSets.Count
$reqRoutingRule = Get-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $getgw -Name $rule01Name
Assert-NotNull $reqRoutingRule.RewriteRuleSet
Assert-AreEqual $getgw.RewriteRuleSets[0].Id $reqRoutingRule.RewriteRuleSet.Id
$trustedRoot02 = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $getgw -Name $trustedRootCertName
Assert-NotNull $trustedRoot02
Assert-AreEqual $getgw.BackendHttpSettingsCollection[0].TrustedRootCertificates.Count 1
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
Assert-AreEqual $getgw.Zones.Count 2
$sslPolicy01 = Get-AzApplicationGatewaySslPolicy -ApplicationGateway $getgw
Assert-AreEqual $sslPolicy.MinProtocolVersion $sslPolicy01.MinProtocolVersion
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
Set-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -MinCapacity 3 -MaxCapacity 10
$autoscaleConfig02 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig02
Assert-AreEqual $autoscaleConfig02.MinCapacity 3
Assert-AreEqual $autoscaleConfig02.MaxCapacity 10
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
Assert-ThrowsLike { Add-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName -RewriteRule $rewriteRule } "*already exists*"
$rewriteRuleSet = Add-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName2 -RewriteRule $rewriteRule
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 2
$rewriteRuleSet = Remove-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw01 -Name $rewriteRuleSetName2
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw
Assert-NotNull $rewriteRuleSet
Assert-AreEqual $rewriteRuleSet.Count 1
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "ghi" -HeaderValue "jkl"
$condition = New-AzApplicationGatewayRewriteRuleCondition -Variable "var_http_method" -Pattern "get" -IgnoreCase
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule2 = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet -RuleSequence 101 -Condition $condition
Assert-ThrowsLike { Set-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name "fakeName" -RewriteRule $rewriteRule2 } "*does not exist*"
$rewriteRuleSet = Set-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name $rewriteRuleSetName -RewriteRule $rewriteRule2
$getgw = Set-AzApplicationGateway -ApplicationGateway $getgw01
$rewriteRuleSet = Get-AzApplicationGatewayRewriteRuleSet -ApplicationGateway $getgw -Name $rewriteRuleSetName
Assert-AreEqual $rewriteRuleSet.RewriteRules[0].Name $rewriteRule2.Name
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
Assert-NotNull $sku01
Assert-AreEqual $sku01.Capacity 2
Assert-AreEqual $sku01.Name Standard_v2
Assert-AreEqual $sku01.Tier Standard_v2
$getgw1 = Stop-AzApplicationGateway -ApplicationGateway $getgw01
Assert-AreEqual "Stopped" $getgw1.OperationalState
Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayCRUD3
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "West US 2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$identityName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$poolName = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$rule01Name = Get-ResourceName
$probeHttpName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$identity = New-AzUserAssignedIdentity -Name $identityName -Location $location -ResourceGroup $rgname
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$trustedRoot01 = New-AzApplicationGatewayTrustedRootCertificate -Name $trustedRootCertName -CertificateFile $certFilePath
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$probeHttp = New-AzApplicationGatewayProbeConfig -Name $probeHttpName -Protocol Https -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -Probe $probeHttp -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress -TrustedRootCertificate $trustedRoot01
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
$sslPolicy = New-AzApplicationGatewaySslPolicy -PolicyType Custom -MinProtocolVersion TLSv1_1 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_AES_128_GCM_SHA256"
$appgwIdentity = New-AzApplicationGatewayIdentity -UserAssignedIdentity $identity.Id
$appgw = New-AzApplicationGateway -Identity $appgwIdentity -Name $appgwName -ResourceGroupName $rgname -Zone 1,2 -Location $location -Probes $probeHttp -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -SslPolicy $sslPolicy -TrustedRootCertificate $trustedRoot01 -AutoscaleConfiguration $autoscaleConfig
$getgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
Assert-AreEqual "Running" $getgw.OperationalState
$trustedRoot02 = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $getgw -Name $trustedRootCertName
Assert-NotNull $trustedRoot02
Assert-AreEqual $getgw.BackendHttpSettingsCollection[0].TrustedRootCertificates.Count 1
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
Assert-AreEqual $getgw.Zones.Count 2
$sslPolicy01 = Get-AzApplicationGatewaySslPolicy -ApplicationGateway $getgw
Assert-AreEqual $sslPolicy.MinProtocolVersion $sslPolicy01.MinProtocolVersion
$autoscaleConfig01 = Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw
Assert-NotNull $autoscaleConfig01
Assert-AreEqual $autoscaleConfig01.MinCapacity 3
$getgw = Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $getgw -Force
$getgw = Set-AzApplicationGatewaySku -Name Standard_v2 -Tier Standard_v2 -Capacity 2 -ApplicationGateway $getgw
$getgw01 = Set-AzApplicationGateway -ApplicationGateway $getgw
$sku01 = Get-AzApplicationGatewaySku -ApplicationGateway $getgw01
Assert-NotNull $sku01
Assert-AreEqual $sku01.Capacity 2
Assert-AreEqual $sku01.Name Standard_v2
Assert-AreEqual $sku01.Tier Standard_v2
Remove-AzApplicationGatewayIdentity -ApplicationGateway $getgw01
$getgw02 = Set-AzApplicationGateway -ApplicationGateway $getgw01
Assert-Null $(Get-AzApplicationGatewayIdentity -ApplicationGateway $getgw01)
Set-AzApplicationGatewayIdentity -ApplicationGateway $getgw02 -UserAssignedIdentityId $identity.Id
$getgw03 = Set-AzApplicationGateway -ApplicationGateway $getgw02
$identity01 = Get-AzApplicationGatewayIdentity -ApplicationGateway $getgw03
Assert-AreEqual $identity01.UserAssignedIdentities.Count 1
Assert-NotNull $identity01.UserAssignedIdentities.Values[0].PrincipalId
Assert-NotNull $identity01.UserAssignedIdentities.Values[0].ClientId
$getgw1 = Stop-AzApplicationGateway -ApplicationGateway $getgw01
Assert-AreEqual "Stopped" $getgw1.OperationalState
Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Compare-ConnectionDraining($expected, $actual)
{
$expectedConnectionDraining = Get-AzApplicationGatewayConnectionDraining -BackendHttpSettings $expected
$actualConnectionDraining = Get-AzApplicationGatewayConnectionDraining -BackendHttpSettings $actual
if($expectedConnectionDraining)
{
Assert-NotNull $actualConnectionDraining
Assert-AreEqual $expectedConnectionDraining.Enabled $actualConnectionDraining.Enabled
Assert-AreEqual $expectedConnectionDraining.DrainTimeoutInSec $actualConnectionDraining.DrainTimeoutInSec
}
else
{
Assert-Null $actualConnectionDraining
}
}
function Compare-WebApplicationFirewallConfiguration($expected, $actual)
{
if($expected)
{
Assert-NotNull $actual
Assert-AreEqual $expected.Enabled $actual.Enabled
Assert-AreEqual $expected.FirewallMode $actual.FirewallMode
Assert-AreEqual $expected.RuleSetType $actual.RuleSetType
Assert-AreEqual $expected.RuleSetVersion $actual.RuleSetVersion
Assert-AreEqual $expected.RequestBodyCheck $actual.RequestBodyCheck
Assert-AreEqual $expected.MaxRequestBodySizeInKb $actual.MaxRequestBodySizeInKb
Assert-AreEqual $expected.FileUploadLimitInMb $actual.FileUploadLimitInMb
if($expected.DisabledRuleGroups)
{
Assert-NotNull $actual.DisabledRuleGroups
Assert-AreEqual $expected.DisabledRuleGroups.Count $actual.DisabledRuleGroups.Count
for($i = 0; $i -lt $expected.DisabledRuleGroups.Count; $i++)
{
Compare-DisabledRuleGroup $expected.DisabledRuleGroups[$i] $actual.DisabledRuleGroups[$i]
}
}
else
{
Assert-Null $actual.DisabledRuleGroups
}
if($expected.Exclusions)
{
Assert-NotNull $actual.Exclusions
Assert-AreEqual $expected.Exclusions.Count $actual.Exclusions.Count
for($i = 0; $i -lt $expected.Exclusions.Count; $i++)
{
Compare-Exclusion $expected.Exclusions[$i] $actual.Exclusions[$i]
}
}
else
{
Assert-Null $actual.Exclusions
}
}
else
{
Assert-Null $actual
}
}
function Compare-DisabledRuleGroup($expected, $actual)
{
if($expected)
{
Assert-NotNull $actual
Assert-AreEqual $expected.RuleGroupName $actual.RuleGroupName
if($expected.Rules)
{
Assert-NotNull $actual.Rules
Assert-AreEqualArray $expected.Rules $actual.Rules
}
else
{
Assert-Null $actual.Rules
}
}
else
{
Assert-Null $actual
}
}
function Compare-Exclusion($expected, $actual)
{
if($expected)
{
Assert-NotNull $actual
Assert-AreEqual $expected.MatchVariable $actual.MatchVariable
Assert-AreEqual $expected.SelectorMatchOperator $actual.SelectorMatchOperator
Assert-AreEqual $expected.Selector $actual.Selector
}
else
{
Assert-Null $actual
}
}
function Compare-AzApplicationGateway($expected, $actual)
{
Assert-AreEqual $expected.Name $actual.Name
Assert-AreEqual $expected.Name $actual.Name
Assert-AreEqual $expected.Sku.Name $actual.Sku.Name
Assert-AreEqual $expected.Sku.Tier $actual.Sku.Tier
Assert-AreEqual $expected.Sku.Capacity $actual.Sku.Capacity
Assert-AreEqual $expected.FrontendPorts.Count $actual.FrontendPorts.Count
Assert-AreEqual $expected.SslCertificates.Count $actual.SslCertificates.Count
Assert-AreEqual $expected.BackendAddressPools.Count $actual.BackendAddressPools.Count
Assert-AreEqual $expected.BackendHttpSettingsCollection.Count $actual.BackendHttpSettingsCollection.Count
for($i = 0; $i -lt $actual.BackendHttpSettingsCollection.Count; $i++)
{
Compare-ConnectionDraining $expected.BackendHttpSettingsCollection[$i] $actual.BackendHttpSettingsCollection[$i]
}
Assert-AreEqual $expected.HttpListeners.Count $actual.HttpListeners.Count
Assert-AreEqual $expected.RequestRoutingRules.Count $actual.RequestRoutingRules.Count
Assert-AreEqual $expected.RedirectConfigurations.Count $actual.RedirectConfigurations.Count
}
function Test-ApplicationGatewayCRUDSubItems
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "West US 2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$vnetName2 = Get-ResourceName
$gwSubnetName2 = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$gipconfigname2 = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$fipconfigName2 = Get-ResourceName
$listener01Name = Get-ResourceName
$poolName = Get-ResourceName
$poolName2 = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$authCertName = Get-ResourceName
$sslCert01Name = Get-ResourceName
$rule01Name = Get-ResourceName
$probeName = Get-ResourceName
$customError403Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError403Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$redirectName = Get-ResourceName
$urlPathMapName = Get-ResourceName
$PathRuleName = Get-ResourceName
$PathRuleName2 = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$gwSubnet2 = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -AddressPrefix 10.0.0.0/24
$vnet2 = New-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/8 -Subnet $gwSubnet2
$vnet2 = Get-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname
$gwSubnet2 = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -VirtualNetwork $vnet2
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -sku Basic
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress
$sslPolicy = New-AzApplicationGatewaySslPolicy -DisabledSslProtocols TLSv1_0, TLSv1_1
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name Standard_Medium -Tier Standard -Capacity 2
$match1 = New-AzApplicationGatewayProbeHealthResponseMatch -Body "helloworld"
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -SslPolicy $sslPolicy -EnableFIPS
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$certFilePath2 = $basedir + "/ScenarioTests/Data/auth-cert.pfx"
$sslCert01Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert1.pfx"
$sslCert02Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert2.pfx"
$pw01 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$pw02 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$appgw = Add-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name $authCertName -CertificateFile $certFilePath
$appgw = Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName2 -BackendIPAddresses 10.11.12.13
$appgw = Add-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName2 -SubnetId $gwSubnet.Id -PrivateIpAddress 10.0.0.7
$appgw = Add-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
$appgw = Add-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
$appgw = Add-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name $frontendPort02Name -Port 8080
$appgw = Add-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name $probeName -Match $match1 -Protocol Http -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
$appgw = Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name $redirectName -RedirectType Permanent -TargetListener $listener01 -IncludePath $true
$poolSetting01 = Get-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting01Name
$pool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName
$videoPathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRuleName -Paths "/video" -BackendAddressPool $pool -BackendHttpSettings $poolSetting01
$appgw = Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName -PathRules $videoPathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01
Assert-ThrowsLike { Add-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name $authCertName -CertificateFile $certFilePath } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName2 -BackendIPAddresses 10.11.12.13 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName2 -SubnetId $gwSubnet.Id -PrivateIpAddress 10.0.0.7 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name $frontendPort02Name -Port 8080 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name $probeName -Match $match1 -Protocol Http -HostName "probe.com" -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name $redirectName -RedirectType Permanent -TargetListener $listener01 -IncludePath $true } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName -PathRules $videoPathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting01Name -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress } "*already exists*"
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-AreEqual $appgw.AuthenticationCertificates.Count 1
Assert-AreEqual $appgw.BackendAddressPools.Count 2
Assert-AreEqual $appgw.FrontendIpConfigurations.Count 2
Assert-AreEqual $appgw.CustomErrorConfigurations.Count 1
Assert-AreEqual $appgw.SslCertificates.Count 1
Assert-AreEqual $appgw.FrontendPorts.Count 2
Assert-AreEqual $appgw.Probes.Count 1
Assert-AreEqual $appgw.RedirectConfigurations.Count 1
Assert-AreEqual $appgw.UrlPathMaps.Count 1
$gipconfig = Get-AzApplicationGatewayIPConfiguration -ApplicationGateway $appgw -Name $gipconfigname
$authCert = Get-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name $authCertName
$aPool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName2
$feip = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName2
$customError = Get-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus403
$sslCert = Get-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw -Name $sslCert01Name
$fPort = Get-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name $frontendPort02Name
$probe = Get-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name $probeName
$rule = Get-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule01Name
Assert-NotNull $gipconfig
Assert-NotNull $authCert
Assert-NotNull $aPool
Assert-NotNull $feip
Assert-NotNull $customError
Assert-NotNull $sslCert
Assert-NotNull $fPort
Assert-NotNull $probe
Assert-NotNull $rule
$gipconfigs = Get-AzApplicationGatewayIPConfiguration -ApplicationGateway $appgw
$authCerts = Get-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw
$aPools = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw
$feips = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw
$customErrors = Get-AzApplicationGatewayCustomError -ApplicationGateway $appgw
$sslCerts = Get-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw
$fPorts = Get-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw
$probes = Get-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw
$poolSettings = Get-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw
$listeners = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw
$redirects = Get-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw
$rules = Get-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw
$maps = Get-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw
Assert-NotNull $gipconfigs
Assert-AreEqual $gipconfigs.Count 1
Assert-NotNull $authCerts
Assert-AreEqual $authCerts.Count 1
Assert-NotNull $aPools
Assert-NotNull $aPools.Count 2
Assert-NotNull $feips
Assert-AreEqual $feips.Count 2
Assert-NotNull $customErrors
Assert-AreEqual $customErrors.Count 1
Assert-NotNull $sslCerts
Assert-AreEqual $sslCerts.Count 1
Assert-NotNull $fPorts
Assert-AreEqual $fPorts.Count 2
Assert-NotNull $probes
Assert-AreEqual $probes.Count 1
Assert-NotNull $rules
Assert-AreEqual $rules.Count 1
Assert-NotNull $maps
Assert-AreEqual $maps.Count 1
$appgwsRG = Get-AzApplicationGateway -ResourceGroupName $rgname
$appgwsAll = Get-AzApplicationGateway
$appgw = Set-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name $authCertName -CertificateFile $certFilePath2
$appgw = Set-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName2 -BackendIPAddresses 10.11.12.14
$appgw = Set-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url02
$appgw = Set-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name $frontendPort02Name -Port 8081
$appgw = Set-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name $probeName -Match $match1 -Protocol Http -HostName "probeset.com" -Path "/path/path1.htm" -Interval 87 -Timeout 87 -UnhealthyThreshold 7
$poolSetting01 = Get-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting01Name
$pool = Get-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName
$imagePathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRuleName2 -Paths "/image" -BackendAddressPool $pool -BackendHttpSettings $poolSetting01
$appgw = Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName -PathRules $imagePathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01
Assert-ThrowsLike { Set-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name "fakeName" -CertificateFile $certFilePath2 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name "fakeName" -BackendIPAddresses 10.11.12.14 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus405 -CustomErrorPageUrl $customError403Url02 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name "fakeName" -Port 8081 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name "fakeName" -Match $match1 -Protocol Http -HostName "probeset.com" -Path "/path/path1.htm" -Interval 87 -Timeout 87 -UnhealthyThreshold 7 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name "fakeName" -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name "fakeName" -SubnetId $gwSubnet.Id -PrivateIpAddress 10.0.0.7 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name "fakeName" -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name "fakeName" -RedirectType Permanent -TargetListener $listener01 -IncludePath $true } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name "fakeName" -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw -Name "fakeName" -CertificateFile $sslCert01Path -Password $pw01 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name "fakeName" -PathRules $imagePathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayIPConfiguration -ApplicationGateway $appgw -Name "fakeName" -Subnet $gwSubnet } "*does not exist*"
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Remove-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName2
Remove-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway $appgw -Name $authCertName
Remove-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName2
Remove-AzApplicationGatewayCustomError -ApplicationGateway $appgw -StatusCode HttpStatus403
Remove-AzApplicationGatewaySslCertificate -ApplicationGateway $appgw -Name $sslCert01Name
Remove-AzApplicationGatewayFrontendPort -ApplicationGateway $appgw -Name $frontendPort02Name
Remove-AzApplicationGatewayProbeConfig -ApplicationGateway $appgw -Name $probeName
Remove-AzApplicationGatewayRedirectConfiguration -ApplicationGateway $appgw -Name $redirectName
Remove-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName
Remove-AzApplicationGatewaySslPolicy -ApplicationGateway $appgw -Force
Assert-ThrowsLike { Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $appgw -Force } "*doesn't have*"
Assert-ThrowsLike { Remove-AzApplicationGatewaySslPolicy -ApplicationGateway $appgw -Force } "*doesn't have*"
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-Null $appgw.AuthenticationCertificates
Assert-NotNull $appgw.BackendAddressPools
Assert-NotNull $appgw.BackendAddressPools.Count 1
Assert-NotNull $appgw.FrontendIpConfigurations
Assert-AreEqual $appgw.FrontendIpConfigurations.Count 1
Assert-Null $appgw.CustomErrorConfigurations
Assert-Null $appgw.SslCertificates
Assert-NotNull $appgw.FrontendPorts
Assert-AreEqual $appgw.FrontendPorts.Count 1
Assert-Null $appgw.Probes
Assert-Null $appgw.RedirectConfigurations
Assert-Null $appgw.UrlPathMaps
Assert-Null $appgw.SslPolicy
Stop-AzApplicationGateway -ApplicationGateway $appgw;
Add-AzApplicationGatewayIPConfiguration -Name $gipconfigname2 -Subnet $gwSubnet2 -ApplicationGateway $appgw
Assert-ThrowsLike { Add-AzApplicationGatewayIPConfiguration -Name $gipconfigname2 -Subnet $gwSubnet2 -ApplicationGateway $appgw } "*already exists*"
Remove-AzApplicationGatewayIPConfiguration -Name $gipconfigname -ApplicationGateway $appgw
Add-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName2 -SubnetId $gwSubnet2.Id -PrivateIpAddress 10.0.0.7
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$ipConfig = Get-AzApplicationGatewayIPConfiguration -ApplicationGateway $appgw -Name $gipconfigname2
Start-AzApplicationGateway -ApplicationGateway $appgw;
Stop-AzApplicationGateway -ApplicationGateway $appgw;
Set-AzApplicationGatewayIPConfiguration -Name $gipconfigname2 -Subnet $gwSubnet -ApplicationGateway $appgw
Set-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName2 -Subnet $gwSubnet -ApplicationGateway $appgw -PrivateIpAddress 10.0.0.7
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$result = Remove-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Force -PassThru
Assert-ThrowsLike { Stop-AzApplicationGateway -ApplicationGateway $appgw } "*not found*"
Assert-ThrowsLike { Set-AzApplicationGateway -ApplicationGateway $appgw } "*not found*"
Assert-ThrowsLike { Start-AzApplicationGateway -ApplicationGateway $appgw } "*not found*"
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayCRUDSubItems2
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "West US 2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$vnetName2 = Get-ResourceName
$gwSubnetName2 = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$listener02Name = Get-ResourceName
$listener03Name = Get-ResourceName
$poolName = Get-ResourceName
$poolName02 = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$poolSetting02Name = Get-ResourceName
$probeName = Get-ResourceName
$rule01Name = Get-ResourceName
$rule02Name = Get-ResourceName
$customError403Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError403Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$urlPathMapName = Get-ResourceName
$urlPathMapName2 = Get-ResourceName
$PathRuleName = Get-ResourceName
$PathRule01Name = Get-ResourceName
$redirectName = Get-ResourceName
$sslCert01Name = Get-ResourceName
$rewriteRuleName = Get-ResourceName
$rewriteRuleSetName = Get-ResourceName
$wafPolicy = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$gwSubnet2 = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -AddressPrefix 11.0.1.0/24
$vnet2 = New-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname -Location $location -AddressPrefix 11.0.0.0/8 -Subnet $gwSubnet2
$vnet2 = Get-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname
$gwSubnet2 = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -VirtualNetwork $vnet2
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$fp02 = New-AzApplicationGatewayFrontendPort -Name $frontendPort02Name -Port 443
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01 -RequireServerNameIndication false
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name WAF_v2 -Tier WAF_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
Assert-AreEqual $autoscaleConfig.MinCapacity 3
$redirectConfig = New-AzApplicationGatewayRedirectConfiguration -Name $redirectName -RedirectType Permanent -TargetListener $listener01 -IncludePath $true -IncludeQueryString $true
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "abc" -HeaderValue "def"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet
$rewriteRuleSet = New-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -RewriteRule $rewriteRule
$videoPathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRuleName -Paths "/video" -RedirectConfiguration $redirectConfig -RewriteRuleSet $rewriteRuleSet
Assert-AreEqual $videoPathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
$imagePathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRule01Name -Paths "/image" -RedirectConfigurationId $redirectConfig.Id -RewriteRuleSetId $rewriteRuleSet.Id
Assert-AreEqual $imagePathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
$urlPathMap = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName -PathRules $videoPathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01
$urlPathMap2 = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName2 -PathRules $videoPathRule,$imagePathRule -DefaultRedirectConfiguration $redirectConfig -DefaultRewriteRuleSet $rewriteRuleSet
$probe = New-AzApplicationGatewayProbeConfig -Name $probeName -Protocol Http -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -MinServers 1 -PickHostNameFromBackendHttpSettings
$pw01 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$sslCert01Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert1.pfx"
$sslCert = New-AzApplicationGatewaySslCertificate -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01,$fp02 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -AutoscaleConfiguration $autoscaleConfig -UrlPathMap $urlPathMap,$urlPathMap2 -RedirectConfiguration $redirectConfig -Probe $probe -SslCertificate $sslCert -RewriteRuleSet $rewriteRuleSet
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$certFilePath2 = $basedir + "/ScenarioTests/Data/TrustedRootCertificate.cer"
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath
Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
Add-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting02Name -Port 1234 -Protocol Http -CookieBasedAffinity Enabled -RequestTimeout 42 -HostName test -Path /test -AffinityCookieName test
$fipconfig = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestHostName -RequireServerNameIndication true -SslCertificate $sslCert
$listener02 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener03Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestName -SslCertificate $sslCert
$urlPathMap = Get-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName
Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule02Name -RuleType PathBasedRouting -HttpListener $listener02 -UrlPathMap $urlPathMap
Assert-ThrowsLike { Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName02 -BackendIPAddresses www.microsoft.com -BackendFqdns www.bing.com } "*At most one of*can be specified*"
Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName02 -BackendFqdns www.bing.com,www.microsoft.com
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-NotNull $appgw.HttpListeners[0].CustomErrorConfigurations
Assert-NotNull $appgw.TrustedRootCertificates
Assert-AreEqual $appgw.BackendHttpSettingsCollection.Count 2
Assert-AreEqual $appgw.HttpListeners.Count 3
Assert-AreEqual $appgw.RequestRoutingRules.Count 2
$trustedCert = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName
Assert-NotNull $trustedCert
$trustedCerts = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw
Assert-NotNull $trustedCerts
Assert-AreEqual $trustedCerts.Count 1
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
Set-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $appgw -MinCapacity 2
Set-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url02
$disabledRuleGroup1 = New-AzApplicationGatewayFirewallDisabledRuleGroupConfig -RuleGroupName "crs_41_sql_injection_attacks" -Rules 981318,981320
$disabledRuleGroup2 = New-AzApplicationGatewayFirewallDisabledRuleGroupConfig -RuleGroupName "crs_35_bad_robots"
$exclusion1 = New-AzApplicationGatewayFirewallExclusionConfig -Variable "RequestHeaderNames" -Operator "StartsWith" -Selector "xyz"
$exclusion2 = New-AzApplicationGatewayFirewallExclusionConfig -Variable "RequestArgNames" -Operator "Equals" -Selector "a"
Set-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway $appgw -Enabled $true -FirewallMode Prevention -RuleSetType "OWASP" -RuleSetVersion "2.2.9" -DisabledRuleGroups $disabledRuleGroup1,$disabledRuleGroup2 -RequestBodyCheck $true -MaxRequestBodySizeInKb 80 -FileUploadLimitInMb 70 -Exclusion $exclusion1,$exclusion2
Set-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath2
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.Enabled $true
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.FirewallMode "Prevention"
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.RuleSetType "OWASP"
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.RuleSetVersion "2.2.9"
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.DisabledRuleGroups.Count 2
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.RequestBodyCheck $true
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.MaxRequestBodySizeInKb 80
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.FileUploadLimitInMb 70
Assert-AreEqual $appgw.WebApplicationFirewallConfiguration.Exclusions.Count 2
Assert-ThrowsLike { Set-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus408 -CustomErrorPageUrl $customError403Url02 } "*does not exist*"
Assert-ThrowsLike { Set-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name "fakeName" -CertificateFile $certFilePath } "*does not exist*"
$job = Get-AzApplicationGatewayBackendHealth -Name $appgwName -ResourceGroupName $rgname -ExpandResource "backendhealth/applicationgatewayresource" -AsJob
$job | Wait-Job
$backendHealth = $job | Receive-Job
Assert-NotNull $backendHealth.BackendAddressPools[0].BackendAddressPool.Name
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-AreEqual $appgw.AutoscaleConfiguration.MinCapacity 2
Remove-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName
Remove-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting02Name
Remove-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule02Name
Remove-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-Null $appgw.TrustedRootCertificates
Assert-AreEqual $appgw.BackendHttpSettingsCollection.Count 1
Assert-AreEqual $appgw.RequestRoutingRules.Count 1
Assert-AreEqual $appgw.HttpListeners.Count 2
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-AvailableServerVariableAndHeader
{
$result = Get-AzApplicationGatewayAvailableServerVariableAndHeader
Assert-NotNull $result
Assert-True { $result.AvailableServerVariable.Count -gt 0 }
Assert-True { $result.AvailableRequestHeader.Count -gt 0 }
Assert-True { $result.AvailableResponseHeader.Count -gt 0 }
$result = Get-AzApplicationGatewayAvailableServerVariableAndHeader -ServerVariable -RequestHeader -ResponseHeader
Assert-NotNull $result
Assert-True { $result.AvailableServerVariable.Count -gt 0 }
Assert-True { $result.AvailableRequestHeader.Count -gt 0 }
Assert-True { $result.AvailableResponseHeader.Count -gt 0 }
$result = Get-AzApplicationGatewayAvailableServerVariableAndHeader -ServerVariable
Assert-NotNull $result
Assert-True { $result.AvailableServerVariable.Count -gt 0 }
$result = Get-AzApplicationGatewayAvailableServerVariableAndHeader -RequestHeader
Assert-NotNull $result
Assert-True { $result.AvailableRequestHeader.Count -gt 0 }
$result = Get-AzApplicationGatewayAvailableServerVariableAndHeader -ResponseHeader
Assert-NotNull $result
Assert-True { $result.AvailableResponseHeader.Count -gt 0 }
}
function Test-ApplicationGatewayTopLevelFirewallPolicy
{
param
(
$basedir = "./"
)
$location = Get-ProviderLocation "Microsoft.Network/applicationGateways" "West US 2"
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$vnetName2 = Get-ResourceName
$gwSubnetName2 = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$listener02Name = Get-ResourceName
$listener03Name = Get-ResourceName
$poolName = Get-ResourceName
$poolName02 = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$poolSetting02Name = Get-ResourceName
$probeName = Get-ResourceName
$rule01Name = Get-ResourceName
$rule02Name = Get-ResourceName
$customError403Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError403Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$urlPathMapName = Get-ResourceName
$urlPathMapName2 = Get-ResourceName
$PathRuleName = Get-ResourceName
$PathRule01Name = Get-ResourceName
$redirectName = Get-ResourceName
$sslCert01Name = Get-ResourceName
$rewriteRuleName = Get-ResourceName
$rewriteRuleSetName = Get-ResourceName
$wafPolicy = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$gwSubnet2 = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -AddressPrefix 11.0.1.0/24
$vnet2 = New-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname -Location $location -AddressPrefix 11.0.0.0/8 -Subnet $gwSubnet2
$vnet2 = Get-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname
$gwSubnet2 = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -VirtualNetwork $vnet2
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$fp02 = New-AzApplicationGatewayFrontendPort -Name $frontendPort02Name -Port 443
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01 -RequireServerNameIndication false
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name WAF_v2 -Tier WAF_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
Assert-AreEqual $autoscaleConfig.MinCapacity 3
$redirectConfig = New-AzApplicationGatewayRedirectConfiguration -Name $redirectName -RedirectType Permanent -TargetListener $listener01 -IncludePath $true -IncludeQueryString $true
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "abc" -HeaderValue "def"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet
$rewriteRuleSet = New-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -RewriteRule $rewriteRule
$videoPathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRuleName -Paths "/video" -RedirectConfiguration $redirectConfig -RewriteRuleSet $rewriteRuleSet
Assert-AreEqual $videoPathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
$imagePathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRule01Name -Paths "/image" -RedirectConfigurationId $redirectConfig.Id -RewriteRuleSetId $rewriteRuleSet.Id
Assert-AreEqual $imagePathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
$urlPathMap = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName -PathRules $videoPathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01
$urlPathMap2 = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName2 -PathRules $videoPathRule,$imagePathRule -DefaultRedirectConfiguration $redirectConfig -DefaultRewriteRuleSet $rewriteRuleSet
$probe = New-AzApplicationGatewayProbeConfig -Name $probeName -Protocol Http -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -MinServers 1 -PickHostNameFromBackendHttpSettings
$pw01 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$sslCert01Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert1.pfx"
$sslCert = New-AzApplicationGatewaySslCertificate -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01,$fp02 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -AutoscaleConfiguration $autoscaleConfig -UrlPathMap $urlPathMap,$urlPathMap2 -RedirectConfiguration $redirectConfig -Probe $probe -SslCertificate $sslCert -RewriteRuleSet $rewriteRuleSet
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$certFilePath2 = $basedir + "/ScenarioTests/Data/TrustedRootCertificate.cer"
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath
Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
Add-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting02Name -Port 1234 -Protocol Http -CookieBasedAffinity Enabled -RequestTimeout 42 -HostName test -Path /test -AffinityCookieName test
$fipconfig = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestHostName -RequireServerNameIndication true -SslCertificate $sslCert
$listener02 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener03Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestName -SslCertificate $sslCert
$urlPathMap = Get-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName
Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule02Name -RuleType PathBasedRouting -HttpListener $listener02 -UrlPathMap $urlPathMap
Assert-ThrowsLike { Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01 } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName02 -BackendIPAddresses www.microsoft.com -BackendFqdns www.bing.com } "*At most one of*can be specified*"
Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName02 -BackendFqdns www.bing.com,www.microsoft.com
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-NotNull $appgw.HttpListeners[0].CustomErrorConfigurations
Assert-NotNull $appgw.TrustedRootCertificates
Assert-AreEqual $appgw.BackendHttpSettingsCollection.Count 2
Assert-AreEqual $appgw.HttpListeners.Count 3
Assert-AreEqual $appgw.RequestRoutingRules.Count 2
$trustedCert = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName
Assert-NotNull $trustedCert
$trustedCerts = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw
Assert-NotNull $trustedCerts
Assert-AreEqual $trustedCerts.Count 1
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
Set-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway $appgw -MinCapacity 2
Set-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url02
Set-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway $appgw -Enabled $true -FirewallMode Prevention -RuleSetType "OWASP" -RuleSetVersion "3.0" -RequestBodyCheck $true -MaxRequestBodySizeInKb 70 -FileUploadLimitInMb 70
Set-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath2
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$variable = New-AzApplicationGatewayFirewallMatchVariable -VariableName RequestHeaders -Selector Content-Length
$condition = New-AzApplicationGatewayFirewallCondition -MatchVariable $variable -Operator GreaterThan -MatchValue 1000 -Transform Lowercase -NegationCondition $False
$rule = New-AzApplicationGatewayFirewallCustomRule -Name example -Priority 2 -RuleType MatchRule -MatchCondition $condition -Action Block
$policySettings = New-AzApplicationGatewayFirewallPolicySetting -Mode Prevention -State Enabled -MaxFileUploadInMb 70 -MaxRequestBodySizeInKb 70
$managedRuleSet = New-AzApplicationGatewayFirewallPolicyManagedRuleSet -RuleSetType "OWASP" -RuleSetVersion "3.0"
$managedRule = New-AzApplicationGatewayFirewallPolicyManagedRule -ManagedRuleSet $managedRuleSet
$wafPolicyName = "wafPolicy1"
New-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname -Location $location -ManagedRule $managedRule -PolicySetting $policySettings
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
$appgw.FirewallPolicy = $policy
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
$policy.CustomRules = $rule
Set-AzApplicationGatewayFirewallPolicy -InputObject $policy
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
Assert-AreEqual $policy.Id $appgw.FirewallPolicy.Id
Assert-AreEqual $policy.CustomRules[0].Name $rule.Name
Assert-AreEqual $policy.CustomRules[0].RuleType $rule.RuleType
Assert-AreEqual $policy.CustomRules[0].Action $rule.Action
Assert-AreEqual $policy.CustomRules[0].Priority $rule.Priority
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].OperatorProperty $rule.MatchConditions[0].OperatorProperty
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].Transforms[0] $rule.MatchConditions[0].Transforms[0]
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].NegationConditon $rule.MatchConditions[0].NegationConditon
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchValues[0] $rule.MatchConditions[0].MatchValues[0]
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchVariables[0].VariableName $rule.MatchConditions[0].MatchVariables[0].VariableName
Assert-AreEqual $policy.CustomRules[0].MatchConditions[0].MatchVariables[0].Selector $rule.MatchConditions[0].MatchVariables[0].Selector
Assert-AreEqual $policy.PolicySettings.FileUploadLimitInMb $policySettings.FileUploadLimitInMb
Assert-AreEqual $policy.PolicySettings.MaxRequestBodySizeInKb $policySettings.MaxRequestBodySizeInKb
Assert-AreEqual $policy.PolicySettings.RequestBodyCheck $policySettings.RequestBodyCheck
Assert-AreEqual $policy.PolicySettings.Mode $policySettings.Mode
Assert-AreEqual $policy.PolicySettings.State $policySettings.State
$exclusionEntry = New-AzApplicationGatewayFirewallPolicyExclusion -MatchVariable RequestArgNames -SelectorMatchOperator Contains -Selector Bingo
$ruleOverrideEntry1 = New-AzApplicationGatewayFirewallPolicyManagedRuleOverride -RuleId 942100
$ruleOverrideEntry2 = New-AzApplicationGatewayFirewallPolicyManagedRuleOverride -RuleId 942110
$sqlRuleGroupOverrideEntry = New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride -RuleGroupName REQUEST-942-APPLICATION-ATTACK-SQLI -Rule $ruleOverrideEntry1,$ruleOverrideEntry2
$ruleOverrideEntry3 = New-AzApplicationGatewayFirewallPolicyManagedRuleOverride -RuleId 941100
$xssRuleGroupOverrideEntry = New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride -RuleGroupName REQUEST-941-APPLICATION-ATTACK-XSS -Rule $ruleOverrideEntry3
$managedRuleSet = New-AzApplicationGatewayFirewallPolicyManagedRuleSet -RuleSetType "OWASP" -RuleSetVersion "3.0" -RuleGroupOverride $sqlRuleGroupOverrideEntry,$xssRuleGroupOverrideEntry
$managedRules = New-AzApplicationGatewayFirewallPolicyManagedRule -ManagedRuleSet $managedRuleSet -Exclusion $exclusionEntry
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
$policySettings = New-AzApplicationGatewayFirewallPolicySetting -Mode Prevention -State Enabled -MaxFileUploadInMb 750 -MaxRequestBodySizeInKb 128
$policy.managedRules = $managedRules
$policy.PolicySettings = $policySettings
Set-AzApplicationGatewayFirewallPolicy -InputObject $policy
$policy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
Assert-AreEqual $policy.ManagedRules.ManagedRuleSets.Count 1
Assert-AreEqual $policy.ManagedRules.ManagedRuleSets[0].RuleGroupOverrides.Count 2
Assert-AreEqual $policy.ManagedRules.Exclusions.Count 1
Assert-AreEqual $policy.PolicySettings.FileUploadLimitInMb $policySettings.FileUploadLimitInMb
Assert-AreEqual $policy.PolicySettings.MaxRequestBodySizeInKb $policySettings.MaxRequestBodySizeInKb
Assert-AreEqual $policy.PolicySettings.RequestBodyCheck $policySettings.RequestBodyCheck
Assert-AreEqual $policy.PolicySettings.Mode $policySettings.Mode
Assert-AreEqual $policy.PolicySettings.State $policySettings.State
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ApplicationGatewayWithFirewallPolicy
{
param
(
$basedir = "./"
)
$rgname = Get-ResourceGroupName
$appgwName = Get-ResourceName
$vnetName = Get-ResourceName
$gwSubnetName = Get-ResourceName
$vnetName2 = Get-ResourceName
$gwSubnetName2 = Get-ResourceName
$publicIpName = Get-ResourceName
$gipconfigname = Get-ResourceName
$frontendPort01Name = Get-ResourceName
$frontendPort02Name = Get-ResourceName
$fipconfigName = Get-ResourceName
$listener01Name = Get-ResourceName
$listener02Name = Get-ResourceName
$listener03Name = Get-ResourceName
$poolName = Get-ResourceName
$poolName02 = Get-ResourceName
$trustedRootCertName = Get-ResourceName
$poolSetting01Name = Get-ResourceName
$poolSetting02Name = Get-ResourceName
$probeName = Get-ResourceName
$rule01Name = Get-ResourceName
$rule02Name = Get-ResourceName
$customError403Url01 = "https://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$customError403Url02 = "http://mycustomerrorpages.blob.core.windows.net/errorpages/403-another.htm"
$urlPathMapName = Get-ResourceName
$urlPathMapName2 = Get-ResourceName
$PathRuleName = Get-ResourceName
$PathRule01Name = Get-ResourceName
$redirectName = Get-ResourceName
$sslCert01Name = Get-ResourceName
$rewriteRuleName = Get-ResourceName
$rewriteRuleSetName = Get-ResourceName
try
{
$location = "centraluseuap"
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location -Tags @{ testtag = "APPGw tag"}
$gwSubnet = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -AddressPrefix 10.0.0.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $gwSubnet
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
$gwSubnet = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName -VirtualNetwork $vnet
$gwSubnet2 = New-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -AddressPrefix 11.0.1.0/24
$vnet2 = New-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname -Location $location -AddressPrefix 11.0.0.0/8 -Subnet $gwSubnet2
$vnet2 = Get-AzVirtualNetwork -Name $vnetName2 -ResourceGroupName $rgname
$gwSubnet2 = Get-AzVirtualNetworkSubnetConfig -Name $gwSubnetName2 -VirtualNetwork $vnet2
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -sku Standard
$gipconfig = New-AzApplicationGatewayIPConfiguration -Name $gipconfigname -Subnet $gwSubnet
$fipconfig = New-AzApplicationGatewayFrontendIPConfig -Name $fipconfigName -PublicIPAddress $publicip
$fp01 = New-AzApplicationGatewayFrontendPort -Name $frontendPort01Name -Port 80
$fp02 = New-AzApplicationGatewayFrontendPort -Name $frontendPort02Name -Port 443
$listenerPolicyName = "listenerhttpPolicy"
$policySetting = New-AzApplicationGatewayFirewallPolicySetting -Mode "Prevention" -State Enabled -MaxFileUploadInMb 300
New-AzApplicationGatewayFirewallPolicy -Name $listenerPolicyName -ResourceGroupName $rgname -Location $location -PolicySetting $policySetting
$httpPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $listenerPolicyName -ResourceGroupName $rgname
Assert-AreEqual $httpPolicy.PolicySettings.FileUploadLimitInMb $policySetting.FileUploadLimitInMb
Assert-AreEqual $httpPolicy.PolicySettings.Mode $policySetting.Mode
Assert-AreEqual $httpPolicy.PolicySettings.State $policySetting.State
$listener01 = New-AzApplicationGatewayHttpListener -Name $listener01Name -Protocol Http -FrontendIPConfiguration $fipconfig -FrontendPort $fp01 -RequireServerNameIndication false -FirewallPolicy $httpPolicy
Assert-AreEqual $listener01.FirewallPolicy.Id $httpPolicy.Id
$pool = New-AzApplicationGatewayBackendAddressPool -Name $poolName -BackendIPAddresses www.microsoft.com, www.bing.com
$poolSetting01 = New-AzApplicationGatewayBackendHttpSettings -Name $poolSetting01Name -Port 443 -Protocol Https -CookieBasedAffinity Enabled -PickHostNameFromBackendAddress
$rule01 = New-AzApplicationGatewayRequestRoutingRule -Name $rule01Name -RuleType basic -BackendHttpSettings $poolSetting01 -HttpListener $listener01 -BackendAddressPool $pool
$sku = New-AzApplicationGatewaySku -Name WAF_v2 -Tier WAF_v2
$autoscaleConfig = New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity 3
Assert-AreEqual $autoscaleConfig.MinCapacity 3
$redirectConfig = New-AzApplicationGatewayRedirectConfiguration -Name $redirectName -RedirectType Permanent -TargetListener $listener01 -IncludePath $true -IncludeQueryString $true
$headerConfiguration = New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName "abc" -HeaderValue "def"
$actionSet = New-AzApplicationGatewayRewriteRuleActionSet -RequestHeaderConfiguration $headerConfiguration
$rewriteRule = New-AzApplicationGatewayRewriteRule -Name $rewriteRuleName -ActionSet $actionSet
$rewriteRuleSet = New-AzApplicationGatewayRewriteRuleSet -Name $rewriteRuleSetName -RewriteRule $rewriteRule
$videoPolicyName = "videoPolicyName"
$policySetting = New-AzApplicationGatewayFirewallPolicySetting -Mode "Prevention" -State Enabled -MaxFileUploadInMb 150
New-AzApplicationGatewayFirewallPolicy -Name $videoPolicyName -ResourceGroupName $rgname -Location $location -PolicySetting $policySetting
$videoPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $videoPolicyName -ResourceGroupName $rgname
Assert-AreEqual $videoPolicy.PolicySettings.FileUploadLimitInMb $policySetting.FileUploadLimitInMb
Assert-AreEqual $videoPolicy.PolicySettings.Mode $policySetting.Mode
Assert-AreEqual $videoPolicy.PolicySettings.State $policySetting.State
$imagePolicyName = "imagePolicyName"
$policySetting = New-AzApplicationGatewayFirewallPolicySetting -Mode "Prevention" -State Enabled -MaxFileUploadInMb 50
New-AzApplicationGatewayFirewallPolicy -Name $imagePolicyName -ResourceGroupName $rgname -Location $location -PolicySetting $policySetting
$imagePolicy = Get-AzApplicationGatewayFirewallPolicy -Name $imagePolicyName -ResourceGroupName $rgname
Assert-AreEqual $imagePolicy.PolicySettings.FileUploadLimitInMb $policySetting.FileUploadLimitInMb
Assert-AreEqual $imagePolicy.PolicySettings.Mode $policySetting.Mode
Assert-AreEqual $imagePolicy.PolicySettings.State $policySetting.State
$videoPathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRuleName -Paths "/video" -RedirectConfiguration $redirectConfig -RewriteRuleSet $rewriteRuleSet -FirewallPolicy $videoPolicy
Assert-AreEqual $videoPathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
Assert-AreEqual $videoPathRule.FirewallPolicy.Id $videoPolicy.Id
$imagePathRule = New-AzApplicationGatewayPathRuleConfig -Name $PathRule01Name -Paths "/image" -RedirectConfigurationId $redirectConfig.Id -RewriteRuleSetId $rewriteRuleSet.Id -FirewallPolicyId $imagePolicy.Id
Assert-AreEqual $imagePathRule.RewriteRuleSet.Id $rewriteRuleSet.Id
Assert-AreEqual $imagePathRule.FirewallPolicy.Id $imagePolicy.Id
$urlPathMap = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName -PathRules $videoPathRule -DefaultBackendAddressPool $pool -DefaultBackendHttpSettings $poolSetting01
$urlPathMap2 = New-AzApplicationGatewayUrlPathMapConfig -Name $urlPathMapName2 -PathRules $videoPathRule,$imagePathRule -DefaultRedirectConfiguration $redirectConfig -DefaultRewriteRuleSet $rewriteRuleSet
$probe = New-AzApplicationGatewayProbeConfig -Name $probeName -Protocol Http -Path "/path/path.htm" -Interval 89 -Timeout 88 -UnhealthyThreshold 8 -MinServers 1 -PickHostNameFromBackendHttpSettings
$pw01 = ConvertTo-SecureString "P@ssw0rd" -AsPlainText -Force
$sslCert01Path = $basedir + "/ScenarioTests/Data/ApplicationGatewaySslCert1.pfx"
$sslCert = New-AzApplicationGatewaySslCertificate -Name $sslCert01Name -CertificateFile $sslCert01Path -Password $pw01
$appgw = New-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname -Location $location -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp01,$fp02 -HttpListeners $listener01 -RequestRoutingRules $rule01 -Sku $sku -AutoscaleConfiguration $autoscaleConfig -UrlPathMap $urlPathMap,$urlPathMap2 -RedirectConfiguration $redirectConfig -Probe $probe -SslCertificate $sslCert -RewriteRuleSet $rewriteRuleSet
$certFilePath = $basedir + "/ScenarioTests/Data/ApplicationGatewayAuthCert.cer"
$certFilePath2 = $basedir + "/Scenario/Data/TrustedRootCertificate.cer"
$listener01 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener01Name
Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath
Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01
Add-AzApplicationGatewayBackendHttpSettings -ApplicationGateway $appgw -Name $poolSetting02Name -Port 1234 -Protocol Http -CookieBasedAffinity Enabled -RequestTimeout 42 -HostName test -Path /test -AffinityCookieName test
$fipconfig = Get-AzApplicationGatewayFrontendIPConfig -ApplicationGateway $appgw -Name $fipconfigName
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestHostName -RequireServerNameIndication true -SslCertificate $sslCert
$listener02 = Get-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener02Name
Add-AzApplicationGatewayHttpListener -ApplicationGateway $appgw -Name $listener03Name -Protocol Https -FrontendIPConfiguration $fipconfig -FrontendPort $fp02 -HostName TestName -SslCertificate $sslCert
$urlPathMap = Get-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway $appgw -Name $urlPathMapName
Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway $appgw -Name $rule02Name -RuleType PathBasedRouting -HttpListener $listener02 -UrlPathMap $urlPathMap
Assert-ThrowsLike { Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName -CertificateFile $certFilePath } "*already exists*"
Assert-ThrowsLike { Add-AzApplicationGatewayHttpListenerCustomError -HttpListener $listener01 -StatusCode HttpStatus403 -CustomErrorPageUrl $customError403Url01 } "*already exists*"
Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway $appgw -Name $poolName02 -BackendFqdns www.bing.com,www.microsoft.com
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
Assert-NotNull $appgw.HttpListeners[0].CustomErrorConfigurations
Assert-NotNull $appgw.TrustedRootCertificates
Assert-AreEqual $appgw.BackendHttpSettingsCollection.Count 2
Assert-AreEqual $appgw.HttpListeners.Count 3
Assert-AreEqual $appgw.RequestRoutingRules.Count 2
Assert-AreEqual $appgw.HttpListeners[0].FirewallPolicy.Id $httpPolicy.Id
Assert-AreEqual $appgw.UrlPathMaps[1].PathRules[0].FirewallPolicy.Id $videoPolicy.Id
Assert-AreEqual $appgw.UrlPathMaps[1].PathRules[1].FirewallPolicy.Id $imagePolicy.Id
$trustedCert = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw -Name $trustedRootCertName
Assert-NotNull $trustedCert
$trustedCerts = Get-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway $appgw
Assert-NotNull $trustedCerts
Assert-AreEqual $trustedCerts.Count 1
$policySettings = New-AzApplicationGatewayFirewallPolicySetting -Mode Prevention -State Enabled -MaxFileUploadInMb 70 -MaxRequestBodySizeInKb 70
$managedRuleSet = New-AzApplicationGatewayFirewallPolicyManagedRuleSet -RuleSetType "OWASP" -RuleSetVersion "3.0"
$managedRule = New-AzApplicationGatewayFirewallPolicyManagedRule -ManagedRuleSet $managedRuleSet
$wafPolicyName = "wafPolicy1"
New-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname -Location $location -ManagedRule $managedRule -PolicySetting $policySettings
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$globalPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
$appgw.FirewallPolicy = $globalPolicy
$appgw = Set-AzApplicationGateway -ApplicationGateway $appgw
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$globalPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $wafPolicyName -ResourceGroupName $rgname
Assert-AreEqual $globalPolicy.Id $appgw.FirewallPolicy.Id
Assert-AreEqual $globalPolicy.PolicySettings.FileUploadLimitInMb $policySettings.FileUploadLimitInMb
Assert-AreEqual $globalPolicy.PolicySettings.MaxRequestBodySizeInKb $policySettings.MaxRequestBodySizeInKb
Assert-AreEqual $globalPolicy.PolicySettings.RequestBodyCheck $policySettings.RequestBodyCheck
Assert-AreEqual $globalPolicy.PolicySettings.Mode $policySettings.Mode
Assert-AreEqual $globalPolicy.PolicySettings.State $policySettings.State
$globalPolicyName2 = "globalpolicy2"
New-AzApplicationGatewayFirewallPolicy -Name $globalPolicyName2 -ResourceGroupName $rgname -Location $location
$globalPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $globalPolicyName2 -ResourceGroupName $rgname
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$appgw.FirewallPolicy = $globalPolicy
Set-AzApplicationGateway -ApplicationGateway $appgw
$appgw = Get-AzApplicationGateway -Name $appgwName -ResourceGroupName $rgname
$globalPolicy = Get-AzApplicationGatewayFirewallPolicy -Name $globalPolicyName2 -ResourceGroupName $rgname
Assert-AreEqual $globalPolicy.Id $appgw.FirewallPolicy.Id
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_67_91.ps1
|
sample_67_91.ps1
|
ConvertFrom-StringData @'
###PSLOC
NoADModule = ActiveDirectory module is not installed. Please install the module and try again.
ComputerAccountMissing = No computer account for {0} found in OU {1}. Recovery keys are not avialable in Active Directory
ComputerAccountExists = Computer account(s) {0} look up OU {1} was {2}. Expected {3}
BitlockerKeyMissing = Computer {0} is missing Bitlocker recovery keys.
BitlockerKeyExists = Computer {0} has Bitlocker recovery keys.
Nodetachedvdisks = No detached virtual disks found
NoProtectedDisks = No virtual disks are protected by Bitlocker. Please ensure that all virtual disks are protected by Bitlocker before proceeding.
'@
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCIDispQUHp2R7p
# 5PDeDBJ5th/A7STCLd8MPA81KRbKcqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOO6fTQSRNxhcsTcZhNhZ+9T
# pX2vvG3uXuW+vSj3qXhGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAojXhWtAThrojps1XpH9QubT9Ekd5blna3/eOWo88noYAkV2/8MQkJRA+
# L+QtEfqe6avU5azQqPsgOQmno4lpudWKp8HCRANh0Jv+XceEi/iBC51pyrPkCGlG
# DEp3QraD08Jp3ZuZu4KPMnQ7evMHoVeQRwity8iWKMmri4uN0IgnaJ3rzqarE8tm
# DTI8Dfm5rJI6tokwqLvodDnO0TcHOTa5q7esUeVfdRLgasfaotbQUBCSvsYf4hXF
# 9F7GAfp9ak+QGkNqP2Ny3MU6dUITQBWqa5GkZkAyyjj1Dgx6PamhR2cE0bCzerJe
# SYA4sVXCENS67MTGkx3DecfiFGOzGKGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB8RD8xNHA5F0qW3JQvyQ9I1PUfdMp2l6P0HfOHV9F32gIGZkYZ0Mug
# GBMyMDI0MDUxNjE4NDQyNS4zOTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHpMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM
# MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCYTzAiGA8yMDI0MDUxNjE0MzU1
# OVoYDzIwMjQwNTE3MTQzNTU5WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDp8JhP
# AgEAMAYCAQACASAwBwIBAAICElcwCgIFAOnx6c8CAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEAjk+W0YnLhKp0SORNHGi4JzUkO1Yu9ka8hF0KsneXGY/w7cVX
# S7HieMN6zuxvjYkbafq4NuTYjnvv/HBW973d8eDf263+FvdNnLz8xu2aV5alXEyQ
# JBQUDYlMpBkSVUJ+RQle+NnUbJGDdNv/MyVMWMnYw1UdkslSZz11w9uAyTuy116B
# 0hAaV1nsg9IbBxI6e0aTaXzvupqytlF0OhEuIAPZtQsDUzP8i6y3G7IC9N29AZrD
# 42CxAI7zgtKauOjrfyPDYo+D+KXip+I1MMbYGQeJ9J3ZU7xTJTJeVKTfIKuWb+sH
# OrQADlVGd+SZqhcJ5LXJ/ubTEsyEFoPoODPYdzGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIC2ObGlGRR/r24+tkc2yPesgTWOWedBq5e3b4w5VwsWMMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7TF8lP
# YndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCCn0IYn/ySGCFfhzdyA0xzr4MGrVGRb
# JrdweyhslNIENjANBgkqhkiG9w0BAQsFAASCAgC6tPW2H3xaYUriX+veduJV/3d0
# tmKkkiStyeb8Bavls/K0NGiJYPTC3HvA2IfwYg7M3Dlbzw8+blDnklA0bhzaAqJ8
# nJbS7za44BBY1McP9GVgMA8g1c3SQP/yVfYXaTrEizMKEmbE5d61zm9eDulG9Ssa
# a7bMXkZeV6pTStwx6B8Os5Zi+oJ4JTtrNpxnTCTM0/agNPrZ3mBLpXiDG6QMpxZn
# mdoBkhJxF/yIwG68Wyv62QPg7XWQeZhWMhe0wP8d7buYXewxE+majAU7q8XfHxj/
# fXm7H7wcm+m0qTfOF1ISLDB6HJbVqkJmZyKnFrweTz6dzdbTz51VK0NzXNN2IZMR
# xpaTGR7pH+1l2CYQgXYvkRoXnlnfk6nk+lqoirODg12AFZAhcp2mENseHLT7jFlK
# YQuSh8LfMfgvGQzIr2GaBXUlNdvTATCDWlTcCTFRGIDOX4gJaPViTt5+mERbpOQQ
# IRnb6ftQjK2g56fnA++9ApRDSWvJJ+m8dq2qLWlA8r/98TiuNiOPoelp9Aq3Hkii
# LDTpBoOc26FeztZ0yfIpOlnm3SQ/JavnLhIjmnMyZWZtHAOEcKqQ0G2jAD3XHowQ
# KeNip80vadcR7L66pl8x78xvsqzOCXK2fPy83yX2PREwgBD7tpHAx9tVVLGGqBAY
# z/qYROaOmvbV2NCXMg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_23_77.ps1
|
sample_23_77.ps1
|
#
# Module manifest for module 'OCI.PSModules.Computecloudatcustomer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Computecloudatcustomer.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5ad07485-5877-44d1-87e8-7e7611e4c92b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Computecloudatcustomer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Computecloudatcustomer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIComputecloudatcustomerCccInfrastructure',
'Get-OCIComputecloudatcustomerCccInfrastructuresList',
'Get-OCIComputecloudatcustomerCccUpgradeSchedule',
'Get-OCIComputecloudatcustomerCccUpgradeSchedulesList',
'Move-OCIComputecloudatcustomerCccInfrastructureCompartment',
'Move-OCIComputecloudatcustomerCccUpgradeScheduleCompartment',
'New-OCIComputecloudatcustomerCccInfrastructure',
'New-OCIComputecloudatcustomerCccUpgradeSchedule',
'Remove-OCIComputecloudatcustomerCccInfrastructure',
'Remove-OCIComputecloudatcustomerCccUpgradeSchedule',
'Update-OCIComputecloudatcustomerCccInfrastructure',
'Update-OCIComputecloudatcustomerCccUpgradeSchedule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Computecloudatcustomer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_64_90.ps1
|
sample_64_90.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loadbalancer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loadbalancer.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f5ec8fef-b511-4f9f-910d-3600a849ca41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loadbalancer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loadbalancer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCILoadbalancer', 'Get-OCILoadbalancerBackend',
'Get-OCILoadbalancerBackendHealth', 'Get-OCILoadbalancerBackendSet',
'Get-OCILoadbalancerBackendSetHealth',
'Get-OCILoadbalancerBackendSetsList',
'Get-OCILoadbalancerBackendsList',
'Get-OCILoadbalancerCertificatesList', 'Get-OCILoadbalancerHealth',
'Get-OCILoadbalancerHealthChecker',
'Get-OCILoadbalancerHealthsList', 'Get-OCILoadbalancerHostname',
'Get-OCILoadbalancerHostnamesList',
'Get-OCILoadbalancerListenerRulesList',
'Get-OCILoadbalancerPathRouteSet',
'Get-OCILoadbalancerPathRouteSetsList',
'Get-OCILoadbalancerPoliciesList',
'Get-OCILoadbalancerProtocolsList',
'Get-OCILoadbalancerRoutingPoliciesList',
'Get-OCILoadbalancerRoutingPolicy', 'Get-OCILoadbalancerRuleSet',
'Get-OCILoadbalancerRuleSetsList', 'Get-OCILoadbalancerShapesList',
'Get-OCILoadbalancersList', 'Get-OCILoadbalancerSSLCipherSuite',
'Get-OCILoadbalancerSSLCipherSuitesList',
'Get-OCILoadbalancerWorkRequest',
'Get-OCILoadbalancerWorkRequestsList',
'Move-OCILoadbalancerCompartment', 'New-OCILoadbalancer',
'New-OCILoadbalancerBackend', 'New-OCILoadbalancerBackendSet',
'New-OCILoadbalancerCertificate', 'New-OCILoadbalancerHostname',
'New-OCILoadbalancerListener', 'New-OCILoadbalancerPathRouteSet',
'New-OCILoadbalancerRoutingPolicy', 'New-OCILoadbalancerRuleSet',
'New-OCILoadbalancerSSLCipherSuite', 'Remove-OCILoadbalancer',
'Remove-OCILoadbalancerBackend', 'Remove-OCILoadbalancerBackendSet',
'Remove-OCILoadbalancerCertificate',
'Remove-OCILoadbalancerHostname', 'Remove-OCILoadbalancerListener',
'Remove-OCILoadbalancerPathRouteSet',
'Remove-OCILoadbalancerRoutingPolicy',
'Remove-OCILoadbalancerRuleSet',
'Remove-OCILoadbalancerSSLCipherSuite', 'Update-OCILoadbalancer',
'Update-OCILoadbalancerBackend', 'Update-OCILoadbalancerBackendSet',
'Update-OCILoadbalancerHealthChecker',
'Update-OCILoadbalancerHostname', 'Update-OCILoadbalancerListener',
'Update-OCILoadbalancerNetworkSecurityGroups',
'Update-OCILoadbalancerPathRouteSet',
'Update-OCILoadbalancerRoutingPolicy',
'Update-OCILoadbalancerRuleSet', 'Update-OCILoadbalancerShape',
'Update-OCILoadbalancerSSLCipherSuite'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loadbalancer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2214.ps1
|
2214.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true,HelpMessage="Site server where the SMS Provider is installed")]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer,
[parameter(Mandatory=$true,HelpMessage="Name of the Deployment Package")]
[string]$Name,
[parameter(Mandatory=$false,HelpMessage="Description of the Deployment Package")]
[string]$Description,
[parameter(Mandatory=$true,HelpMessage="UNC path to the source location where downloaded patches will be stored")]
[string]$SourcePath
)
Begin {
try {
Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug "SiteCode: $($SiteCode)"
}
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
}
Process {
function Get-DuplicateInfo {
$IsDuplicatePkg = $false
$EnumDeploymentPackages = Get-CimInstance -CimSession $CimSession -Namespace "root\SMS\site_$($SiteCode)" -ClassName SMS_SoftwareUpdatesPackage -ErrorAction SilentlyContinue -Verbose:$false
foreach ($Pkgs in $EnumDeploymentPackages) {
if ($Pkgs.PkgSourcePath -like "$($SourcePath)") {
$IsDuplicatePkg = $true
}
}
return $IsDuplicatePkg
}
function Remove-CimSessions {
foreach ($Session in $(Get-CimSession -ComputerName $SiteServer -ErrorAction SilentlyContinue -Verbose:$false)) {
if ($Session.TestConnection()) {
Write-Verbose -Message "Closing CimSession against '$($Session.ComputerName)'"
Remove-CimSession -CimSession $Session -ErrorAction SilentlyContinue -Verbose:$false
}
}
}
try {
Write-Verbose -Message "Establishing a Cim session against '$($SiteServer)'"
$CimSession = New-CimSession -ComputerName $SiteServer -Verbose:$false
if ((Get-CimInstance -CimSession $CimSession -Namespace "root\SMS\site_$($SiteCode)" -ClassName SMS_SoftwareUpdatesPackage -Filter "Name like '$($Name)'" -ErrorAction SilentlyContinue -Verbose:$false | Measure-Object).Count -eq 0) {
if ((Get-DuplicateInfo) -eq $false) {
$CimProperties = @{
"Name" = "$($Name)"
"PkgSourceFlag" = 2
"PkgSourcePath" = "$($SourcePath)"
}
if ($PSBoundParameters["Description"]) {
$CimProperties.Add("Description",$Description)
}
$CMDeploymentPackage = New-CimInstance -CimSession $CimSession -Namespace "root\SMS\site_$($SiteCode)" -ClassName SMS_SoftwareUpdatesPackage -Property $CimProperties -Verbose:$false -ErrorAction Stop
$PSObject = [PSCustomObject]@{
"Name" = $CMDeploymentPackage.Name
"Description" = $CMDeploymentPackage.Description
"PackageID" = $CMDeploymentPackage.PackageID
"PkgSourcePath" = $CMDeploymentPackage.PkgSourcePath
}
if (-not($PSBoundParameters["WhatIf"])) {
Write-Output $PSObject
}
}
else {
Write-Warning -Message "A Deployment Package with the specified source path already exists"
}
}
else {
Write-Warning -Message "A Deployment Package with the name '$($Name)' already exists"
}
}
catch [Exception] {
Remove-CimSessions
Throw $_.Exception.Message
}
}
End {
Remove-CimSessions
}
|
combined_dataset/train/non-malicious/6.ps1
|
6.ps1
|
$HostSupportsSettingWindowTitle = $null
$OriginalWindowTitle = $null
function Test-WindowTitleIsWriteable {
if ($null -eq $HostSupportsSettingWindowTitle) {
try {
$script:OriginalWindowTitle = $Host.UI.RawUI.WindowTitle
$newTitle = "${OriginalWindowTitle} "
$Host.UI.RawUI.WindowTitle = $newTitle
$script:HostSupportsSettingWindowTitle = ($Host.UI.RawUI.WindowTitle -eq $newTitle)
$Host.UI.RawUI.WindowTitle = $OriginalWindowTitle
Write-Debug "HostSupportsSettingWindowTitle: $HostSupportsSettingWindowTitle"
Write-Debug "OriginalWindowTitle: $OriginalWindowTitle"
}
catch {
$script:OriginalWindowTitle = $null
$script:HostSupportsSettingWindowTitle = $false
Write-Debug "HostSupportsSettingWindowTitle error: $_"
}
}
return $HostSupportsSettingWindowTitle
}
function Reset-WindowTitle {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")]
param()
$settings = $global:GitPromptSettings
if ($HostSupportsSettingWindowTitle -and $OriginalWindowTitle -and $settings.WindowTitle) {
Write-Debug "Resetting WindowTitle: '$OriginalWindowTitle'"
$Host.UI.RawUI.WindowTitle = $OriginalWindowTitle
}
}
function Set-WindowTitle {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")]
param($GitStatus, $IsAdmin)
$settings = $global:GitPromptSettings
if ($settings.WindowTitle -and (Test-WindowTitleIsWriteable)) {
try {
if ($settings.WindowTitle -is [scriptblock]) {
$windowTitleText = "$(& $settings.WindowTitle $GitStatus $IsAdmin)"
}
else {
$windowTitleText = $ExecutionContext.SessionState.InvokeCommand.ExpandString("$($settings.WindowTitle)")
}
Write-Debug "Setting WindowTitle: $windowTitleText"
$Host.UI.RawUI.WindowTitle = "$windowTitleText"
}
catch {
Write-Debug "Error occurred during evaluation of `$GitPromptSettings.WindowTitle: $_"
}
}
}
|
combined_dataset/train/non-malicious/sample_35_0.ps1
|
sample_35_0.ps1
|
#
# Module manifest for module 'Microsoft.SME.NetworkController'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.SME.NetworkController.psm1'
# Version number of this module.
ModuleVersion = '3.12.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'eff0ccfc-c7bd-490f-bac9-7b1d56e312b3'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Edit-VirtualSubnet',
'Find-VirtualGateway',
'Get-AccessControlLists',
'Get-BGPPeers',
'Get-BGPRouters',
'Get-HypervNetworkAdapters',
'Get-LogicalNetworks',
'Get-NetworkInterfaces',
'Get-VirtualNetworkPeerings',
'Get-VirtualNetworks',
'Get-Vms',
'New-BGPPeer',
'New-BGPRouter',
'New-VirtualNetwork',
'New-VirtualNetworkPeering',
'New-VirtualSubnet',
'Remove-BGPPeer',
'Remove-VirtualNetwork',
'Remove-VirtualNetworkPeering',
'Remove-VirtualSubnet',
'Update-BGPPeer',
'Update-BGPRouter',
'Update-VirtualNetworkPeering',
'Update-VirtualSubnetwithAccessControlList',
'Get-CimWin32LogicalDisk',
'Get-CimWin32NetworkAdapter',
'Get-CimWin32PhysicalMemory',
'Get-CimWin32Processor',
'Get-ClusterInventory',
'Get-ClusterNodes',
'Get-DecryptedDataFromNode',
'Get-EncryptionJWKOnNode',
'Get-ServerInventory'
)
# Function attributes: {"localScripts":["Edit-VirtualSubnet","Find-VirtualGateway","Get-AccessControlLists","Get-BGPPeers","Get-BGPRouters","Get-HypervNetworkAdapters","Get-LogicalNetworks","Get-NetworkInterfaces","Get-VirtualNetworkPeerings","Get-VirtualNetworks","Get-Vms","New-BGPPeer","New-BGPRouter","New-VirtualNetwork","New-VirtualNetworkPeering","New-VirtualSubnet","Remove-BGPPeer","Remove-VirtualNetwork","Remove-VirtualNetworkPeering","Remove-VirtualSubnet","Update-BGPPeer","Update-BGPRouter","Update-VirtualNetworkPeering","Update-VirtualSubnetwithAccessControlList"],"externalScripts":["Get-CimWin32LogicalDisk","Get-CimWin32NetworkAdapter","Get-CimWin32PhysicalMemory","Get-CimWin32Processor","Get-ClusterInventory","Get-ClusterNodes","Get-DecryptedDataFromNode","Get-EncryptionJWKOnNode","Get-ServerInventory"]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+b3HSQFV4ucVD
# V1fE0hjLlLj4+A9+5D0nzkzSe9DH7aCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF81ASlDGuu8vSSnt4R8plAf
# gEdRe9x5jXOOZLgEoSemMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHQAirHOQ7mzSfWjlUCdO0HZLmYxW/5vE4M9+i0zmCCl2z3O8MDL2e4vH
# WZfmbdAV1UkXLvNAYsSblvfCZCWvKnGR6f8Slqc2dvsPP8ISMsYh9tbn5gdHgKK5
# rLjs+PfeDi+sxlDyEXIzEKnR9o11pkb/iTxszcPU5zIooq5Du6JvroCvA69pz+Iw
# Japd76iW5CMDrai9WX9+Uw+pk4A/oFKpCg8y0HGzb9ze9w3KLPHteZKHRn/9inEU
# T+i5aSQuicfqIzUWkqFz43o8nh6J95rCexbSKUjldS2WTwrZcDZx/D/exznH5gee
# L4a2DxUS9hEWFKG9XZmRyO9u+2v3LaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA8bIcFooSNlqjKLZ+UeodtLs1JGBwM1/sC+YUiWY9yTwIGZSiGX0IL
# GBIyMDIzMTAxODE4MzYzNS42OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB15sNHlcujFGOAAEAAAHXMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMDUyNTE5MTIz
# N1oXDTI0MDIwMTE5MTIzN1owgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAMSsYKQ3Zf9S+40Jx+XTJUE2j4sgjLMbsDXRfmRWAaen
# 2zyZ/hpmy6Rm7mu8uzs2po0TFzCc+4chZ2nqSzCNrVjD1LFNf4TSV6r5YG5whEpZ
# 1wy6YgMGAsTQRv/f8Fj3lm1PVeyedq0EVmGvS4uQOJP0eCtFvXbaybv9iTIyKAWR
# PQm6iJI9egsvvBpQT214j1A6SiOqNGVwgLhhU1j7ZQgEzlCiso1o53P+yj5MgXqb
# PFfmfLZT+j+IwVVN+/CbhPyD9irHDJ76U6Zr0or3y/q/B7+KLvZMxNVbApcV1c7K
# w/0aKhxe3fxy4/1zxoTV4fergV0ZOAo53Ssb7GEKCxEXwaotPuTnxWlCcny77KNF
# bouia3lFyuimB/0Qfx7h+gNShTJTlDuI+DA4nFiGgrFGMZmW2EOanl7H7pTrO/3m
# t33vfrrykakKS7QgHjcv8FPMxwMBXj/G7pF9xUXBqs3/Imrmp9nIyykfmBxpMJUC
# i5eRBNzwvC1/G2AjPneoxJVH1z2CRKfEzlzW0eCIxfcPYYGdBqf3m3L4J1NgACGO
# AFNzKP0/s4YQyGveXJpnGOveCmzpmajjtU5Mjy2xJgeEe0PwGkGiDf0vl7j+UMmD
# 86risawUpLExe4hFnUTTx2Zfrtczuqa+bbs7zTgKESZv4I5HxZvjowUQTPraO77F
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUrqfAu/1ZAvc0jEQnI+4kxnowjY0wHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAFIF3dQn4iy90wJf4rvGodrlQG1ULUJpdm8d
# F36y1bSVcD91M2d4JbRMWsGgljn1v1+dtOi49F5qS7aXdfluaGxqjoMJFW6pyaFU
# 8BnJJcZ6hV+PnZwsaLJksTDpNDO7oP76+M04aZKJs7QoT0Z2/yFARHHlEbQqCtOa
# TxyR4LVVSq55RAcpUIRKpMNQMPx1dMtYKaboeqZBfr/6AoNJeCDClzvmGLYBspKj
# i26UzBN9cl0Z3CuyIeOTPyfMhb9nc+cyAYVTvoq7NgVXRfIf0NNL8M87zpEu1CMD
# lmVUbKZM99OfDuTGiIsk3/KW4wciQdLOlom8KKpf4OfVAZEQSc0hl5F6S8ui6uo9
# EQg5ObVslEnTrlz1hftsnSdo+LHObnLxjYH5gggQCLiNSto6HegTtrgm8hbcSDeg
# 2o/uqGl3vEwvGrZacz5T1upZN5PhUKikCFe7a4ZB7F0urttZ1xjDIQUOFLhn03S7
# DeHpuMHtLgxf3ql9hIRXQwoUY4puZ8JRLtZ6aS4WpnLSg0c8/H5x901h5IXpuE48
# d2yujURV3fNYiR0PUbmQQM+cRC0Vqu0zwf5u/nNSEBQmzyovO4UB0FlAu54P1dl7
# KeNArAR4DPrfEBMgKHy05QzbMyBISFUvwebjlIHp+h6zgFMLRjxJlai/chqG2/DI
# cVtSqzViMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVADFb
# 26LMbeERjz24va675f6Yb+t1oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDo2kT1MCIYDzIwMjMxMDE4MTE1MDEz
# WhgPMjAyMzEwMTkxMTUwMTNaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOjaRPUC
# AQAwCgIBAAICEPQCAf8wBwIBAAICE68wCgIFAOjblnUCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEArgVIsWIi6hRQECag1NCPxH5d+JQ8RJ13YZCwfG6W+h+n
# 1o1wozErXQMCqM/6VWwKhlBEwlGBva7ODSulv7DU5o++b2SI3h7e2liRHjNsvGV+
# AMoagIsShc7zBkMWlvqJkE+VVNSaAyu7BQN2XZ5jMQszNShCwh2SzHhHgMbw7zCh
# FfxjzF6tRK/mp1OI8ZUvrR7alngrcV6ZDwYkMOtkV3helAkYoXXsmdki/8IuUfSw
# 8Eecv+OBrlUwh0eN2LAt5HqVV+zjMEddv9fdVLFm1nchmpTF1a69juwIjxvJCHsD
# US6/soySIr0xkXxTeZq3o0EpCBoO/grkuRY8GKhuKDGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB15sNHlcujFGOAAEAAAHX
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIByVAKpcIdzS0ILH2w8USMKZLJyrghCl1KXelnibN5iL
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgnN4+XktefU+Ko2PHxg3tM3Vk
# jR3Vlf/bNF2cj3usmjswgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAdebDR5XLoxRjgABAAAB1zAiBCBVOLoPHZFYAF0dlkTbKFJHmau1
# odmM9F4nXZOvB8JbLzANBgkqhkiG9w0BAQsFAASCAgBC2Rdi65lHjTjx0dSF9lHj
# hL1eX/Ww5AzIiSvAWV3bbDFmR4cR5bP4m3+9e1pItkI7Big046F8HjpmIEhk3VGD
# 0SZOI0AXbt31Kqhzds7P9YW1+G/1JXTDMR6i2lTEadmflUVI0z/34HUfESWBQOfr
# QT8WlkNwmYnxzwOJByi3FrwffG1fKhRWTSR7dt8XMW0S8SFKnZRTlsYkcZv5fkau
# 1oDpHOhgJFcvHAW87+zoUEDEvxRR6d90YZcKlH5Ql+s0V4/Iwi9R7+PzITFCXA/N
# sZhrrG2gj6q/SpaLdG3dWbuB9KypyZXKCF7u6HK5k+cZWjrcvZLVIfRbbEVCvCCF
# pQyDk3TrnsgwsucNczL197fjfBEhpk+PGE5oSbwUUK9ABrX55hTv6FNUyU1yVr8g
# 6FgBp/AqySm7ae+dn+yB1/s/oyFcwl0BDQdZjWSpPug01ipjG8e54DF5zj3AwPZr
# SunBN0yFfjPoobosC+G2ZOO2/P8VWkN8VGF7geOvTqt07DHbnG29JqYSmjD8wEdM
# YAZpejnQOiQzkqh9NgCv+msMA0U7MV01+ZgDTVfrvz065M8vDr1k3IHqeWdEUg2u
# TMHV1AYcmjSAFlvA+isxfvEWk3M9rm+OE5RAjQsFBWLUJkUsuyLIrtm5pTLZBbws
# YUQ22JzSTUxkpVYT9v5Xhw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_51_55.ps1
|
sample_51_55.ps1
|
. ./Stop-Process2.ps1
notepad.exe
notepad.exe
notepad.exe
Stop-Process2 -Name "notepad"
# SIG # Begin signature block
# MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA4mtZq/frU6a4h
# 4jGz73Mb04ofu7naA9krgEl1sgejfaCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDwSjaE5rFoGHU4mlsqkDPLo+y6TrqNu
# W53//dp9lEzWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# DUxyoF3hjeYNvGwgghSoWZoz7oB1ly1mkPmllSo+ppB7Zz3anPGcEik8t0tYFMen
# Jftuxh/IB74EMPEY3p877ygRv/5sob8B3gEF2g67vRgEyClRrGusq6Hjva6V3XcI
# U8WkOClDko4FQzuBx9itECPcYvOlO5t+A3lyiX0vwbhSoaHpMVZ24loGwuoIz3Ww
# 9Gd+LtCPQX5gnLYc738F4RAdfsiRpjINdKnHBpoDgaZC9Jdq0SNHh/fgastZrlKN
# rW2pacg8HjtqmKajVfz2xQrEvRSHk0H+bWQFjzWJjgb02bCGONAi8SgL/GTI1JaU
# vxt/L2CG4XLTuIB+FJ7R3aGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG
# SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCCiiJdSkXiPgP+4Ib+j/q6KFZyuLXUhkF1kYoeTOT72QAIGZfMk74Y7GBMyMDI0
# MDQwMzIyNTgxNi42MjhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH
# IDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NThaFw0y
# NTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0fgV6XgIIr
# mCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8yu9ElJOmd
# geuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzSAXqkA265
# BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE92rW/Ogjc
# OKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EEcQyIS2Bp
# RYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQMBixWH9d+
# +V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFMsstscXfk
# dE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6+LW8Von1
# 58D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU/d6JOncR
# ioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fVmgxYfICU
# rpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlYVQIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQSDZ8g6VC
# v9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdkShfr91kz
# y9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5zDpzoPYt
# Tr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3eDBikDki
# x1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6FudBdWM7T
# Vvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6TT39m/SNZ
# 1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4Qwb0mXhH
# Ie9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEBwHEYmwsu
# WmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53qcAvD9h0
# U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQsYqlz617e
# 76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9YeecM1Pb
# 1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBri943cFLH
# 2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgAHzAiGA8yMDI0MDQwMzE2MTk0M1oYDzIw
# MjQwNDA0MTYxOTQzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAAfAgEAMAoC
# AQACAh7lAgH/MAcCAQACAhOJMAoCBQDpuVGfAgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQELBQADggEBAC/wgUXwL8pfqWV2HDyZX0l2zyV1XCNwuavCOAjT0jYRku2mdoVe
# SUkxs9BTGfLU57lAWRyhDighIgbkUjVFi3i02sAVCiU+pVJHwv9jq6FeRnGKjRnp
# 3ltAMeF06qPIUfiQ8x+5VwRKXLDv76DfgYUmVRkGf8O8fWBNQrSwz+fwSc4UVeSp
# /pP3ZT4Qa+MX2mGhe6pvPu4BGPxs1s0mH194FSsEBFQcPlAZUJcN0573JFQRi6pH
# zCzGY7ziM9kc8fnDh7r3v+S3jSuUwpYEsXVbSHvbeOoUYMb2us0WOaYEBWlCpIoC
# AnwBzoKvY0cY6n1F4TdMjt3gNIgZuQBBEUwxggQNMIIECQIBATCBkzB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jANBglg
# hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG
# SIb3DQEJBDEiBCAuo34dukF9AU0z6wDmF102OWvyqqHQBVqGKSIJ+4MDwDCB+gYL
# KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4suZ6n
# RHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQg89tj1pCIFK1wRcMn68dYRGBfe+tRXKll
# ZR8qzR2wd2kwDQYJKoZIhvcNAQELBQAEggIAgAGMJdMOeXztYAXlVpEVWMLXGJ61
# U/Of+6RWc7jw5qSGPj2rDPtgvsEoQwLn8LdvJ6kVS828rXbjCNeYi3BuI3TPzTPV
# MGtaQld7DMOvYeAtiG1mnoeklQu/3p53fx3aiZ380DENIFs64nmDs6X/g7rniAed
# k3FBkgKGi4eSoeFJBdOEfjjEzWgCqd+2XBubeCsB3d/SWcjAsfFUIvHZEWKUCwfg
# UYU7i6KNWqx82V6PDVWAr5D4rp4EGKFCJRoUDxRBmBMXyOzwoMAelrKC4eaib5VI
# Nf4m0YIeKeFXlPjvbgDecNBEpFDLEMD05vA8jQ6TfRKgJr7nSw/kH8WHj6PhalKt
# onh7efNLtAhQchgfItMFJ/5YCL2FdQZkZ43cfVDWHqdhb0Y37AVWwkAWRCDvcv5K
# YgL7rKEYoZ44edmR+aKFrciMJIzQ137MJXC0rAfIO6z4CVjK9VyivDne6Q4gA4+Z
# LZK91iGzAhII3i0XsJeTYSjMDk1Y6UCoFXmiVgJpRFIoFby76787Bndk6UkMvsTY
# t1lWvkAOFw26rX1x46aQ3apNwQjquXNuQXL0rCmrMkejssAUAEzx0vcfBzOu9qpK
# vUu1qwyERanx4/qNHzfG3g7KJh7VlsU3Od5LEtaPF2/TvU6WsIIWeJ4qbMY6qiVE
# lfJFvDqZlghLtSs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_34_62.ps1
|
sample_34_62.ps1
|
#
# Module manifest for module 'OCI.PSModules.Lockbox'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Lockbox.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '24788d7a-8305-474c-a1c0-add3a2ca16a0'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Lockbox Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Lockbox.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCILockboxAccessRequests', 'Get-OCILockbox',
'Get-OCILockboxAccessMaterials', 'Get-OCILockboxAccessRequest',
'Get-OCILockboxAccessRequestsList',
'Get-OCILockboxApprovalTemplate',
'Get-OCILockboxApprovalTemplatesList', 'Get-OCILockboxesList',
'Get-OCILockboxWorkRequest', 'Get-OCILockboxWorkRequestErrorsList',
'Get-OCILockboxWorkRequestLogsList',
'Get-OCILockboxWorkRequestsList',
'Invoke-OCILockboxHandleAccessRequest',
'Move-OCILockboxApprovalTemplateCompartment',
'Move-OCILockboxCompartment', 'New-OCILockbox',
'New-OCILockboxAccessRequest', 'New-OCILockboxApprovalTemplate',
'Remove-OCILockbox', 'Remove-OCILockboxApprovalTemplate',
'Stop-OCILockboxWorkRequest', 'Update-OCILockbox',
'Update-OCILockboxApprovalTemplate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Lockbox'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/236.ps1
|
236.ps1
|
function Get-SCCMClientCacheInformation
{
PARAM(
[string[]]$ComputerName=".",
[Alias('RunAs')]
[System.Management.Automation.Credential()]
[pscredential]
$Credential = [System.Management.Automation.PSCredential]::Empty
)
FOREACH ($Computer in $ComputerName)
{
Write-Verbose -message "[PROCESS] ComputerName: $Computer"
$SplattingWMI = @{
NameSpace = "ROOT\CCM\SoftMgmtAgent"
Class = "CacheConfig"
}
IF ($PSBoundParameters['ComputerName'])
{
$SplattingWMI.ComputerName = $Computer
}
IF ($PSBoundParameters['Credential'])
{
$SplattingWMI.Credential = $Credential
}
TRY
{
Get-WmiObject @SplattingWMI
}
CATCH
{
Write-Warning -message "[PROCESS] Something Wrong happened with $Computer"
$Error[0].execption.message
}
}
}
|
combined_dataset/train/non-malicious/sample_47_63.ps1
|
sample_47_63.ps1
|
@{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K
# unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd
# 88v60ME/cMf1rqdBP4T39yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAntykIMFYFhF1FQvp4wmmDNhH4HAuo8a/IYTf
# vktvgaK4sZONioQMILcA6tWhTxlox9vHvCnmMrRiarMV7/IMio8eh5H1X8RAvfIf
# XW1EEWpSrGvLJunVFPW4YpBsuXqNGO21vZ9RDzSD4jaQXQjignSSj5+c3YG/7zqV
# I/bCwNGi1NAG25X2J4LSXAz/5NXwttTzzbPZGhsbpnFfvM3MO74zuJFZ1q1m7Ze4
# lJxR+0xr4fqxKHkLw+RWEja39P6L9R6Gu5OwmHbjhO5o13E6JxNneAebBZYgxZPp
# pic6WXYIoyTfMZ9Es2ITWbU+FpSJwqWktAhofg70SDSIoXwhJ6GCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBJS10Pa7eUjGTiqHZKPu/HZulEkmPNlR6s
# l/V01QT48wIGZYLzo9K8GBIyMDI0MDExMDE5NDUwOC40NFowBIACAfSggdikgdUw
# gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
# VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDz
# PbQLowABAAAB5TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDAeFw0yMzEwMTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv
# ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU
# U1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T
# dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvg
# Otq7Y7osusk7cfJO871pdqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhL
# IkeOQwhQaa6HSs9Xn/b5QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2
# u7YbKaa3WusZw17zTQJwPp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpw
# z95ae2RAyzSUrTOYJ8f4G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASL
# Nj68WaDH7MO65T8YKEMruSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlW
# qk/d2ko8A//i502qlHkch5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/x
# xnXWRyjUm9TI5DzH8kOQwWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5B
# HsVXt4KpX+V9qOguk83H/3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbP
# Yv3pN3Gcg7Y4aZjEEABkBagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz
# 9Sn+OkV9CK0t+N3vVxL5wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0n
# MmcayRUnmjOGOLRhGxy/VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1Ud
# DgQWBBTf/5+Hu01zMSJ8ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0
# 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB
# /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC
# AgEAM/rCE4WMPVp3waQQn2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaA
# UGJbAjpc6DDzaF2iUOIwMEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mA
# Ljwj5v7bHZU2AYlSxAjI9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTA
# V47n7ehJfgl4I1m+DJQ7MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CCh
# iKltpO+/vGaLFQkZNuLFiJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNh
# nJ4fIDKwwQAtsiF1eAcSHrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51
# y2dcIbnkm4zD/BvtzvVEqKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfp
# OqXzhV+lh72IebLs+qrGowXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64
# n8wHrXJG9PWZTHeXKmk7bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML
# 5N1lCWP5UyAibxl4QhE0XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgW
# nEFlQTyacsq4OVihuOvGHuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgEC
# AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg
# Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa
# Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
# gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
# RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X
# D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP
# z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+
# tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas
# AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b
# fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv
# XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg
# 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF
# a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP
# nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
# IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB
# MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv
# Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC
# NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w
# HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg
# R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj
# Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF
# BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D
# ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs
# H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
# wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
# btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg
# vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId
# w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2
# zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K
# jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu
# yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/
# tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm
# jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj
# U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN
# aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo
# YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg
# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3
# zkSkzpGLCqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G
# CSqGSIb3DQEBBQUAAgUA6Ukf5jAiGA8yMDI0MDExMDIxNTM0MloYDzIwMjQwMTEx
# MjE1MzQyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpSR/mAgEAMAcCAQACAgyH
# MAcCAQACAhDwMAoCBQDpSnFmAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# FiiT0eNprDninXddzHxMG7y1kk0is1IGwmZ2n27eez/92w0LIfQys896Np+1a6CU
# sVhDpqmhYKHEEKgQApF75tfyZH/B5Q3zInONt8YWQkZ2/O4AlqXd8rXrH+YPjB5Y
# +6OYYLkz3A83U0PQhf9Rfd17+ij9hUsNn4nqeT51tf4xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB
# 5TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBBT+XLlGkkqCRpCloqqO/aqjV+ZJeZlOP5Y6W0VoHr
# STCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vw
# j+kCh/TULCFvFQf1Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwIgQgF0cYud2Z8tS7fLaatFGBE3hC
# od+n6gYjVkOBE5OOKTAwDQYJKoZIhvcNAQELBQAEggIAgOyYT8z2w9l3Eq3yuW9P
# tiwUwDae+QXO2Qo0ojxyYG6PNn6+cdt36eLQNeD5uAtYIXTcijWspQHBbTVTwWv7
# lWP+plKHLKv4uK1Oss3KwrzrKeRITDpXLXeofo2eYTD2QPpBuWQ+sALd1+qrS14b
# 0A+rah8JBechDTwCIf//7KxgjnvjIOrAulSc05DE88Kgun6nhkMnyK2mqg3/3KzR
# ovFSunD09Klmp/jE3odqPX1a7a/NYJzURpyvy9gF/L8Mu+DiPrF3sUlQnoaE4oIG
# OQBtTy1ipT7Tkd9jV8sq0fFDy3TnsJIF3R5u52n2qu82smZUfDrixBWJOVIHMdpF
# kBdtur27TCADqCbL9k+NkfI7ligG0n1VhNFTSHvn7TG4p2BB6K+E4N4Butf9u9O2
# imkBif7pp/8wBqb7tOB+FzgN9Dk7fjIFtPQK/vsuLZd8SPHaj5Bt0AhngwuKJMBb
# N4Fnx5wjddDSu6H4cyYqsDCYHURngyrSWHjUc0uS5Skn8VE9RqxMtB3eIwfAVwKi
# ZPKMOSPOfBUFv+stfY02mXdwP/VvS0ClzMMLJ1B6du5wsqUS+KQ+D32Orp7lSlHb
# RwnB5NIojRg4KzZGRLCPqAgBSVNATBijfoGbBn4CyjUOFgoffvRypYRnm7Fpc7kR
# pvy9qNVZ1O8xrP9u2fnTOTg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4011.ps1
|
4011.ps1
|
$connectionName = "AzureRunAsConnection100"
try
{
$servicePrincipalConnection=Get-AutomationConnection -Name $connectionName
"Logging in to Azure..."
Add-AzureRmAccount `
-ServicePrincipal `
-TenantId $servicePrincipalConnection.TenantId `
-ApplicationId $servicePrincipalConnection.ApplicationId `
-CertificateThumbprint $servicePrincipalConnection.CertificateThumbprint
}
catch {
if (!$servicePrincipalConnection)
{
$ErrorMessage = "Connection $connectionName not found."
throw $ErrorMessage
} else{
Write-Error -Message $_.Exception
throw $_.Exception
}
}
$ResourceGroups = Get-AzureRmResourceGroup
foreach ($ResourceGroup in $ResourceGroups)
{
Write-Output ("Showing resources in resource group " + $ResourceGroup.ResourceGroupName)
$Resources = Find-AzureRmResource -ResourceGroupNameContains $ResourceGroup.ResourceGroupName | Select ResourceName, ResourceType
ForEach ($Resource in $Resources)
{
Write-Output ($Resource.ResourceName + " of type " + $Resource.ResourceType)
}
Write-Output ("")
}
|
combined_dataset/train/non-malicious/194.ps1
|
194.ps1
|
Function New-SCCMTSAppVariable
{
PARAM ([String]$BaseVariableName,
[String[]]$ApplicationList
)
BEGIN
{
$TaskSequenceEnvironment = New-Object -COMObject Microsoft.SMS.TSEnvironment
}
PROCESS
{
$Counter = 1
$ApplicationList | ForEach-Object {
$Variable = "$BaseVariableName{0:00}" -f $Counter
$TaskSequenceEnvironment.value("$Variable") = "$_"
[void]$Counter++
}
}
}
|
combined_dataset/train/non-malicious/2577.ps1
|
2577.ps1
|
param
(
$server = $(read-host "Server ('localhost' okay)"),
$instance = $(read-host "Instance ('default' okay)"),
$database = $(read-host "Database"),
$newDatabase = $(read-host "New Database Name"),
$file = $(read-host "Script path and file name")
)
function Replace-String($find, $replace, $replaceFile)
{
(Get-Content $replaceFile) | Foreach-Object {$_ -replace $find, $replace} | Set-Content $replaceFile
}
$timeStamp = (((Get-Date).GetDateTimeFormats())[94]).Replace("-", "").Replace(":", "").Replace(" ", "_")
[System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null
$s = new-object ('Microsoft.SqlServer.Management.Smo.Server') $server
$dbs=$s.Databases
$connection = New-Object System.Data.SqlClient.SqlConnection
if ($database -ne "default")
{
$connection.ConnectionString = "Data Source=" + $server + ";Initial Catalog=" + $database + ";Integrated Security=SSPI;"
}
else
{
$connection.ConnectionString = "Data Source=" + $server + "\" + $instance + ";Initial Catalog=" + $database + ";Integrated Security=SSPI;"
}
$so = new-object Microsoft.SqlServer.Management.Smo.ScriptingOptions
$so.AllowSystemObjects = $false
$so.AnsiPadding = $false
$so.AnsiFile = $false
$so.DdlHeaderOnly = $false
$so.IncludeHeaders = $false
"USE [master]" | Out-File $file
"GO" | Out-File $file -append
"DECLARE @spid int, @killstatement nvarchar(10)" | Out-File $file -append
"declare c1 cursor for select request_session_id from sys.dm_tran_locks where resource_type='DATABASE' AND DB_NAME(resource_database_id) = '" + $newDatabase + "'" | Out-File $file -append
"open c1" | Out-File $file -append
"fetch next from c1 into @spid" | Out-File $file -append
"while @@FETCH_STATUS = 0" | Out-File $file -append
"begin" | Out-File $file -append
" IF @@SPID <> @spid" | Out-File $file -append
" begin" | Out-File $file -append
" set @killstatement = 'KILL ' + cast(@spid as varchar(3))" | Out-File $file -append
" exec sp_executesql @killstatement" | Out-File $file -append
" end" | Out-File $file -append
" fetch next from c1 into @spid" | Out-File $file -append
"end" | Out-File $file -append
"close c1" | Out-File $file -append
"deallocate c1" | Out-File $file -append
"GO" | Out-File $file -append
"IF EXISTS(SELECT name FROM sys.databases WHERE name = '" + $newDatabase + "')" | Out-File $file -append
"BEGIN" | Out-File $file -append
"BACKUP DATABASE " + $database | Out-File $file -append
" TO DISK = '" + $database + "_" + $timeStamp + ".bak'" | Out-File $file -append
" WITH FORMAT," | Out-File $file -append
" MEDIANAME = 'Z_SQLServerBackups'," | Out-File $file -append
" NAME = 'Full Backup of Chatty Chef before Auto Restore Dated " + $timeStamp + "'" | Out-File $file -append
"END" | Out-File $file -append
"GO" | Out-File $file -append
"IF EXISTS(SELECT name FROM sys.databases WHERE name = '" + $newDatabase + "')" | Out-File $file -append
"BEGIN" | Out-File $file -append
"DROP DATABASE " + $newDatabase | Out-File $file -append
"END" | Out-File $file -append
"GO" | Out-File $file -append
"CREATE DATABASE [" + $newDatabase + "]" | Out-File $file -append
"GO" | Out-File $file -append
"USE [" + $newDatabase + "]" | Out-File $file -append
"GO" | Out-File $file -append
foreach ($User in $dbs[$database].Users)
{
if ($User.Name -like "db_*" -or
$User.Name -like "dbo" -or
$User.Name -like "sys" -or
$User.Name -like "guest" -or
$User.Name -like "INFORMATION_SCHEMA"
)
{}
else
{
"IF NOT EXISTS (SELECT * FROM master.dbo.syslogins WHERE name = '" + $User.Name + "')" | out-File $file -append
"BEGIN" | out-File $file -append
" CREATE LOGIN ["+ $User.Name +"] WITH PASSWORD = '" + $User.Name + "', CHECK_POLICY = OFF" | out-File $file -append
"END" | out-File $file -append
"GO" | out-file $file -append
$User.Script($so) | out-File $file -append
"GO" | out-file $file -append
}
}
"-----------------------------" | out-File $file -append
"-- Schemas" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($schemas in $dbs[$database].Schemas)
{
if ($schemas.Name -like "db_*" -or
$schemas.Name -like "dbo" -or
$schemas.Name -like "sys" -or
$schemas.Name -like "guest" -or
$schemas.Name -like "INFORMATION_SCHEMA"
)
{}
else
{
$schemas.Script($so) | out-File $file -append
"GO" | out-file $file -append
}
}
"-----------------------------" | out-File $file -append
"-- Tables Part 1 - Table Structure" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($tables in $dbs[$database].Tables)
{
if ($tables.Name -ne "sysdiagrams" -and
$tables.Name -ne "sys"
)
{
$tables.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
"-----------------------------" | out-File $file -append
"-- Tables Part 2 - Indices and Triggers" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($tables in $dbs[$database].Tables)
{
if ($tables.Name -ne "sysdiagrams" -and
$tables.Name -ne "sys"
)
{
foreach($index in $tables.Indexes)
{
$index.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
foreach($tableTriggers in $tables.Triggers)
{
$tableTriggers.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
}
"-----------------------------" | out-File $file -append
"-- Tables Part 3 - Generate Reference Table Data" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($table in $dbs[$database].Tables)
{
if ($table.Name -ne "sysdiagrams" -and
$table.Name -ne "sys"
)
{
foreach($extendedProperty in $table.ExtendedProperties)
{
if
(
$extendedProperty.Name -eq "IsReferenceTable" -and
$extendedProperty.Value -eq "True"
)
{
"EXEC sys.sp_addextendedproperty " | out-File $file -append
"@name = N'IsReferenceTable', " | out-File $file -append
"@value = N'true', " | out-File $file -append
"@level0type = N'SCHEMA', @level0name = " + $table.Schema + ", " | out-File $file -append
"@level1type = N'TABLE', @level1name = " + $table.Name + " " | out-File $file -append
"GO" | out-File $file -append
"INSERT INTO [" + $table.Schema + "].[" + $table.Name + "]" | out-File $file -append
"(" | out-File $file -append
$columnCounter = 0
foreach ($column in $table.Columns)
{
if ($columnCounter -gt 0)
{
", [" + $column.Name + "]" | out-File $file -append
}
else
{
" [" + $column.Name + "]" | out-File $file -append
}
$columnCounter++
}
")" | out-File $file -append
"VALUES" | out-File $file -append
"(" | out-File $file -append
$query = "SELECT "
$columnCounter = 0
foreach ($column in $table.Columns)
{
if ($columnCounter -gt 0)
{
$query = $query + ",[" + $column.Name + "]"
}
else
{
$query = $query + "[" + $column.Name + "]"
}
$columnCounter++
}
$query = $query + " FROM [" + $table.Schema + "].[" + $table.Name + "]"
$connection.open()
$cmd = New-Object System.Data.SqlClient.SqlCommand
$cmd.CommandText = $query
$cmd.Connection = $connection
$dr = $cmd.ExecuteReader()
if ($dr.HasRows)
{
While ($dr.Read())
{
$columnCounter = 0
foreach ($column in $table.Columns)
{
Write-Host $columnCounter
if ($columnCounter -eq 0)
{
if
(
$column.DataType.ToString() -eq "int" -OR
$column.DataType.ToString() -eq "bit"
)
{
" " + $dr[$column.Name] | out-File $file -append
}
else
{
" '" + $dr[$column.Name] + "'" | out-File $file -append
}
}
else
{
if
(
($column.DataType.ToString() -eq "int") -OR
($column.DataType.ToString() -eq "bit")
)
{
", " + $dr[$column.Name] | out-File $file -append
}
else
{
", '" + $dr[$column.Name] + "'" | out-File $file -append
}
}
$columnCounter++
}
}
}
Else
{
Write-Host The DataReader contains no rows.
}
$dr.Close()
$connection.Close()
")" | out-File $file -append
}
}
}
}
"-----------------------------" | out-File $file -append
"-- Extended Stored Procedures" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($Extendedprocedures in $dbs[$database].ExtendedStoredProcedures)
{
if ($Extendedprocedures.Schema -ne "sys" -and
$Extendedprocedures.Schema -ne "sys"
)
{
"GO" | out-File $file -append
$Extendedprocedures.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
$so = new-object Microsoft.SqlServer.Management.Smo.ScriptingOptions
$so.AllowSystemObjects = $false
$so.AnsiPadding = $false
$so.AnsiFile = $false
$so.IncludeHeaders = $false
"-----------------------------" | out-File $file -append
"-- Stored Procedures" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($procedures in $dbs[$database].StoredProcedures)
{
if ($procedures.Schema -ne "sys")
{
"GO" | out-File $file -append
$procedures.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
"-----------------------------" | out-File $file -append
"-- Views" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($Views in $dbs[$database].Views)
{
if ($Views.Schema -ne "sys" -and
$Views.Schema -ne "INFORMATION_SCHEMA")
{
"GO" | out-File $file -append
$Views.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
"-----------------------------" | out-File $file -append
"-- User Defined Functions" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($UserDefinedFunction in $dbs[$database].UserDefinedFunctions)
{
if ($UserDefinedFunction.schema -ne "sys")
{
$UserDefinedFunction.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
"-----------------------------" | out-File $file -append
"-- Triggers" | out-File $file -append
"-----------------------------" | out-File $file -append
foreach ($Triggers in $dbs[$database].Triggers)
{
if ($Triggers.Schema -ne "sys")
{
$Triggers.Script($so) | out-File $file -append
"GO" | out-File $file -append
}
}
Replace-String "SET ANSI_NULLS ON" "" $file
Replace-String "SET QUOTED_IDENTIFIER ON" "" $file
|
combined_dataset/train/non-malicious/1472.ps1
|
1472.ps1
|
filter Format-ForHtml
{
if( $_ )
{
[Web.HttpUtility]::HtmlEncode($_)
}
}
|
combined_dataset/train/non-malicious/4467.ps1
|
4467.ps1
|
$script:helperModuleName = 'PowerShellGet.ResourceHelper'
$resourceModuleRoot = Split-Path -Path (Split-Path -Path $PSScriptRoot -Parent) -Parent
$dscResourcesFolderFilePath = Join-Path -Path (Join-Path -Path $resourceModuleRoot -ChildPath 'Modules') `
-ChildPath $script:helperModuleName
Import-Module -Name (Join-Path -Path $dscResourcesFolderFilePath `
-ChildPath "$script:helperModuleName.psm1") -Force
InModuleScope $script:helperModuleName {
Describe 'New-SplatParameterHashTable' {
Context 'When specific parameters should be returned' {
It 'Should return a hashtable with the correct values' {
$mockPSBoundParameters = @{
Property1 = '1'
Property2 = '2'
Property3 = '3'
Property4 = '4'
}
$extractArgumentsResult = New-SplatParameterHashTable `
-FunctionBoundParameters $mockPSBoundParameters `
-ArgumentNames @('Property2', 'Property3')
$extractArgumentsResult | Should -BeOfType [System.Collections.Hashtable]
$extractArgumentsResult.Count | Should -Be 2
$extractArgumentsResult.ContainsKey('Property2') | Should -BeTrue
$extractArgumentsResult.ContainsKey('Property3') | Should -BeTrue
$extractArgumentsResult.Property2 | Should -Be '2'
$extractArgumentsResult.Property3 | Should -Be '3'
}
}
Context 'When the specific parameters to be returned does not exist' {
It 'Should return an empty hashtable' {
$mockPSBoundParameters = @{
Property1 = '1'
}
$extractArgumentsResult = New-SplatParameterHashTable `
-FunctionBoundParameters $mockPSBoundParameters `
-ArgumentNames @('Property2', 'Property3')
$extractArgumentsResult | Should -BeOfType [System.Collections.Hashtable]
$extractArgumentsResult.Count | Should -Be 0
}
}
Context 'When and empty hashtable is passed in the parameter FunctionBoundParameters' {
It 'Should return an empty hashtable' {
$mockPSBoundParameters = @{
}
$extractArgumentsResult = New-SplatParameterHashTable `
-FunctionBoundParameters $mockPSBoundParameters `
-ArgumentNames @('Property2', 'Property3')
$extractArgumentsResult | Should -BeOfType [System.Collections.Hashtable]
$extractArgumentsResult.Count | Should -Be 0
}
}
}
Describe 'Test-ParameterValue' {
BeforeAll {
$mockProviderName = 'PowerShellGet'
}
Context 'When passing a correct uri as ''Value'' and type is ''SourceUri''' {
It 'Should not throw an error' {
{
Test-ParameterValue `
-Value 'https://mocked.uri' `
-Type 'SourceUri' `
-ProviderName $mockProviderName
} | Should -Not -Throw
}
}
Context 'When passing an invalid uri as ''Value'' and type is ''SourceUri''' {
It 'Should throw the correct error' {
$mockParameterName = 'mocked.uri'
{
Test-ParameterValue `
-Value $mockParameterName `
-Type 'SourceUri' `
-ProviderName $mockProviderName
} | Should -Throw ($LocalizedData.InValidUri -f $mockParameterName)
}
}
Context 'When passing a correct path as ''Value'' and type is ''DestinationPath''' {
It 'Should not throw an error' {
{
Test-ParameterValue `
-Value 'TestDrive:\' `
-Type 'DestinationPath' `
-ProviderName $mockProviderName
} | Should -Not -Throw
}
}
Context 'When passing an invalid path as ''Value'' and type is ''DestinationPath''' {
It 'Should throw the correct error' {
$mockParameterName = 'TestDrive:\NonExistentPath'
{
Test-ParameterValue `
-Value $mockParameterName `
-Type 'DestinationPath' `
-ProviderName $mockProviderName
} | Should -Throw ($LocalizedData.PathDoesNotExist -f $mockParameterName)
}
}
Context 'When passing a correct uri as ''Value'' and type is ''PackageSource''' {
It 'Should not throw an error' {
{
Test-ParameterValue `
-Value 'https://mocked.uri' `
-Type 'PackageSource' `
-ProviderName $mockProviderName
} | Should -Not -Throw
}
}
Context 'When passing an correct package source as ''Value'' and type is ''PackageSource''' {
BeforeAll {
$mockParameterName = 'PSGallery'
Mock -CommandName Get-PackageSource -MockWith {
return New-Object -TypeName Object |
Add-Member -Name 'Name' -MemberType NoteProperty -Value $mockParameterName -PassThru |
Add-Member -Name 'ProviderName' -MemberType NoteProperty -Value $mockProviderName -PassThru -Force
}
}
It 'Should not throw an error' {
{
Test-ParameterValue `
-Value $mockParameterName `
-Type 'PackageSource' `
-ProviderName $mockProviderName
} | Should -Not -Throw
Assert-MockCalled -CommandName Get-PackageSource -Exactly -Times 1 -Scope It
}
}
Context 'When passing type is ''PackageSource'' and passing a package source that does not exist' {
BeforeAll {
$mockParameterName = 'PSGallery'
Mock -CommandName Get-PackageSource
}
It 'Should not throw an error' {
{
Test-ParameterValue `
-Value $mockParameterName `
-Type 'PackageSource' `
-ProviderName $mockProviderName
} | Should -Not -Throw
Assert-MockCalled -CommandName Get-PackageSource -Exactly -Times 1 -Scope It
}
}
Context 'When passing invalid type in parameter ''Type''' {
BeforeAll {
$mockType = 'UnknownType'
}
It 'Should throw the correct error' {
{
Test-ParameterValue `
-Value 'AnyArgument' `
-Type $mockType `
-ProviderName $mockProviderName
} | Should -Throw ($LocalizedData.UnexpectedArgument -f $mockType)
}
}
}
Describe 'Test-VersionParameter' {
Context 'When not passing in any parameters (using default values)' {
It 'Should return true' {
Test-VersionParameter | Should -BeTrue
}
}
Context 'When only ''RequiredVersion'' are passed' {
It 'Should return true' {
Test-VersionParameter -RequiredVersion '3.0.0.0' | Should -BeTrue
}
}
Context 'When ''MinimumVersion'' has a lower version than ''MaximumVersion''' {
It 'Should throw the correct error' {
{
Test-VersionParameter `
-MinimumVersion '2.0.0.0' `
-MaximumVersion '1.0.0.0'
} | Should -Throw $LocalizedData.VersionError
}
}
Context 'When ''MinimumVersion'' has a lower version than ''MaximumVersion''' {
It 'Should throw the correct error' {
{
Test-VersionParameter `
-MinimumVersion '2.0.0.0' `
-MaximumVersion '1.0.0.0'
} | Should -Throw $LocalizedData.VersionError
}
}
Context 'When ''RequiredVersion'', ''MinimumVersion'', and ''MaximumVersion'' are passed' {
It 'Should throw the correct error' {
{
Test-VersionParameter `
-RequiredVersion '3.0.0.0' `
-MinimumVersion '2.0.0.0' `
-MaximumVersion '1.0.0.0'
} | Should -Throw $LocalizedData.VersionError
}
}
}
Describe 'Get-InstallationPolicy' {
Context 'When the package source exist, and is trusted' {
BeforeAll {
Mock -CommandName Get-PackageSource -MockWith {
return New-Object -TypeName Object |
Add-Member -Name 'IsTrusted' -MemberType NoteProperty -Value $true -PassThru -Force
}
}
It 'Should return true' {
Get-InstallationPolicy -RepositoryName 'PSGallery' | Should -BeTrue
Assert-MockCalled -CommandName Get-PackageSource -Exactly -Times 1 -Scope It
}
}
Context 'When the package source exist, and is not trusted' {
BeforeAll {
Mock -CommandName Get-PackageSource -MockWith {
return New-Object -TypeName Object |
Add-Member -Name 'IsTrusted' -MemberType NoteProperty -Value $false -PassThru -Force
}
}
It 'Should return false' {
Get-InstallationPolicy -RepositoryName 'PSGallery' | Should -BeFalse
Assert-MockCalled -CommandName Get-PackageSource -Exactly -Times 1 -Scope It
}
}
Context 'When the package source does not exist' {
BeforeAll {
Mock -CommandName Get-PackageSource
}
It 'Should return $null' {
Get-InstallationPolicy -RepositoryName 'Unknown' | Should -BeNullOrEmpty
Assert-MockCalled -CommandName Get-PackageSource -Exactly -Times 1 -Scope It
}
}
}
Describe 'Testing Test-DscParameterState' -Tag TestDscParameterState {
Context -Name 'When passing values' -Fixture {
It 'Should return true for two identical tables' {
$mockDesiredValues = @{ Example = 'test' }
$testParameters = @{
CurrentValues = $mockDesiredValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $true
}
It 'Should return false when a value is different for [System.String]' {
$mockCurrentValues = @{ Example = [System.String]'something' }
$mockDesiredValues = @{ Example = [System.String]'test' }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when a value is different for [System.Int32]' {
$mockCurrentValues = @{ Example = [System.Int32]1 }
$mockDesiredValues = @{ Example = [System.Int32]2 }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when a value is different for [Int16]' {
$mockCurrentValues = @{ Example = [System.Int16]1 }
$mockDesiredValues = @{ Example = [System.Int16]2 }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when a value is different for [UInt16]' {
$mockCurrentValues = @{ Example = [System.UInt16]1 }
$mockDesiredValues = @{ Example = [System.UInt16]2 }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when a value is missing' {
$mockCurrentValues = @{ }
$mockDesiredValues = @{ Example = 'test' }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return true when only a specified value matches, but other non-listed values do not' {
$mockCurrentValues = @{ Example = 'test'; SecondExample = 'true' }
$mockDesiredValues = @{ Example = 'test'; SecondExample = 'false' }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
ValuesToCheck = @('Example')
}
Test-DscParameterState @testParameters | Should -Be $true
}
It 'Should return false when only specified values do not match, but other non-listed values do ' {
$mockCurrentValues = @{ Example = 'test'; SecondExample = 'true' }
$mockDesiredValues = @{ Example = 'test'; SecondExample = 'false' }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
ValuesToCheck = @('SecondExample')
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when an empty hash table is used in the current values' {
$mockCurrentValues = @{ }
$mockDesiredValues = @{ Example = 'test'; SecondExample = 'false' }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return true when evaluating a table against a CimInstance' {
$mockCurrentValues = @{ Handle = '0'; ProcessId = '1000' }
$mockWin32ProcessProperties = @{
Handle = 0
ProcessId = 1000
}
$mockNewCimInstanceParameters = @{
ClassName = 'Win32_Process'
Property = $mockWin32ProcessProperties
Key = 'Handle'
ClientOnly = $true
}
$mockDesiredValues = New-CimInstance @mockNewCimInstanceParameters
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
ValuesToCheck = @('Handle', 'ProcessId')
}
Test-DscParameterState @testParameters | Should -Be $true
}
It 'Should return false when evaluating a table against a CimInstance and a value is wrong' {
$mockCurrentValues = @{ Handle = '1'; ProcessId = '1000' }
$mockWin32ProcessProperties = @{
Handle = 0
ProcessId = 1000
}
$mockNewCimInstanceParameters = @{
ClassName = 'Win32_Process'
Property = $mockWin32ProcessProperties
Key = 'Handle'
ClientOnly = $true
}
$mockDesiredValues = New-CimInstance @mockNewCimInstanceParameters
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
ValuesToCheck = @('Handle', 'ProcessId')
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return true when evaluating a hash table containing an array' {
$mockCurrentValues = @{ Example = 'test'; SecondExample = @('1', '2') }
$mockDesiredValues = @{ Example = 'test'; SecondExample = @('1', '2') }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $true
}
It 'Should return false when evaluating a hash table containing an array with wrong values' {
$mockCurrentValues = @{ Example = 'test'; SecondExample = @('A', 'B') }
$mockDesiredValues = @{ Example = 'test'; SecondExample = @('1', '2') }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when evaluating a hash table containing an array, but the CurrentValues are missing an array' {
$mockCurrentValues = @{ Example = 'test' }
$mockDesiredValues = @{ Example = 'test'; SecondExample = @('1', '2') }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
It 'Should return false when evaluating a hash table containing an array, but the property i CurrentValues is $null' {
$mockCurrentValues = @{ Example = 'test'; SecondExample = $null }
$mockDesiredValues = @{ Example = 'test'; SecondExample = @('1', '2') }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
}
}
Context -Name 'When passing invalid types for DesiredValues' -Fixture {
It 'Should throw the correct error when DesiredValues is of wrong type' {
$mockCurrentValues = @{ Example = 'something' }
$mockDesiredValues = 'NotHashTable'
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
$mockCorrectErrorMessage = ($script:localizedData.PropertyTypeInvalidForDesiredValues -f $testParameters.DesiredValues.GetType().Name)
{ Test-DscParameterState @testParameters } | Should -Throw $mockCorrectErrorMessage
}
It 'Should write a warning when DesiredValues contain an unsupported type' {
Mock -CommandName Write-Warning -Verifiable
class MockUnknownType {
[ValidateNotNullOrEmpty()]
[System.String]
$Property1
[ValidateNotNullOrEmpty()]
[System.String]
$Property2
MockUnknownType() {
}
}
$mockCurrentValues = @{ Example = New-Object -TypeName MockUnknownType }
$mockDesiredValues = @{ Example = New-Object -TypeName MockUnknownType }
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
}
Test-DscParameterState @testParameters | Should -Be $false
Assert-MockCalled -CommandName Write-Warning -Exactly -Times 1
}
}
Context -Name 'When passing an CimInstance as DesiredValue and ValuesToCheck is $null' -Fixture {
It 'Should throw the correct error' {
$mockCurrentValues = @{ Example = 'something' }
$mockWin32ProcessProperties = @{
Handle = 0
ProcessId = 1000
}
$mockNewCimInstanceParameters = @{
ClassName = 'Win32_Process'
Property = $mockWin32ProcessProperties
Key = 'Handle'
ClientOnly = $true
}
$mockDesiredValues = New-CimInstance @mockNewCimInstanceParameters
$testParameters = @{
CurrentValues = $mockCurrentValues
DesiredValues = $mockDesiredValues
ValuesToCheck = $null
}
$mockCorrectErrorMessage = $script:localizedData.PropertyTypeInvalidForValuesToCheck
{ Test-DscParameterState @testParameters } | Should -Throw $mockCorrectErrorMessage
}
}
Assert-VerifiableMock
}
}
|
combined_dataset/train/non-malicious/sample_25_68.ps1
|
sample_25_68.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets information about a database in a Redis Enterprise cluster.
.Description
Gets information about a database in a Redis Enterprise cluster.
.Example
PS C:\> Get-AzRedisEnterpriseCacheDatabase -Name "MyCache" -ResourceGroupName "MyGroup"
Name Type
---- ----
default Microsoft.Cache/redisEnterprise/databases
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IDatabase
.Link
https://learn.microsoft.com/powershell/module/az.redisenterprisecache/get-azredisenterprisecachedatabase
#>
function Get-AzRedisEnterpriseCacheDatabase {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IDatabase])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter(Mandatory)]
[Alias('Name')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the Redis Enterprise cluster.
${ClusterName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$null = $PSBoundParameters.Add("DatabaseName", "default")
Az.RedisEnterpriseCache.internal\Get-AzRedisEnterpriseCacheDatabase @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAEQyetj9JUFEfu
# eQwz2QtiEA0nrLv2KDjzfSHQA31tmKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOhIFduVrSBhw0HCWaCPi8RH
# my2Vjf+QwlgUw6lC6LaRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAv3Ak8B8nVsepf+7UQMccUsn+vXsyZc1NKRs4s/8cljvYwW2+TOpmPnD1
# RUITBXK2aUDDz7gLQGNq8D8nSlz9wR/GuQ8P0ym5AaWuEEJ/EbgqZvlslDU3LIBU
# /Aojy/DhTkEfi1tJXKy5bCUw4VwAJK+f+/PkOijPBDSJuK90chYM1vPdDGCwEQ1P
# eXtKwz7ZelDWpTssAeU9g99zfoSRfungmLKNcBubJVhGr4HjnY3DEVaIMbAF5VNE
# UlM14KTUG3+f1JJBzRSaT7ZtzvHTE7iToP52G21IVzIJWMQ4IJdQWgFg/VASta79
# i/gzAPIsf1c1tv4I3BQOOQuPpopyXqGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDwBBvawWXVXAfO1HvpyXIaC8+RpYpR2Bsq0+unHoPQVwIGZh/Gspgg
# GBMyMDI0MDQyMzEzMTUxMy40NThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC
# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ
# pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm
# scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF
# UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr
# c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T
# 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J
# IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz
# z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U
# NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O
# ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2
# UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx
# /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh
# Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t
# 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0
# GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6
# vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu
# dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY
# nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ
# 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z
# 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC
# V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH
# BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf
# v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv
# E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQyNDIwNTE1OFowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC3QIB/zAHAgEAAgIklzAK
# AgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAL5g/H2OsBvN7sRs
# WQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhwofo99Xxk/KCzCACcFbyA
# 216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt3+19K/W7+QQ4Y0MOWaYZ
# uM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgykP0XW0NYJQ3nFrWoN33qb5OS4pt8fx6hsvuefqHqBowgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xy
# MuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFzDEisoKgKMPqA12+DiwHa
# 14RcMA0GCSqGSIb3DQEBCwUABIICALgHwMxgc3GJOQI5l5QglesYq8yRRJsQll+x
# b7B0T1GGNYnQtuQXEi7VztAKah38paeJk87QHFSDxMULHyZ4HZG1zN7CDOofMcwH
# F3Uoe0dghMeC3NjgIeJP4TxGMKj0iTtztSfSCb1iNYtvXzff4I+u7qlrwnIRhV8U
# WlD3Ue8xfvlfNB6XKXlvPVY2ZC5Aan4psf6G+e6msNESGE2tEwEKmgJLi6YqOO8w
# 5cF2IbKCcWV2GD4jfWtcuuJGkZ8ggfReDq5SJHITCZwLojMuwe4eRkFetbENStEC
# a4p9rdq9365CwYvcn4gk3hnxC6c87qUlBAagzyMEzOAhrmVbHq+xvCDkpOf8fkbS
# pOqPNNKn4Zws0N1SjzBHAvaND21wJHdWJWlhJR1LjJivX85FMk6qo6PKxcrsw8WA
# qCov5abEyO1nCmwdf5vaZXC78M1WOTQl5bvHGQy+uz075epLb6jdn0XF3CBtz3bI
# DRjWC5fB/kp2bDWalVatlolsc8O1Wfl+iQ8zuYpbqcZGWyWk6rK23+ZnMkH036XY
# Qp+1EXXrdOyU9i//alnTc8UTLBjUnxNkw8D8uIHl1uMzlM/dniQC1zuEULZStV7c
# 048/qVCfutiXZYHXIQcOJGDLRaNFm4E8yhpvRQx0v+KZdRkRdGlaX2+puVy+t09a
# zn6b75pC
# SIG # End signature block
|
combined_dataset/train/non-malicious/3754.ps1
|
3754.ps1
|
function Get-ResourceGroupName
{
return getAssetName
}
function Get-TestStorageAccountName
{
return getAssetName
}
function Get-CommitmentPlanName
{
return getAssetName
}
function Get-WebServiceName
{
return getAssetName
}
function Get-ProviderLocation($providerNamespace, $resourceType)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne `
[Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
$provider = Get-AzResourceProvider -ProviderNamespace $providerNamespace
$resourceType = $provider.ResourceTypes | `
where {$_.ResourceTypeName -eq $resourceType}
if ($resourceType -eq $null)
{
return "southcentralus"
} else
{
return $resourceType.Locations[0].Replace(" ", "").ToLowerInvariant()
}
}
return "southcentralus"
}
function Get-ProviderAPIVersion($providerNamespace, $resourceType)
{
if ($providerNamespace -eq "Microsoft.MachineLearning")
{
if ([System.String]::Equals($resourceType, "commitmentPlans", `
[System.StringComparison]::OrdinalIgnoreCase))
{
return "2016-05-01-preview"
}
if ([System.String]::Equals($resourceType, "webServices", `
[System.StringComparison]::OrdinalIgnoreCase))
{
return "2017-01-01"
}
}
return $null
}
function Create-TestStorageAccount($resourceGroup, $location, $storageName)
{
New-AzStorageAccount -ResourceGroupName $resourceGroup -Name $storageName `
-Location $location -Type 'Standard_LRS' | Out-Null
$accessKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroup `
-Name $storageName).Key1;
return @{ Name = $storageName; Key = $accessKey }
}
function Clean-CommitmentPlan($resourceGroup, $commitmentPlanName)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne `
[Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
try {
LogOutput "Removing commitment plan $commitmentPlanName from resource group $rgName"
Remove-AzMlCommitmentPlan -ResourceGroupName $resourceGroup `
-Name $commitmentPlanName -Force
LogOutput "Commitment plan $commitmentPlanName was removed."
}
catch {
Write-Warning "Caught unexpected exception when cleaning up commitment `
plan $commitmentPlanName in group $resourceGroup : `
$($($_.Exception).Message)"
}
}
}
function Clean-WebService($resourceGroup, $webServiceName)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne `
[Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
try {
LogOutput "Removing web service $webServiceName from resource group $rgName"
Remove-AzMlWebService -ResourceGroupName $resourceGroup `
-Name $webServiceName -Force
LogOutput "Web service $webServiceName was removed."
}
catch {
Write-Warning "Caught unexpected exception when cleaning up web `
service $webServiceName in group $resourceGroup : `
$($($_.Exception).Message)"
}
}
}
function Clean-TestStorageAccount($resourceGroup, $accountName)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne `
[Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
try {
LogOutput "Removing storage account $accountName from resource group $rgName"
Remove-AzStorageAccount -ResourceGroupName $resourceGroup -Name $webServiceName
LogOutput "Storage account $accountName was removed."
}
catch {
Write-Warning "Caught unexpected exception when cleaning up `
storage account $accountName in group $resourceGroup : `
$($($_.Exception).Message)"
}
}
}
function Clean-ResourceGroup($resourceGroup)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne `
[Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
try {
LogOutput "Removing resource group $resourceGroup"
Remove-AzResourceGroup -Name $resourceGroup -Force
LogOutput "Resource group $resourceGroup was removed."
}
catch {
Write-Warning "Caught unexpected exception when cleaning up resource `
group $resourceGroup : $($($_.Exception).Message)"
}
}
}
function LogOutput($message)
{
$timestamp = Get-Date -UFormat "%Y-%m-%d %H:%M:%S %Z"
Write-Debug "[$timestamp]: $message"
}
|
combined_dataset/train/non-malicious/sample_54_82.ps1
|
sample_54_82.ps1
|
#
# Module manifest for module 'OCI.PSModules.Identitydomains'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Identitydomains Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo',
'Get-OCIIdentitydomainsAccountMgmtInfosList',
'Get-OCIIdentitydomainsAccountRecoverySetting',
'Get-OCIIdentitydomainsAccountRecoverySettingsList',
'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList',
'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole',
'Get-OCIIdentitydomainsAppRolesList',
'Get-OCIIdentitydomainsApprovalWorkflow',
'Get-OCIIdentitydomainsApprovalWorkflowAssignment',
'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList',
'Get-OCIIdentitydomainsApprovalWorkflowsList',
'Get-OCIIdentitydomainsApprovalWorkflowStep',
'Get-OCIIdentitydomainsApprovalWorkflowStepsList',
'Get-OCIIdentitydomainsAppsList',
'Get-OCIIdentitydomainsAuthenticationFactorSetting',
'Get-OCIIdentitydomainsAuthenticationFactorSettingsList',
'Get-OCIIdentitydomainsAuthToken',
'Get-OCIIdentitydomainsAuthTokensList',
'Get-OCIIdentitydomainsBrandingSetting',
'Get-OCIIdentitydomainsBrandingSettingsList',
'Get-OCIIdentitydomainsCloudGate',
'Get-OCIIdentitydomainsCloudGateMapping',
'Get-OCIIdentitydomainsCloudGateMappingsList',
'Get-OCIIdentitydomainsCloudGateServer',
'Get-OCIIdentitydomainsCloudGateServersList',
'Get-OCIIdentitydomainsCloudGatesList',
'Get-OCIIdentitydomainsCondition',
'Get-OCIIdentitydomainsConditionsList',
'Get-OCIIdentitydomainsCustomerSecretKey',
'Get-OCIIdentitydomainsCustomerSecretKeysList',
'Get-OCIIdentitydomainsDynamicResourceGroup',
'Get-OCIIdentitydomainsDynamicResourceGroupsList',
'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList',
'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList',
'Get-OCIIdentitydomainsIdentityPropagationTrust',
'Get-OCIIdentitydomainsIdentityPropagationTrustsList',
'Get-OCIIdentitydomainsIdentityProvider',
'Get-OCIIdentitydomainsIdentityProvidersList',
'Get-OCIIdentitydomainsIdentitySetting',
'Get-OCIIdentitydomainsIdentitySettingsList',
'Get-OCIIdentitydomainsKmsiSetting',
'Get-OCIIdentitydomainsKmsiSettingsList',
'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey',
'Get-OCIIdentitydomainsMyApiKeysList',
'Get-OCIIdentitydomainsMyAppsList',
'Get-OCIIdentitydomainsMyAuthToken',
'Get-OCIIdentitydomainsMyAuthTokensList',
'Get-OCIIdentitydomainsMyCompletedApproval',
'Get-OCIIdentitydomainsMyCompletedApprovalsList',
'Get-OCIIdentitydomainsMyCustomerSecretKey',
'Get-OCIIdentitydomainsMyCustomerSecretKeysList',
'Get-OCIIdentitydomainsMyDevice',
'Get-OCIIdentitydomainsMyDevicesList',
'Get-OCIIdentitydomainsMyGroupsList',
'Get-OCIIdentitydomainsMyOAuth2ClientCredential',
'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsMyPendingApproval',
'Get-OCIIdentitydomainsMyPendingApprovalsList',
'Get-OCIIdentitydomainsMyRequest',
'Get-OCIIdentitydomainsMyRequestableGroupsList',
'Get-OCIIdentitydomainsMyRequestsList',
'Get-OCIIdentitydomainsMySmtpCredential',
'Get-OCIIdentitydomainsMySmtpCredentialsList',
'Get-OCIIdentitydomainsMySupportAccount',
'Get-OCIIdentitydomainsMySupportAccountsList',
'Get-OCIIdentitydomainsMyTrustedUserAgent',
'Get-OCIIdentitydomainsMyTrustedUserAgentsList',
'Get-OCIIdentitydomainsMyUserDbCredential',
'Get-OCIIdentitydomainsMyUserDbCredentialsList',
'Get-OCIIdentitydomainsNetworkPerimeter',
'Get-OCIIdentitydomainsNetworkPerimetersList',
'Get-OCIIdentitydomainsNotificationSetting',
'Get-OCIIdentitydomainsNotificationSettingsList',
'Get-OCIIdentitydomainsOAuth2ClientCredential',
'Get-OCIIdentitydomainsOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsOAuthClientCertificate',
'Get-OCIIdentitydomainsOAuthClientCertificatesList',
'Get-OCIIdentitydomainsOAuthPartnerCertificate',
'Get-OCIIdentitydomainsOAuthPartnerCertificatesList',
'Get-OCIIdentitydomainsPasswordPoliciesList',
'Get-OCIIdentitydomainsPasswordPolicy',
'Get-OCIIdentitydomainsPoliciesList',
'Get-OCIIdentitydomainsPolicy',
'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList',
'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList',
'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList',
'Get-OCIIdentitydomainsSecurityQuestion',
'Get-OCIIdentitydomainsSecurityQuestionSetting',
'Get-OCIIdentitydomainsSecurityQuestionSettingsList',
'Get-OCIIdentitydomainsSecurityQuestionsList',
'Get-OCIIdentitydomainsSelfRegistrationProfile',
'Get-OCIIdentitydomainsSelfRegistrationProfilesList',
'Get-OCIIdentitydomainsSetting',
'Get-OCIIdentitydomainsSettingsList',
'Get-OCIIdentitydomainsSmtpCredential',
'Get-OCIIdentitydomainsSmtpCredentialsList',
'Get-OCIIdentitydomainsUser',
'Get-OCIIdentitydomainsUserAttributesSetting',
'Get-OCIIdentitydomainsUserAttributesSettingsList',
'Get-OCIIdentitydomainsUserDbCredential',
'Get-OCIIdentitydomainsUserDbCredentialsList',
'Get-OCIIdentitydomainsUsersList',
'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting',
'Invoke-OCIIdentitydomainsPatchApiKey',
'Invoke-OCIIdentitydomainsPatchApp',
'Invoke-OCIIdentitydomainsPatchAppRole',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflow',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep',
'Invoke-OCIIdentitydomainsPatchAuthToken',
'Invoke-OCIIdentitydomainsPatchCloudGate',
'Invoke-OCIIdentitydomainsPatchCloudGateMapping',
'Invoke-OCIIdentitydomainsPatchCloudGateServer',
'Invoke-OCIIdentitydomainsPatchCondition',
'Invoke-OCIIdentitydomainsPatchCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup',
'Invoke-OCIIdentitydomainsPatchGrant',
'Invoke-OCIIdentitydomainsPatchGroup',
'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust',
'Invoke-OCIIdentitydomainsPatchIdentityProvider',
'Invoke-OCIIdentitydomainsPatchIdentitySetting',
'Invoke-OCIIdentitydomainsPatchKmsiSetting',
'Invoke-OCIIdentitydomainsPatchMe',
'Invoke-OCIIdentitydomainsPatchMyApiKey',
'Invoke-OCIIdentitydomainsPatchMyAuthToken',
'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchMyDevice',
'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchMyPendingApproval',
'Invoke-OCIIdentitydomainsPatchMyRequest',
'Invoke-OCIIdentitydomainsPatchMySmtpCredential',
'Invoke-OCIIdentitydomainsPatchNetworkPerimeter',
'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchPasswordPolicy',
'Invoke-OCIIdentitydomainsPatchPolicy',
'Invoke-OCIIdentitydomainsPatchRule',
'Invoke-OCIIdentitydomainsPatchSchema',
'Invoke-OCIIdentitydomainsPatchSecurityQuestion',
'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting',
'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile',
'Invoke-OCIIdentitydomainsPatchSetting',
'Invoke-OCIIdentitydomainsPatchSmtpCredential',
'Invoke-OCIIdentitydomainsPatchUser',
'Invoke-OCIIdentitydomainsPatchUserAttributesSetting',
'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos',
'Invoke-OCIIdentitydomainsSearchApiKeys',
'Invoke-OCIIdentitydomainsSearchAppRoles',
'Invoke-OCIIdentitydomainsSearchApps',
'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings',
'Invoke-OCIIdentitydomainsSearchAuthTokens',
'Invoke-OCIIdentitydomainsSearchCloudGateMappings',
'Invoke-OCIIdentitydomainsSearchCloudGates',
'Invoke-OCIIdentitydomainsSearchCloudGateServers',
'Invoke-OCIIdentitydomainsSearchConditions',
'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys',
'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups',
'Invoke-OCIIdentitydomainsSearchGrants',
'Invoke-OCIIdentitydomainsSearchGroups',
'Invoke-OCIIdentitydomainsSearchIdentityProviders',
'Invoke-OCIIdentitydomainsSearchIdentitySettings',
'Invoke-OCIIdentitydomainsSearchKmsiSettings',
'Invoke-OCIIdentitydomainsSearchMyApps',
'Invoke-OCIIdentitydomainsSearchMyGroups',
'Invoke-OCIIdentitydomainsSearchMyRequestableGroups',
'Invoke-OCIIdentitydomainsSearchMyRequests',
'Invoke-OCIIdentitydomainsSearchNetworkPerimeters',
'Invoke-OCIIdentitydomainsSearchNotificationSettings',
'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials',
'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates',
'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates',
'Invoke-OCIIdentitydomainsSearchPasswordPolicies',
'Invoke-OCIIdentitydomainsSearchPolicies',
'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes',
'Invoke-OCIIdentitydomainsSearchRules',
'Invoke-OCIIdentitydomainsSearchSchemas',
'Invoke-OCIIdentitydomainsSearchSecurityQuestions',
'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings',
'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles',
'Invoke-OCIIdentitydomainsSearchSettings',
'Invoke-OCIIdentitydomainsSearchSmtpCredentials',
'Invoke-OCIIdentitydomainsSearchUserAttributesSettings',
'Invoke-OCIIdentitydomainsSearchUserDbCredentials',
'Invoke-OCIIdentitydomainsSearchUsers',
'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp',
'New-OCIIdentitydomainsAppRole',
'New-OCIIdentitydomainsApprovalWorkflow',
'New-OCIIdentitydomainsApprovalWorkflowAssignment',
'New-OCIIdentitydomainsApprovalWorkflowStep',
'New-OCIIdentitydomainsAuthenticationFactorsRemover',
'New-OCIIdentitydomainsAuthToken',
'New-OCIIdentitydomainsCloudGate',
'New-OCIIdentitydomainsCloudGateMapping',
'New-OCIIdentitydomainsCloudGateServer',
'New-OCIIdentitydomainsCondition',
'New-OCIIdentitydomainsCustomerSecretKey',
'New-OCIIdentitydomainsDynamicResourceGroup',
'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup',
'New-OCIIdentitydomainsIdentityPropagationTrust',
'New-OCIIdentitydomainsIdentityProvider',
'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey',
'New-OCIIdentitydomainsMyAuthenticationFactorInitiator',
'New-OCIIdentitydomainsMyAuthenticationFactorsRemover',
'New-OCIIdentitydomainsMyAuthenticationFactorValidator',
'New-OCIIdentitydomainsMyAuthToken',
'New-OCIIdentitydomainsMyCustomerSecretKey',
'New-OCIIdentitydomainsMyOAuth2ClientCredential',
'New-OCIIdentitydomainsMyRequest',
'New-OCIIdentitydomainsMySmtpCredential',
'New-OCIIdentitydomainsMySupportAccount',
'New-OCIIdentitydomainsMyUserDbCredential',
'New-OCIIdentitydomainsNetworkPerimeter',
'New-OCIIdentitydomainsOAuth2ClientCredential',
'New-OCIIdentitydomainsOAuthClientCertificate',
'New-OCIIdentitydomainsOAuthPartnerCertificate',
'New-OCIIdentitydomainsPasswordPolicy',
'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule',
'New-OCIIdentitydomainsSecurityQuestion',
'New-OCIIdentitydomainsSelfRegistrationProfile',
'New-OCIIdentitydomainsSmtpCredential',
'New-OCIIdentitydomainsUser',
'New-OCIIdentitydomainsUserDbCredential',
'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp',
'Remove-OCIIdentitydomainsAppRole',
'Remove-OCIIdentitydomainsApprovalWorkflow',
'Remove-OCIIdentitydomainsApprovalWorkflowAssignment',
'Remove-OCIIdentitydomainsApprovalWorkflowStep',
'Remove-OCIIdentitydomainsAuthToken',
'Remove-OCIIdentitydomainsCloudGate',
'Remove-OCIIdentitydomainsCloudGateMapping',
'Remove-OCIIdentitydomainsCloudGateServer',
'Remove-OCIIdentitydomainsCondition',
'Remove-OCIIdentitydomainsCustomerSecretKey',
'Remove-OCIIdentitydomainsDynamicResourceGroup',
'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup',
'Remove-OCIIdentitydomainsIdentityPropagationTrust',
'Remove-OCIIdentitydomainsIdentityProvider',
'Remove-OCIIdentitydomainsMyApiKey',
'Remove-OCIIdentitydomainsMyAuthToken',
'Remove-OCIIdentitydomainsMyCustomerSecretKey',
'Remove-OCIIdentitydomainsMyDevice',
'Remove-OCIIdentitydomainsMyOAuth2ClientCredential',
'Remove-OCIIdentitydomainsMySmtpCredential',
'Remove-OCIIdentitydomainsMySupportAccount',
'Remove-OCIIdentitydomainsMyTrustedUserAgent',
'Remove-OCIIdentitydomainsMyUserDbCredential',
'Remove-OCIIdentitydomainsNetworkPerimeter',
'Remove-OCIIdentitydomainsOAuth2ClientCredential',
'Remove-OCIIdentitydomainsOAuthClientCertificate',
'Remove-OCIIdentitydomainsOAuthPartnerCertificate',
'Remove-OCIIdentitydomainsPasswordPolicy',
'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule',
'Remove-OCIIdentitydomainsSecurityQuestion',
'Remove-OCIIdentitydomainsSelfRegistrationProfile',
'Remove-OCIIdentitydomainsSmtpCredential',
'Remove-OCIIdentitydomainsUser',
'Remove-OCIIdentitydomainsUserDbCredential',
'Write-OCIIdentitydomainsAccountRecoverySetting',
'Write-OCIIdentitydomainsApp',
'Write-OCIIdentitydomainsApprovalWorkflow',
'Write-OCIIdentitydomainsAppStatusChanger',
'Write-OCIIdentitydomainsAuthenticationFactorSetting',
'Write-OCIIdentitydomainsCloudGate',
'Write-OCIIdentitydomainsCloudGateMapping',
'Write-OCIIdentitydomainsCloudGateServer',
'Write-OCIIdentitydomainsCondition',
'Write-OCIIdentitydomainsDynamicResourceGroup',
'Write-OCIIdentitydomainsGroup',
'Write-OCIIdentitydomainsIdentityPropagationTrust',
'Write-OCIIdentitydomainsIdentityProvider',
'Write-OCIIdentitydomainsIdentitySetting',
'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe',
'Write-OCIIdentitydomainsMePasswordChanger',
'Write-OCIIdentitydomainsNetworkPerimeter',
'Write-OCIIdentitydomainsNotificationSetting',
'Write-OCIIdentitydomainsPasswordPolicy',
'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule',
'Write-OCIIdentitydomainsSchema',
'Write-OCIIdentitydomainsSecurityQuestionSetting',
'Write-OCIIdentitydomainsSelfRegistrationProfile',
'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser',
'Write-OCIIdentitydomainsUserCapabilitiesChanger',
'Write-OCIIdentitydomainsUserPasswordChanger',
'Write-OCIIdentitydomainsUserPasswordResetter',
'Write-OCIIdentitydomainsUserStatusChanger'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3582.ps1
|
3582.ps1
|
function Test-CrudApiManagement {
$location = Get-ProviderLocation "Microsoft.ApiManagement/service"
$resourceGroupName = Get-ResourceGroupName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$secondApiManagementName = Get-ApiManagementServiceName
$secondOrganization = "second.apimpowershellorg"
$secondAdminEmail = "second.apim@powershell.org"
$secondSku = "Basic"
$secondSkuCapacity = 2
$enableTls=@{"Tls10" = "True"}
$enable3DES=@{"TripleDes168" = "True"}
$thirdApiManagementName = Get-ApiManagementServiceName
$thirdSku = "Consumption"
$thirdServiceLocation = "West Europe"
try {
New-AzResourceGroup -Name $resourceGroupName -Location $location
$sslSetting = New-AzApiManagementSslSetting -FrontendProtocol $enableTls -CipherSuite $enable3DES
$result = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail -SslSetting $sslSetting
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $location $result.Location
Assert-AreEqual "Developer" $result.Sku
Assert-AreEqual 1 $result.Capacity
Assert-AreEqual "None" $result.VpnType
Assert-NotNull $result.SslSetting
Assert-AreEqual "True" $result.SslSetting.FrontendProtocol["Tls10"]
Assert-AreEqual "True" $result.SslSetting.CipherSuite["TripleDes168"]
$token = Get-AzApiManagementSsoToken -ResourceGroupName $resourceGroupName -Name $apiManagementName
Assert-NotNull $token
$apimServicesInGroup = Get-AzApiManagement -ResourceGroupName $resourceGroupName
Assert-True {$apimServicesInGroup.Count -ge 1}
$secondResult = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $secondApiManagementName -Organization $secondOrganization -AdminEmail $secondAdminEmail -Sku $secondSku -Capacity $secondSkuCapacity
Assert-AreEqual $resourceGroupName $secondResult.ResourceGroupName
Assert-AreEqual $secondApiManagementName $secondResult.Name
Assert-AreEqual $location $secondResult.Location
Assert-AreEqual $secondSku $secondResult.Sku
Assert-AreEqual $secondSkuCapacity $secondResult.Capacity
$secondToken = Get-AzApiManagementSsoToken -ResourceGroupName $resourceGroupName -Name $secondApiManagementName
Assert-NotNull $secondToken
$allServices = Get-AzApiManagement
Assert-True {$allServices.Count -ge 2}
$thirdResult = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $thirdServiceLocation -Name $thirdApiManagementName -Organization $secondOrganization -AdminEmail $secondAdminEmail -Sku $thirdSku
Assert-AreEqual $resourceGroupName $thirdResult.ResourceGroupName
Assert-AreEqual $thirdApiManagementName $thirdResult.Name
Assert-AreEqual $thirdServiceLocation $thirdResult.Location
Assert-AreEqual $thirdSku $thirdResult.Sku
$allServices = Get-AzApiManagement
Assert-True {$allServices.Count -ge 3}
$found = 0
for ($i = 0; $i -lt $allServices.Count; $i++) {
if ($allServices[$i].Name -eq $apiManagementName) {
$found = $found + 1
Assert-AreEqual $location $allServices[$i].Location
Assert-AreEqual $resourceGroupName $allServices[$i].ResourceGroupName
Assert-AreEqual "Developer" $allServices[$i].Sku
Assert-AreEqual 1 $allServices[$i].Capacity
}
if ($allServices[$i].Name -eq $secondApiManagementName) {
$found = $found + 1
Assert-AreEqual $location $allServices[$i].Location
Assert-AreEqual $resourceGroupName $allServices[$i].ResourceGroupName
Assert-AreEqual $secondSku $allServices[$i].Sku
Assert-AreEqual $secondSkuCapacity $allServices[$i].Capacity
}
if ($allServices[$i].Name -eq $thirdApiManagementName) {
$found = $found + 1
Assert-AreEqual $thirdServiceLocation $allServices[$i].Location
Assert-AreEqual $resourceGroupName $allServices[$i].ResourceGroupName
Assert-AreEqual $thirdSku $allServices[$i].Sku
}
}
Assert-True {$found -eq 3} "Api Management services created earlier is not found."
Get-AzApiManagement -ResourceGroupName $resourceGroupName | Remove-AzApiManagement
$allServices = Get-AzApiManagement -ResourceGroupName $resourceGroupName
Assert-AreEqual 0 $allServices.Count
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
function Test-BackupRestoreApiManagement {
$location = Get-ProviderLocation "Microsoft.ApiManagement/service"
$resourceGroupName = Get-ResourceGroupName
$storageLocation = Get-ProviderLocation "Microsoft.ClassicStorage/storageAccounts"
$storageAccountName = Get-ApiManagementServiceName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$containerName = "backups"
$backupName = $apiManagementName + ".apimbackup"
try {
New-AzResourceGroup -Name $resourceGroupName -Location $location -Force
New-AzStorageAccount -StorageAccountName $storageAccountName -Location $storageLocation -ResourceGroupName $resourceGroupName -Type Standard_LRS
$storageKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName -StorageAccountName $storageAccountName).Key1
$storageContext = New-AzStorageContext -StorageAccountName $storageAccountName -StorageAccountKey $storageKey
$apiManagementService = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail
Backup-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -TargetContainerName $containerName -TargetBlobName $backupName
$restoreResult = Restore-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -SourceContainerName $containerName -SourceBlobName $backupName -PassThru
Assert-AreEqual $resourceGroupName $restoreResult.ResourceGroupName
Assert-AreEqual $apiManagementName $restoreResult.Name
Assert-AreEqual $location $restoreResult.Location
Assert-AreEqual "Developer" $restoreResult.Sku
Assert-AreEqual 1 $restoreResult.Capacity
Assert-AreEqual "Succeeded" $restoreResult.ProvisioningState
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
function Test-ApiManagementVirtualNetworkCRUD {
$primarylocation = "North Central US"
$secondarylocation = "South Central US"
$resourceGroupName = Get-ResourceGroupName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$sku = "Developer"
$capacity = 1
$primarySubnetResourceId = "/subscriptions/a200340d-6b82-494d-9dbf-687ba6e33f9e/resourceGroups/powershelltest/providers/Microsoft.Network/virtualNetworks/powershellvnetncu/subnets/default"
$additionalSubnetResourceId = "/subscriptions/a200340d-6b82-494d-9dbf-687ba6e33f9e/resourceGroups/powershelltest/providers/Microsoft.Network/virtualNetworks/powershellvnetscu/subnets/default"
$vpnType = "External"
try {
New-AzResourceGroup -Name $resourceGroupName -Location $primarylocation
$virtualNetwork = New-AzApiManagementVirtualNetwork -SubnetResourceId $primarySubnetResourceId
$result = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $primarylocation -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail -VpnType $vpnType -VirtualNetwork $virtualNetwork -Sku $sku -Capacity $capacity
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $primarylocation $result.Location
Assert-AreEqual $sku $result.Sku
Assert-AreEqual 1 $result.Capacity
Assert-AreEqual $vpnType $result.VpnType
Assert-Null $result.PrivateIPAddresses
Assert-NotNull $result.PublicIPAddresses
Assert-AreEqual $primarySubnetResourceId $result.VirtualNetwork.SubnetResourceId
$networkStatus = Get-AzApiManagementNetworkStatus -ResourceGroupName $resourceGroupName -Name $apiManagementName
Assert-NotNull $networkStatus
Assert-NotNull $networkStatus.DnsServers
Assert-NotNull $networkStatus.ConnectivityStatus
$service = Get-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName
$vpnType = "Internal"
$service.VirtualNetwork = $virtualNetwork
$service.VpnType = $vpnType
$sku = "Premium"
$service.Sku = $sku
$additionalRegionVirtualNetwork = New-AzApiManagementVirtualNetwork -SubnetResourceId $additionalSubnetResourceId
$service = Add-AzApiManagementRegion -ApiManagement $service -Location $secondarylocation -VirtualNetwork $additionalRegionVirtualNetwork
$service = Set-AzApiManagement -InputObject $service -PassThru
Assert-AreEqual $resourceGroupName $service.ResourceGroupName
Assert-AreEqual $apiManagementName $service.Name
Assert-AreEqual $sku $service.Sku
Assert-AreEqual $primarylocation $service.Location
Assert-AreEqual "Succeeded" $service.ProvisioningState
Assert-AreEqual $vpnType $service.VpnType
Assert-NotNull $service.VirtualNetwork
Assert-NotNull $service.VirtualNetwork.SubnetResourceId
Assert-NotNull $service.PrivateIPAddresses
Assert-NotNull $service.PublicIPAddresses
Assert-AreEqual $primarySubnetResourceId $service.VirtualNetwork.SubnetResourceId
Assert-AreEqual 1 $service.AdditionalRegions.Count
$found = 0
for ($i = 0; $i -lt $service.AdditionalRegions.Count; $i++) {
if ($service.AdditionalRegions[$i].Location -eq $secondarylocation) {
$found = $found + 1
Assert-AreEqual $sku $service.AdditionalRegions[$i].Sku
Assert-AreEqual 1 $service.AdditionalRegions[$i].Capacity
Assert-NotNull $service.AdditionalRegions[$i].VirtualNetwork
Assert-AreEqual $additionalSubnetResourceId $service.AdditionalRegions[$i].VirtualNetwork.SubnetResourceId
Assert-NotNull $service.AdditionalRegions[$i].PrivateIPAddresses
Assert-NotNull $service.AdditionalRegions[$i].PublicIPAddresses
}
}
Assert-True {$found -eq 1} "Api Management regions created earlier is not found."
$networkStatus = Get-AzApiManagementNetworkStatus -ApiManagementObject $service
Assert-NotNull $networkStatus
Assert-NotNull $networkStatus.DnsServers
Assert-NotNull $networkStatus.ConnectivityStatus
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
function Test-ApiManagementHostnamesCRUD {
$location = "North Central US"
$certFilePath = "$TestOutputRoot/powershelltest.pfx";
$certPassword = "Password";
$certSubject = "CN=*.msitesting.net"
$certThumbprint = "8E989652CABCF585ACBFCB9C2C91F1D174FDB3A2"
$portalHostName = "portalsdk.msitesting.net"
$proxyHostName1 = "gateway1.msitesting.net"
$proxyHostName2 = "gateway2.msitesting.net"
$managementHostName = "mgmt.msitesting.net"
$resourceGroupName = Get-ResourceGroupName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$sku = "Premium"
$capacity = 1
try {
New-AzResourceGroup -Name $resourceGroupName -Location $location
$securePfxPassword = ConvertTo-SecureString $certPassword -AsPlainText -Force
$customProxy1 = New-AzApiManagementCustomHostnameConfiguration -Hostname $proxyHostName1 -HostnameType Proxy -PfxPath $certFilePath -PfxPassword $securePfxPassword -DefaultSslBinding
$customProxy2 = New-AzApiManagementCustomHostnameConfiguration -Hostname $proxyHostName2 -HostnameType Proxy -PfxPath $certFilePath -PfxPassword $securePfxPassword
$customPortal = New-AzApiManagementCustomHostnameConfiguration -Hostname $portalHostName -HostnameType Portal -PfxPath $certFilePath -PfxPassword $securePfxPassword
$customMgmt = New-AzApiManagementCustomHostnameConfiguration -Hostname $managementHostName -HostnameType Management -PfxPath $certFilePath -PfxPassword $securePfxPassword
$customHostnames = @($customProxy1, $customProxy2, $customPortal, $customMgmt)
$result = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail -Sku $sku -Capacity $capacity -CustomHostnameConfiguration $customHostnames
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $location $result.Location
Assert-AreEqual $sku $result.Sku
Assert-AreEqual 1 $result.Capacity
Assert-AreEqual "None" $result.VpnType
Assert-NotNull $result.ProxyCustomHostnameConfiguration
Assert-AreEqual 3 $result.ProxyCustomHostnameConfiguration.Count
for ($i = 0; $i -lt $result.ProxyCustomHostnameConfiguration.Count; $i++) {
if ($result.ProxyCustomHostnameConfiguration[$i].Hostname -eq $proxyHostName1) {
$found = $found + 1
Assert-AreEqual Proxy $result.ProxyCustomHostnameConfiguration[$i].HostnameType
Assert-AreEqual $certThumbprint $result.ProxyCustomHostnameConfiguration[$i].CertificateInformation.Thumbprint
Assert-True {$result.ProxyCustomHostnameConfiguration[$i].DefaultSslBinding}
Assert-False {$result.ProxyCustomHostnameConfiguration[$i].NegotiateClientCertificate}
Assert-Null $result.ProxyCustomHostnameConfiguration[$i].KeyVaultId
}
if ($result.ProxyCustomHostnameConfiguration[$i].Hostname -eq $proxyHostName2) {
$found = $found + 1
Assert-AreEqual Proxy $result.ProxyCustomHostnameConfiguration[$i].HostnameType
Assert-AreEqual $certThumbprint $result.ProxyCustomHostnameConfiguration[$i].CertificateInformation.Thumbprint
Assert-True {$result.ProxyCustomHostnameConfiguration[$i].DefaultSslBinding}
Assert-False {$result.ProxyCustomHostnameConfiguration[$i].NegotiateClientCertificate}
Assert-Null $result.ProxyCustomHostnameConfiguration[$i].KeyVaultId
}
}
Assert-NotNull $result.PortalCustomHostnameConfiguration
Assert-AreEqual $portalHostName $result.PortalCustomHostnameConfiguration.Hostname
Assert-AreEqual Portal $result.PortalCustomHostnameConfiguration.HostnameType
Assert-AreEqual $certThumbprint $result.PortalCustomHostnameConfiguration.CertificateInformation.Thumbprint
Assert-NotNull $result.ManagementCustomHostnameConfiguration
Assert-AreEqual $managementHostName $result.ManagementCustomHostnameConfiguration.Hostname
Assert-AreEqual Management $result.ManagementCustomHostnameConfiguration.HostnameType
Assert-AreEqual $certThumbprint $result.ManagementCustomHostnameConfiguration.CertificateInformation.Thumbprint
Assert-Null $result.ScmCustomHostnameConfiguration
$result.ManagementCustomHostnameConfiguration = $null
$result.PortalCustomHostnameConfiguration = $null
$result.ProxyCustomHostnameConfiguration = @($customProxy1)
$certificateStoreLocation = "CertificateAuthority"
$systemCert = New-AzApiManagementSystemCertificate -StoreName $certificateStoreLocation -PfxPath $certFilePath -PfxPassword $securePfxPassword
$result.SystemCertificates = @($systemCert)
$result = Set-AzApiManagement -InputObject $result -PassThru
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $location $result.Location
Assert-AreEqual $sku $result.Sku
Assert-AreEqual 1 $result.Capacity
Assert-AreEqual "None" $result.VpnType
Assert-NotNull $result.ProxyCustomHostnameConfiguration
Assert-AreEqual 2 $result.ProxyCustomHostnameConfiguration.Count
for ($i = 0; $i -lt $result.ProxyCustomHostnameConfiguration.Count; $i++) {
if ($result.ProxyCustomHostnameConfiguration[$i].Hostname -eq $proxyHostName1) {
$found = $found + 1
Assert-AreEqual Proxy $result.ProxyCustomHostnameConfiguration[$i].HostnameType
Assert-AreEqual $certThumbprint $result.ProxyCustomHostnameConfiguration[$i].CertificateInformation.Thumbprint
Assert-True {$result.ProxyCustomHostnameConfiguration[$i].DefaultSslBinding}
Assert-False {$result.ProxyCustomHostnameConfiguration[$i].NegotiateClientCertificate}
Assert-Null $result.ProxyCustomHostnameConfiguration[$i].KeyVaultId
}
}
Assert-Null $result.PortalCustomHostnameConfiguration
Assert-Null $result.ManagementCustomHostnameConfiguration
Assert-Null $result.ScmCustomHostnameConfiguration
Assert-NotNull $result.SystemCertificates
Assert-AreEqual 1 $result.SystemCertificates.Count
Assert-AreEqual $certificateStoreLocation $result.SystemCertificates.StoreName
Assert-AreEqual $certThumbprint $result.SystemCertificates.CertificateInformation.Thumbprint
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
function Test-ApiManagementWithAdditionalRegionsCRUD {
$location = Get-ProviderLocation "Microsoft.ApiManagement/service"
$resourceGroupName = Get-ResourceGroupName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$sku = "Premium"
$capacity = 1
$firstAdditionalRegionLocation = "East US"
$secondAdditionalRegionLocation = "South Central US"
try {
New-AzResourceGroup -Name $resourceGroupName -Location $location
$firstAdditionalRegion = New-AzApiManagementRegion -Location $firstAdditionalRegionLocation
$secondAdditionalRegion = New-AzApiManagementRegion -Location $secondAdditionalRegionLocation
$regions = @($firstAdditionalRegion, $secondAdditionalRegion)
$result = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail -Sku $sku -Capacity $capacity -AdditionalRegions $regions
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $location $result.Location
Assert-AreEqual $sku $result.Sku
Assert-AreEqual $capacity $result.Capacity
Assert-AreEqual "None" $result.VpnType
Assert-AreEqual 2 $result.AdditionalRegions.Count
$found = 0
for ($i = 0; $i -lt $result.AdditionalRegions.Count; $i++) {
if ($result.AdditionalRegions[$i].Location.Replace(" ", "") -eq $firstAdditionalRegionLocation.Replace(" ", "")) {
$found = $found + 1
Assert-AreEqual $sku $result.AdditionalRegions[$i].Sku
Assert-AreEqual 1 $result.AdditionalRegions[$i].Capacity
Assert-Null $result.AdditionalRegions[$i].VirtualNetwork
}
if ($result.AdditionalRegions[$i].Location.Replace(" ", "") -eq $secondAdditionalRegionLocation.Replace(" ", "")) {
$found = $found + 1
Assert-AreEqual $sku $result.AdditionalRegions[$i].Sku
Assert-AreEqual 1 $result.AdditionalRegions[$i].Capacity
Assert-Null $result.AdditionalRegions[$i].VirtualNetwork
}
}
$newAdditionalRegionCapacity = 2
$apimService = Get-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName
$apimService = Remove-AzApiManagementRegion -ApiManagement $apimService -Location $firstAdditionalRegionLocation
$apimService = Update-AzApiManagementRegion -ApiManagement $apimService -Location $secondAdditionalRegionLocation -Capacity $newAdditionalRegionCapacity -Sku $sku
$updatedService = Set-AzApiManagement -InputObject $apimService -AssignIdentity -PassThru
Assert-AreEqual $resourceGroupName $updatedService.ResourceGroupName
Assert-AreEqual $apiManagementName $updatedService.Name
Assert-AreEqual $location $updatedService.Location
Assert-AreEqual $sku $updatedService.Sku
Assert-AreEqual $capacity $updatedService.Capacity
Assert-AreEqual "None" $updatedService.VpnType
Assert-AreEqual 1 $updatedService.AdditionalRegions.Count
$found = 0
for ($i = 0; $i -lt $updatedService.AdditionalRegions.Count; $i++) {
if ($updatedService.AdditionalRegions[$i].Location.Replace(" ", "") -eq $secondAdditionalRegionLocation.Replace(" ", "")) {
$found = $found + 1
Assert-AreEqual $sku $updatedService.AdditionalRegions[$i].Sku
Assert-AreEqual $newAdditionalRegionCapacity $updatedService.AdditionalRegions[$i].Capacity
Assert-Null $updatedService.AdditionalRegions[$i].VirtualNetwork
}
}
Assert-AreEqual "SystemAssigned" $updatedService.Identity.Type;
Assert-NotNull $updatedService.Identity.PrincipalId;
Assert-NotNull $updatedService.Identity.TenantId;
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
function Test-CrudApiManagementWithExternalVpn {
$location = "North Central US"
$resourceGroupName = Get-ResourceGroupName
$apiManagementName = Get-ApiManagementServiceName
$organization = "apimpowershellorg"
$adminEmail = "apim@powershell.org"
$sku = "Developer"
$capacity = 1
$subnetResourceId = "/subscriptions/20010222-2b48-4245-a95c-090db6312d5f/resourceGroups/powershelltest/providers/Microsoft.Network/virtualNetworks/apimvnettest/subnets/default"
$vpnType = "External"
try {
New-AzResourceGroup -Name $resourceGroupName -Location $location
$virtualNetwork = New-AzApiManagementVirtualNetwork -Location $location -SubnetResourceId $subnetResourceId
$result = New-AzApiManagement -ResourceGroupName $resourceGroupName -Location $location -Name $apiManagementName -Organization $organization -AdminEmail $adminEmail -VpnType $vpnType -VirtualNetwork $virtualNetwork -Sku $sku -Capacity $capacity
Assert-AreEqual $resourceGroupName $result.ResourceGroupName
Assert-AreEqual $apiManagementName $result.Name
Assert-AreEqual $location $result.Location
Assert-AreEqual $sku $result.Sku
Assert-AreEqual 1 $result.Capacity
Assert-AreEqual $vpnType $result.VpnType
Assert-AreEqual $subnetResourceId $result.VirtualNetwork.SubnetResourceId
Get-AzApiManagement -ResourceGroupName $resourceGroupName | Remove-AzApiManagement
$allServices = Get-AzApiManagement -ResourceGroupName $resourceGroupName
Assert-AreEqual 0 $allServices.Count
}
finally {
Clean-ResourceGroup $resourceGroupName
}
}
|
combined_dataset/train/non-malicious/4453.ps1
|
4453.ps1
|
Find-PSResource -name 'TestCommand'
Find-PSResource 'TestCommand'
Find-PSResource 'TestCommand' -Type 'Command'
Find-PSResource 'TestCommand' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -MinimumVersion '1.5.0'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -MaximumVersion '1.5.0'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -RequiredVersion '1.5.0'
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -AllVersions
Find-PSResource 'TestCommand' -ModuleName 'TestCommandModuleName' -Prerelease
Find-PSResource 'TestCommand' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestCommand' -Filter 'Test'
Find-PSResource 'TestCommand' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestCommand' -Type 'TestDscResource'
Find-PSResource -name 'TestDscResource'
Find-PSResource 'TestDscResource'
Find-PSResource 'TestDscResource' -Type 'DscResource'
Find-PSResource 'TestDscResource' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -MinimumVersion '1.5.0'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -MaximumVersion '1.5.0'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -RequiredVersion '1.5.0'
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -AllVersions
Find-PSResource 'TestDscResource' -ModuleName 'TestDscResourceModuleName' -Prerelease
Find-PSResource 'TestDscResource' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestDscResource' -Filter 'Test'
Find-PSResource 'TestDscResource' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestDscResource' -Type 'DscResource'
Find-PSResource -name 'TestRoleCapability'
Find-PSResource 'TestRoleCapability'
Find-PSResource 'TestRoleCapability' -Type 'DscResource'
Find-PSResource 'TestRoleCapability' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -MinimumVersion '1.5.0'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -MaximumVersion '1.5.0'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -RequiredVersion '1.5.0'
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -AllVersions
Find-PSResource 'TestRoleCapability' -ModuleName 'TestDscResourceModuleName' -Prerelease
Find-PSResource 'TestRoleCapability' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestRoleCapability' -Filter 'Test'
Find-PSResource 'TestRoleCapability' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestRoleCapability' -Type 'TestDscResource'
Find-PSResource -name 'TestModule'
Find-PSResource 'TestModule'
Find-PSResource 'TestModule' -Type 'Module'
Find-PSResource 'TestModule' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestModule' -MinimumVersion '1.5.0'
Find-PSResource 'TestModule' -MaximumVersion '1.5.0'
Find-PSResource 'TestModule' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestModule' -RequiredVersion '1.5.0'
Find-PSResource 'TestModule' -AllVersions
Find-PSResource 'TestModule' -Prerelease
Find-PSResource 'TestModule' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestModule' -Filter 'Test'
Find-PSResource 'TestModule' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestModule' -IncludeDependencies
Find-PSResource 'TestModule' -Includes 'DscResource'
Find-PSResource 'TestModule' -DSCResource 'TestDscResource'
Find-PSResource 'TestModule' -RoleCapability 'TestRoleCapability'
Find-PSResource 'TestModule' -Command 'Test-Command'
Find-PSResource -name 'TestScript'
Find-PSResource 'TestScript'
Find-PSResource 'TestScript' -Type 'Script'
Find-PSResource 'TestScript' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestScript' -MinimumVersion '1.5.0'
Find-PSResource 'TestScript' -MaximumVersion '1.5.0'
Find-PSResource 'TestScript' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestScript' -RequiredVersion '1.5.0'
Find-PSResource 'TestScript' -AllVersions
Find-PSResource 'TestScript' -AllowPrerelease
Find-PSResource 'TestScript' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestScript' -Filter 'Test'
Find-PSResource 'TestScript' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestScript' -IncludeDependencies
Find-PSResource 'TestScript' -Includes 'TestFunction'
Find-PSResource 'TestScript' -Command 'Test-Command'
Find-PSResource -name 'TestResource1', 'TestResource2', 'TestResource3'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Type 'Module'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Type 'Command', 'DscResource', 'RoleCapability', 'Module', 'Script'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -MinimumVersion '1.5.0'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -MaximumVersion '1.5.0'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -RequiredVersion '1.5.0'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -AllVersions
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Prerelease
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Tag 'Tag1', 'Tag2', 'Tag3'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Filter 'Test'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Repository 'Repository1', 'Repository2'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -IncludeDependencies
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Includes 'DscResource'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -DSCResource 'TestDscResource'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -RoleCapability 'TestRoleCapability'
Find-PSResource 'TestResource1', 'TestResource2', 'TestResource3' -Command 'Test-Command'
Install-PSResource 'TestModule'
Install-PSResource -name 'TestModule'
Install-PSResource 'TestModule1', 'TestModule2', 'TestModule3'
Install-PSResource 'TestModule' -MinimumVersion '1.5.0'
Install-PSResource 'TestModule' -MaximumVersion '1.5.0'
Install-PSResource 'TestModule' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Install-PSResource 'TestModule' -RequiredVersion '1.5.0'
Install-PSResource 'TestModule' -Prerelease
Install-PSResource 'TestModule' -Repository 'Repository1', 'Repository2'
Install-PSResource -RequiredResources @{
'Configuration' = '[1.3.1,2.0)'
'Pester' = @{
version = '[4.4.2,4.7.0]'
repository = 'https://www.powershellgallery.com'
}
}
Install-PSResource -RequiredResources ConvertTo-Json (
@{
'Configuration' = '[1.3.1,2.0)'
'Pester' = @{
version = '[4.4.2,4.7.0]'
repository = 'https://www.powershellgallery.com'
}
}
)
Install-PSResource -RequiredResourcesFile 'RequiredResource.psd1'
Install-PSResource -RequiredResourcesFile 'RequiredResource.json'
Install-PSResource 'TestModule' -Scope 'CurrentUser'
Install-PSResource 'TestModule' -Scope 'AllUsers'
Install-PSResource 'TestModule' -NoClobber
Install-PSResource 'TestModule' -IgnoreDifferentPublisher
Install-PSResource 'TestModule' -TrustRepository
Install-PSResource 'TestModule' -Force
Install-PSResource 'TestModule' -Reinstall
Install-PSResource 'TestModule' -Quiet
Install-PSResource 'TestModule' -AcceptLicense
Install-PSResource 'TestModule' -PassThru
Install-PSResource 'TestScript'
Install-PSResource -name 'TestScript'
Install-PSResource 'TestScript1', 'TestScript2', 'TestScript3'
Install-PSResource 'TestScript' -MinimumVersion '1.5.0'
Install-PSResource 'TestScript' -MaximumVersion '1.5.0'
Install-PSResource 'TestScript' -MinimumVersion '1.0.0' -MaximumVersion '2.0.0'
Install-PSResource 'TestScript' -RequiredVersion '1.5.0'
Install-PSResource 'TestScript' -Prerelease
Install-PSResource 'TestScript' -Repository 'Repository1', 'Repository2'
Install-PSResource -RequiredResources @{
'Configuration' = '[1.3.1,2.0)'
'TestScript' = @{
version = '[4.4.2,4.7.0]'
repository = 'https://www.powershellgallery.com'
}
}
Install-PSResource -RequiredResources ConvertTo-Json (
@{
'Configuration' = '[1.3.1,2.0)'
'TestScript' = @{
version = '[4.4.2,4.7.0]'
repository = 'https://www.powershellgallery.com'
}
}
)
Install-PSResource -RequiredResourcesFile 'RequiredResource.psd1'
Install-PSResource -RequiredResourcesFile 'RequiredResource.json'
Install-PSResource 'TestScript' -Scope 'CurrentUser'
Install-PSResource 'TestScript' -Scope 'AllUsers'
Install-PSResource 'TestModule' -NoClobber
Install-PSResource 'TestScript' -IgnoreDifferentPublisher
Install-PSResource 'TestScript' -TrustRepository
Install-PSResource 'TestScript' -Force
Install-PSResource 'TestScript' -Reinstall
Install-PSResource 'TestScript' -Quiet
Install-PSResource 'TestScript' -AcceptLicense
Install-PSResource 'TestScript' -PassThru
|
combined_dataset/train/non-malicious/Get-Answer.ps1
|
Get-Answer.ps1
|
##############################################################################\n##\n## Get-Answer\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nUses Bing Answers to answer your question\n\n.EXAMPLE\n\nGet-Answer "(5 + e) * sqrt(x) = Pi"\nCalculation\n(5+e )*sqrt ( x)=pi : x=0.165676\n\n.EXAMPLE\n\nGet-Answer msft stock\nMicrosoft Corp (US:MSFT) NASDAQ\n29.66 -0.35 (-1.17%)\nAfter Hours: 30.02 +0.36 (1.21%)\nOpen: 30.09 Day's Range: 29.59 - 30.20\nVolume: 55.60 M 52 Week Range: 17.27 - 31.50\nP/E Ratio: 16.30 Market Cap: 260.13 B\n\n#>\n\nSet-StrictMode -Version Latest\n\n$question = $args -join " "\n\nfunction Main\n{\n ## Load the System.Web.HttpUtility DLL, to let us URLEncode\n Add-Type -Assembly System.Web\n\n ## Get the web page into a single string with newlines between\n ## the lines.\n $encoded = [System.Web.HttpUtility]::UrlEncode($question)\n $url = "http://www.bing.com/search?q=$encoded"\n $text = (new-object System.Net.WebClient).DownloadString($url)\n\n ## Find the start of the answers section\n $startIndex = $text.IndexOf('<div class="ans">')\n\n ## The end is either defined by an "attribution" div\n ## or the start of a "results" div\n $endIndex = $text.IndexOf('<div class="sn_att2">')\n if($endIndex -lt 0) { $endIndex = $text.IndexOf('<div id="results">') }\n\n ## If we found a result, then filter the result\n if(($startIndex -ge 0) -and ($endIndex -ge 0))\n {\n ## Pull out the text between the start and end portions\n $partialText = $text.Substring($startIndex, $endIndex - $startIndex)\n\n ## Very fragile screen scraping here. Replace a bunch of\n ## tags that get placed on new lines with the newline\n ## character, and a few others with spaces.\n $partialText = $partialText -replace '<div[^>]*>',"`n"\n $partialText = $partialText -replace '<tr[^>]*>',"`n"\n $partialText = $partialText -replace '<li[^>]*>',"`n"\n $partialText = $partialText -replace '<br[^>]*>',"`n"\n $partialText = $partialText -replace '<span[^>]*>'," "\n $partialText = $partialText -replace '<td[^>]*>'," "\n\n $partialText = CleanHtml $partialText\n\n ## Now split the results on newlines, trim each line, and then\n ## join them back.\n $partialText = $partialText -split "`n" |\n Foreach-Object { $_.Trim() } | Where-Object { $_ }\n $partialText = $partialText -join "`n"\n\n [System.Web.HttpUtility]::HtmlDecode($partialText.Trim())\n }\n else\n {\n "`nNo answer found."\n }\n}\n\n## Clean HTML from a text chunk\nfunction CleanHtml ($htmlInput)\n{\n $tempString = [Regex]::Replace($htmlInput, "(?s)<[^>]*>", "")\n $tempString.Replace("  ", "")\n}\n\n. Main
|
combined_dataset/train/non-malicious/sample_60_45.ps1
|
sample_60_45.ps1
|
parameters:
configuration: 'Debug'
# Optional: condition for the job to run
condition: ''
# Optional: 'true' if future jobs should run even if this job fails
continueOnError: false
# Optional: dependencies of the job
dependsOn: ''
# Optional: Include PublishBuildArtifacts task
enablePublishBuildArtifacts: false
# Optional: A defined YAML pool - https://docs.microsoft.com/en-us/azure/devops/pipelines/yaml-schema?view=vsts&tabs=schema#pool
pool: {}
# Optional: should run as a public build even in the internal project
# if 'true', the build won't run any of the internal only steps, even if it is running in non-public projects.
runAsPublic: false
# Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing
publishUsingPipelines: false
# Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing
publishAssetsImmediately: false
artifactsPublishingAdditionalParameters: ''
signingValidationAdditionalParameters: ''
jobs:
- job: Asset_Registry_Publish
dependsOn: ${{ parameters.dependsOn }}
timeoutInMinutes: 150
${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
displayName: Publish Assets
${{ else }}:
displayName: Publish to Build Asset Registry
variables:
- template: /eng/common/templates/variables/pool-providers.yml
- ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}:
- group: Publish-Build-Assets
- group: AzureDevOps-Artifact-Feeds-Pats
- name: runCodesignValidationInjection
value: false
- ${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
- template: /eng/common/templates/post-build/common-variables.yml
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ if ne(variables['System.TeamProject'], 'DevDiv') }}:
name: NetCore1ESPool-Publishing-Internal
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}:
- task: DownloadBuildArtifacts@0
displayName: Download artifact
inputs:
artifactName: AssetManifests
downloadPath: '$(Build.StagingDirectory)/Download'
checkDownloadedFiles: true
condition: ${{ parameters.condition }}
continueOnError: ${{ parameters.continueOnError }}
- task: NuGetAuthenticate@1
- task: AzureCLI@2
displayName: Publish Build Assets
inputs:
azureSubscription: "Darc: Maestro Production"
scriptType: ps
scriptLocation: scriptPath
scriptPath: $(Build.SourcesDirectory)/eng/common/sdk-task.ps1
arguments: >
-task PublishBuildAssets -restore -msbuildEngine dotnet
/p:ManifestsPath='$(Build.StagingDirectory)/Download/AssetManifests'
/p:MaestroApiEndpoint=https://maestro.dot.net
/p:PublishUsingPipelines=${{ parameters.publishUsingPipelines }}
/p:OfficialBuildId=$(Build.BuildNumber)
condition: ${{ parameters.condition }}
continueOnError: ${{ parameters.continueOnError }}
- task: powershell@2
displayName: Create ReleaseConfigs Artifact
inputs:
targetType: inline
script: |
Add-Content -Path "$(Build.StagingDirectory)/ReleaseConfigs.txt" -Value $(BARBuildId)
Add-Content -Path "$(Build.StagingDirectory)/ReleaseConfigs.txt" -Value "$(DefaultChannels)"
Add-Content -Path "$(Build.StagingDirectory)/ReleaseConfigs.txt" -Value $(IsStableBuild)
- task: PublishBuildArtifacts@1
displayName: Publish ReleaseConfigs Artifact
inputs:
PathtoPublish: '$(Build.StagingDirectory)/ReleaseConfigs.txt'
PublishLocation: Container
ArtifactName: ReleaseConfigs
- task: powershell@2
displayName: Check if SymbolPublishingExclusionsFile.txt exists
inputs:
targetType: inline
script: |
$symbolExclusionfile = "$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt"
if(Test-Path -Path $symbolExclusionfile)
{
Write-Host "SymbolExclusionFile exists"
Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]true"
}
else{
Write-Host "Symbols Exclusion file does not exists"
Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]false"
}
- task: PublishBuildArtifacts@1
displayName: Publish SymbolPublishingExclusionsFile Artifact
condition: eq(variables['SymbolExclusionFile'], 'true')
inputs:
PathtoPublish: '$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt'
PublishLocation: Container
ArtifactName: ReleaseConfigs
- ${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
- template: /eng/common/templates/post-build/setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: AzureCLI@2
displayName: Publish Using Darc
inputs:
azureSubscription: "Darc: Maestro Production"
scriptType: ps
scriptLocation: scriptPath
scriptPath: $(Build.SourcesDirectory)/eng/common/post-build/publish-using-darc.ps1
arguments: -BuildId $(BARBuildId)
-PublishingInfraVersion 3
-AzdoToken '$(publishing-dnceng-devdiv-code-r-build-re)'
-WaitPublishingFinish true
-ArtifactsPublishingAdditionalParameters '${{ parameters.artifactsPublishingAdditionalParameters }}'
-SymbolPublishingAdditionalParameters '${{ parameters.symbolPublishingAdditionalParameters }}'
- ${{ if eq(parameters.enablePublishBuildArtifacts, 'true') }}:
- template: /eng/common/templates/steps/publish-logs.yml
parameters:
JobLabel: 'Publish_Artifacts_Logs'
|
combined_dataset/train/non-malicious/Add-ByteFormat.ps1
|
Add-ByteFormat.ps1
|
function Add-ByteFormat {
<#
.Synopsis
Function to make display of custom properties more human-readable.
.Description
With help of this function you will be able to force nice display of numeric data.
It's using best possible unit of measure for *bytes sizes.
If input object is PSCustomObject it will just modify it's ToString() method
If it's any other type - it will try to remove property, re-add and modify ToString() method.
Tested both on v2 and v3, works fine in both cases.
.Example
Get-ChildItem | Add-ByteFormat -Property Length
Output:
Directory: C:\\temp\\PowerShell\\vug\\ShowUI
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a--- 26/04/2012 09:36 534.00 B 0_GetProxy.ps1
-a--- 26/04/2012 11:12 266.00 B 1_StackPanel.ps1
-a--- 25/04/2012 19:44 752.00 B 2_SimpleUI.ps1
-a--- 25/04/2012 19:43 913.00 B 3_Przezroczyste.ps1
-a--- 25/04/2012 19:41 1.28 KB 4_ADLastName.ps1
-a--- 25/04/2012 19:42 1.38 KB 5_ADLastName.ps1
-a--- 25/04/2012 19:41 343.00 B 6_RandomFont.ps1
-a--- 25/04/2012 19:54 1.42 KB 7_ADLastName.ps1
-a--- 26/04/2012 11:17 624.00 B 8_Show-Command.ps1
-a--- 26/04/2012 10:28 8.01 KB 9_Show-Picture.ps1
-a--- 25/04/2012 19:27 21.29 KB logo.png
-a--- 15/10/2011 10:34 1.14 MB Normal.png
-a--- 25/05/2011 11:28 222.93 KB Powershell-V2-1280x1024.jpg
-a--- 25/05/2011 11:26 232.69 KB PowerShell1024x768[1].jpg
-a--- 09/01/2011 21:59 80.36 KB powershellpl.png
-a--- 26/04/2012 07:18 5.27 KB Sm-.csv
-a--- 26/04/2012 11:18 8.08 KB WAR.csv
Changes format of the Length property for files in current directory.
As a side effect in v3 it will show folders as having 1B size.
.Example
Get-WmiObject -Class Win32_LogicalDisk | Add-ByteFormat -Property Size, FreeSpace -DecimalPoint 0
Output:
DeviceID : C:
DriveType : 3
ProviderName :
FreeSpace : 9 GB
Size : 298 GB
VolumeName : PXL
Will display disk information using WMI in N0 format.
.Example
Import-Csv Foo.csv | Add-ByteFormat -Property HDSize, RAM | Format-Table -AutoSize
Output:
Name HDSize RAM
---- ------ ---
One 120.50 GB 1.47 GB
Two 58.10 GB 3.47 GB
Three 88.01 GB 1.21 GB
This command is wash & go for data imported from CSV that contains numeric:
-- numeric are no longer strings
-- numeric are displayed in nice(r) fasion.
.Link
http://becomelotr.wordpress.com/2012/05/03/more-on-output/
#>
[CmdletBinding()]
param (
# Properties that will get ToString() method modified to allow better display.
[Parameter(
Mandatory = $true
)]
[string[]]$Property,
# Number of decimal points used.
[Alias('DP')]
[int]$DecimalPoint = 2,
# Object, that has properties that will be modified.
[Parameter(
ValueFromPipeline = $true,
Mandatory = $true
)]
[Object]$InputObject
)
begin {
$MethodOptions = @{
Name = 'ToString'
MemberType = 'ScriptMethod'
PassThru = $true
Force = $true
Value = [ScriptBlock]::Create(@"
"{0:N$DecimalPoint} {1}" -f @(
switch -Regex ([math]::Log(`$this,1024)) {
^0 {
(`$this / 1), ' B'
}
^1 {
(`$this / 1KB), 'KB'
}
^2 {
(`$this / 1MB), 'MB'
}
^3 {
(`$this / 1GB), 'GB'
}
^4 {
(`$this / 1TB), 'TB'
}
default {
(`$this / 1PB), 'PB'
}
}
)
"@
)
}
}
process {
foreach ($Prop in $Property) {
$SelectedProperty = $InputObject.$Prop
if (!$SelectedProperty) {
Write-Verbose "No such property: $Prop"
continue
}
if ( ! ([double]$InputObject.$Prop) ) {
Write-Verbose "Can't be casted into double: $Prop"
continue
}
if ($SelectedProperty -is [System.String]) {
# Need to change property type to make sure we get .ToString() to run... ;)
[Int64]$InputObject.$Prop = $SelectedProperty
}
if (!$InputObject.PSTypeNames.Contains('System.Management.Automation.PSCustomObject')) {
try {
$Member = @{
MemberType = 'NoteProperty'
Name = $Prop
Force = $true
Value = $SelectedProperty
}
$InputObject | Add-Member @Member
} catch {
Write-Verbose "Not able to replace property on this type: $($InputObject.GetType().FullName)"
continue
}
}
$InputObject.$Prop = $InputObject.$Prop | Add-Member @MethodOptions
}
$InputObject
}
}
@@# Function in action. ;)
([PSCustomObject]@{
Name = 'Anna'
HDSize = 21313123
RAM = 123GB
Foo = '12313213123'
}),([PSCustomObject]@{
Name = 'Ewa'
HDSize = 213112313123
RAM = 1234MB
Foo = '12313213123'
}),([PSCustomObject]@{
Name = 'Adam'
HDSize = 21313
RAM = 530PB
Foo = '1231321113123'
}) | Add-ByteFormat -Property HDSize, RAM, Foo -Verbose
@'
Name,HDSize,RAM,Foo
Anna,21313123,12313213123,12313213123123
Ewa,123123123,123123123123,0
Adam,1231312312313,1231313213123123,12313123123123
'@ | ConvertFrom-Csv | Add-ByteFormat -Property HDSize, RAM, Foo -Verbose
|
combined_dataset/train/non-malicious/sample_61_75.ps1
|
sample_61_75.ps1
|
<#
.Synopsis
Activate a Python virtual environment for the current PowerShell session.
.Description
Pushes the python executable for a virtual environment to the front of the
$Env:PATH environment variable and sets the prompt to signify that you are
in a Python virtual environment. Makes use of the command line switches as
well as the `pyvenv.cfg` file values present in the virtual environment.
.Parameter VenvDir
Path to the directory that contains the virtual environment to activate. The
default value for this is the parent of the directory that the Activate.ps1
script is located within.
.Parameter Prompt
The prompt prefix to display when this virtual environment is activated. By
default, this prompt is the name of the virtual environment folder (VenvDir)
surrounded by parentheses and followed by a single space (ie. '(.venv) ').
.Example
Activate.ps1
Activates the Python virtual environment that contains the Activate.ps1 script.
.Example
Activate.ps1 -Verbose
Activates the Python virtual environment that contains the Activate.ps1 script,
and shows extra information about the activation as it executes.
.Example
Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv
Activates the Python virtual environment located in the specified location.
.Example
Activate.ps1 -Prompt "MyPython"
Activates the Python virtual environment that contains the Activate.ps1 script,
and prefixes the current prompt with the specified string (surrounded in
parentheses) while the virtual environment is active.
.Notes
On Windows, it may be required to enable this Activate.ps1 script by setting the
execution policy for the user. You can do this by issuing the following PowerShell
command:
PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
For more information on Execution Policies:
https://go.microsoft.com/fwlink/?LinkID=135170
#>
Param(
[Parameter(Mandatory = $false)]
[String]
$VenvDir,
[Parameter(Mandatory = $false)]
[String]
$Prompt
)
<# Function declarations --------------------------------------------------- #>
<#
.Synopsis
Remove all shell session elements added by the Activate script, including the
addition of the virtual environment's Python executable from the beginning of
the PATH variable.
.Parameter NonDestructive
If present, do not remove this function from the global namespace for the
session.
#>
function global:deactivate ([switch]$NonDestructive) {
# Revert to original values
# The prior prompt:
if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) {
Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt
Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT
}
# The prior PYTHONHOME:
if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) {
Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME
Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME
}
# The prior PATH:
if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) {
Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH
Remove-Item -Path Env:_OLD_VIRTUAL_PATH
}
# Just remove the VIRTUAL_ENV altogether:
if (Test-Path -Path Env:VIRTUAL_ENV) {
Remove-Item -Path env:VIRTUAL_ENV
}
# Just remove VIRTUAL_ENV_PROMPT altogether.
if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) {
Remove-Item -Path env:VIRTUAL_ENV_PROMPT
}
# Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether:
if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) {
Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force
}
# Leave deactivate function in the global namespace if requested:
if (-not $NonDestructive) {
Remove-Item -Path function:deactivate
}
}
<#
.Description
Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the
given folder, and returns them in a map.
For each line in the pyvenv.cfg file, if that line can be parsed into exactly
two strings separated by `=` (with any amount of whitespace surrounding the =)
then it is considered a `key = value` line. The left hand string is the key,
the right hand is the value.
If the value starts with a `'` or a `"` then the first and last character is
stripped from the value before being captured.
.Parameter ConfigDir
Path to the directory that contains the `pyvenv.cfg` file.
#>
function Get-PyVenvConfig(
[String]
$ConfigDir
) {
Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg"
# Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue).
$pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue
# An empty map will be returned if no config file is found.
$pyvenvConfig = @{ }
if ($pyvenvConfigPath) {
Write-Verbose "File exists, parse `key = value` lines"
$pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath
$pyvenvConfigContent | ForEach-Object {
$keyval = $PSItem -split "\s*=\s*", 2
if ($keyval[0] -and $keyval[1]) {
$val = $keyval[1]
# Remove extraneous quotations around a string value.
if ("'""".Contains($val.Substring(0, 1))) {
$val = $val.Substring(1, $val.Length - 2)
}
$pyvenvConfig[$keyval[0]] = $val
Write-Verbose "Adding Key: '$($keyval[0])'='$val'"
}
}
}
return $pyvenvConfig
}
<# Begin Activate script --------------------------------------------------- #>
# Determine the containing directory of this script
$VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition
$VenvExecDir = Get-Item -Path $VenvExecPath
Write-Verbose "Activation script is located in path: '$VenvExecPath'"
Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)"
Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)"
# Set values required in priority: CmdLine, ConfigFile, Default
# First, get the location of the virtual environment, it might not be
# VenvExecDir if specified on the command line.
if ($VenvDir) {
Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values"
}
else {
Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir."
$VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/")
Write-Verbose "VenvDir=$VenvDir"
}
# Next, read the `pyvenv.cfg` file to determine any required value such
# as `prompt`.
$pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir
# Next, set the prompt from the command line, or the config file, or
# just use the name of the virtual environment folder.
if ($Prompt) {
Write-Verbose "Prompt specified as argument, using '$Prompt'"
}
else {
Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value"
if ($pyvenvCfg -and $pyvenvCfg['prompt']) {
Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'"
$Prompt = $pyvenvCfg['prompt'];
}
else {
Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)"
Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'"
$Prompt = Split-Path -Path $venvDir -Leaf
}
}
Write-Verbose "Prompt = '$Prompt'"
Write-Verbose "VenvDir='$VenvDir'"
# Deactivate any currently active virtual environment, but leave the
# deactivate function in place.
deactivate -nondestructive
# Now set the environment variable VIRTUAL_ENV, used by many tools to determine
# that there is an activated venv.
$env:VIRTUAL_ENV = $VenvDir
$env:VIRTUAL_ENV_PROMPT = $Prompt
if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) {
Write-Verbose "Setting prompt to '$Prompt'"
# Set the prompt to include the env name
# Make sure _OLD_VIRTUAL_PROMPT is global
function global:_OLD_VIRTUAL_PROMPT { "" }
Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT
New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt
function global:prompt {
Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) "
_OLD_VIRTUAL_PROMPT
}
}
# Clear PYTHONHOME
if (Test-Path -Path Env:PYTHONHOME) {
Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME
Remove-Item -Path Env:PYTHONHOME
}
# Add the venv to the PATH
Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH
$Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH"
# SIG # Begin signature block
# MIIvKgYJKoZIhvcNAQcCoIIvGzCCLxcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBALKwKRFIhr2RY
# IW/WJLd9pc8a9sj/IoThKU92fTfKsKCCE8MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw
# CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x
# IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ
# eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7
# uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx
# xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb
# D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA
# GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm
# SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA
# LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1
# HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc
# eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w
# tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B
# Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj
# ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E
# FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM
# MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI
# QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex
# LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v
# d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI
# hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N
# s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA
# 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2
# de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O
# q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd
# I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50
# jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU
# 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq
# rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs
# M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa
# 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa
# vTCCGrkCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT
# QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl
# AwQCAQUAoIHOMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC
# AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAqV3t0Ut29nKA9Aib3
# hB5YJarT1GGdhakqzlHz+gumODBiBgorBgEEAYI3AgEMMVQwUqBMgEoAQgB1AGkA
# bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAzAC4AMAByAGMAMQBfADIA
# MAAyADQAMAA3ADMAMQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAFxu82YvE
# 47pbLsDEwG4qWNhP6nfRcp2qGGUIMjKB8wI8srCVc0VQ29FkU6mNZ8sR6VYKCvjr
# XHmilJyHd8uaoMvQNUPAtHiZDF6cguXN0ta1USxL+S8oinShAnfxWE3vTbvD0Nlb
# wPheRk8mRUJwDnH1Un9HChnvxRzqpcyqIphKWKimZ2U/NgVrIrljQCNZfzaMwT23
# XiCUW3LfZH5g8GlwqOjPGpwsvZ5WWTkAOmnKU8w8KSHRnNvxBAK8JrhfC53dQR25
# IH4oFl5sET0aM16g7w0KUCF0tmh98n4PlYewovzLWHwBxL+7xIZvzfWvjew9Yz2b
# v93UoeX7so/i0ttMyneYf8hOiRGjeQsCdnaWAL5raf+Zy9dfD0IsoLAwz+wA8tnd
# dbfdSmikEYnaJtW2iu/v7Y3PEazJvDay+ydgOkNiEypIWb5ajHWsxcwQNWssctSo
# u8+jpWPbLuWJciQ536h42+pIvGCU0hjNde/qp/N3ZY8iLnf8Tmj8VPD/jYUpceYr
# FS18GwtlgXf1vm6i6EkaDrke0bV/QBOzCftMZ6+DoamxIyJyWCvHySa8wCDML7iI
# ZJo9W40+oEZugj9614bmrtYIPcCWt134cgUjeTtvLiejCUfue1P3RfOtfJ+0K1Dv
# 0EAwDQf/xM8CLeUVYfA1U1f2hOitMHlHdG2hghdAMIIXPAYKKwYBBAGCNwMDATGC
# FywwghcoBgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgG
# CyqGSIb3DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEF
# AAQgOglg5NmloxH/nfFVDW3EoNbYH6ZJigJSmLk76M+M92QCEQDuMk6dcNtyZFmP
# k1LP3WkLGA8yMDI0MDczMTIxNTc1OVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85Sd
# CDmmv9s/X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UE
# ChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQg
# UlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoX
# DTM0MTAxMzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0
# LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJ
# KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEO
# CdwvSKOXejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrH
# mjsvlmbjaedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvK
# Xd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+
# 3RChG4PBuOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV
# 5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0
# +9S769SgLDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzh
# Ua+0rRUGFOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/
# eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7
# UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlw
# Jw1Pt7U20clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQ
# ofM604qDy0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEE
# AjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8w
# HQYDVR0OBBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuG
# SWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQw
# OTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQG
# CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKG
# TGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJT
# QTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AIEa1t6gqbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEv
# GN1Ott5s1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcig
# LiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvE
# xnvPnPp44pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W
# 8oM3NG6wQSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MA
# cN7MmJ4ZiQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arA
# VeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6c
# Kmx5AdzaROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygW
# y2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9O
# TH0eaHDAdwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8
# WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQ
# BzY3tyRUfNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAw
# MDAwWhcNMzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
# MIICCgKCAgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYR
# oUQVQl+kiPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CE
# iiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCH
# RgB720RBidx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5K
# fc71ORJn7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDni
# pUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2
# nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp
# 88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1C
# vwWcZklSUPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+
# 0wOI/rOP015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl2
# 7KtdRnXiYKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOC
# AV0wggFZMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaa
# L3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1Ud
# DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkw
# JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcw
# AoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJv
# b3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQu
# Y29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwB
# BAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+
# ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvX
# bYf6hCAlNDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tP
# iix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCy
# Xen/KFSJ8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpF
# yd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3
# fpNTrDsdCEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t
# 5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejx
# mF/7K9h+8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxah
# ZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAA
# zV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vup
# L0QVSucTDh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghA
# GFowDQYJKoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD
# ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGln
# aUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEw
# OTIzNTk1OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1
# c3RlZCBSb290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQ
# c2jeu+RdSjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW
# 61bGl20dq7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU
# 0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzr
# yc/NrDRAX7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17c
# jo+A2raRmECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypu
# kQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaP
# ZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUl
# ibaaRBkrfsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESV
# GnZifvaAsPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2
# QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZF
# X50g/KEexcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1Ud
# EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1Ud
# IwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5Bggr
# BgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNv
# bTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lD
# ZXJ0QXNzdXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8v
# Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEG
# A1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0
# Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+A
# ufih9/Jy3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51P
# pwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix
# 3P0c2PR3WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVV
# a88nq2x2zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6pe
# KOK5lDGCA3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lD
# ZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYg
# U0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgB
# ZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcN
# AQkFMQ8XDTI0MDczMTIxNTc1OVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvAr
# MsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEIHLlUVXY3W55if6YoNq0
# u5lL5PHdvUCTndSUOtOjHmsxMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3t
# dCLM0dRAV2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAByu
# KjeYuFDijiAy/U+RdgBw2PnUle07dSVXVEBRvIPWj49TCYVT5vOcJzaIsBM5k/tB
# idd9B/Bx5dKcA2HRHPBCOt9IjIy3b753/flkOdGzc6rSR5WKOJv/LgkoUIMJYUIB
# /870bUQSCniz4vJEIDoWXcJw47ztdwbAPBXST+8mKc7VX4G7sbN0bETNvBSPeoxY
# 393ERGg5NpL8LXbZl3+nab42M5FvgjO32MFRcZ/2/Sbr7R5AN6EWMn3fFt9mUA4W
# 32GAPmVeAIceowfRp0HRcVdiypL72HoOe375LTug91B31HZdGBMPbBTPvB0CQI+j
# bjK2MBttjR6VCdvuEhmitwPJkE8lVrgr2a8iTHisV/Mi3yJMUXhRMnCkpqVHpdYY
# rrY/VrtqKIiIhxfiKcQPGv9Eph7vFW4yHFMN6bBfEIgwWJCKnMtyGKOM+3Rqk52W
# Zn+jariZGgmdif2K/WMrzqOIZ1rAL8oVMqhsWHck/L5Kagm5MFV3JiqKN2PfaLtF
# 1CKAZJcB6NORkny3+Z0V+XiFGx/s+cKEoEbpKb+gKmGcoQFR9pW68omuVl1LaHGv
# 4jbSp8u2d3eQTzAP4jGnYJVGdH1j+NDocBse342sq8pJbDvC5Ysg3uJ31zPgIqTn
# D4QenPayyUFUyu363XMoYpqT0epjRz54KwsfISM4
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_44_96.ps1
|
sample_44_96.ps1
|
#
# Module manifest for module 'OCI.PSModules.Appmgmtcontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Appmgmtcontrol.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd2facbcf-7202-47af-96ae-07771dc74773'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Appmgmtcontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Appmgmtcontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAppmgmtcontrolMonitoringPlugin',
'Get-OCIAppmgmtcontrolMonitoredInstance',
'Get-OCIAppmgmtcontrolMonitoredInstancesList',
'Get-OCIAppmgmtcontrolWorkRequest',
'Get-OCIAppmgmtcontrolWorkRequestErrorsList',
'Get-OCIAppmgmtcontrolWorkRequestLogsList',
'Get-OCIAppmgmtcontrolWorkRequestsList',
'Invoke-OCIAppmgmtcontrolPublishTopProcessesMetrics'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Appmgmtcontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Ping-Host_1.ps1
|
Ping-Host_1.ps1
|
function Ping-Host {param( [string]$HostName,
[int32]$Requests = 3)
for ($i = 1; $i -le $Requests; $i++) {
$Result = Get-WmiObject -Class Win32_PingStatus -ComputerName . -Filter "Address='$HostName'"
Start-Sleep -Seconds 1
if ($Result.StatusCode -ne 0) {return $FALSE}
}
return $TRUE
}
|
combined_dataset/train/non-malicious/611.ps1
|
611.ps1
|
param(
[string]$Version,
[string]$Path,
[switch]$Force,
$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "http://download.tuxfamily.org/notepadplus/6.5.3/npp.6.5.3.Installer.exe"
Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path $Config.Path
}
$_.Downloads | ForEach-Object{
Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/S" -Wait
}
if(Test-Path "C:\Program Files (x86)\Notepad++\notepad++.exe"){
Set-Content -Path (Join-Path $PSbin.Path "Notepad++.bat") -Value "@echo off`nstart `"`" `"C:\Program Files (x86)\Notepad++\notepad++.exe`" %*"
}elseif(Test-Path "C:\Program Files\Notepad++\notepad++.exe"){
Set-Content -Path (Join-Path $PSbin.Path "Notepad++.bat") -Value "@echo off`nstart `"`" `"C:\Program Files\Notepad++\notepad++.exe`" %*"
}
$_.Downloads | ForEach-Object{
Remove-Item $(Join-Path $_.Path $_.Filename)
}
if($Update){$_.Result = "AppUpdated";$_
}else{$_.Result = "AppInstalled";$_}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
if(Test-Path (Join-Path $PSbin.Path "Notepad++.bat")){Remove-Item (Join-Path $PSbin.Path "Notepad++.bat")}
if(Test-Path "C:\Program Files (x86)\Notepad++\uninstall.exe"){
Start-Process -FilePath "C:\Program Files (x86)\Notepad++\uninstall.exe" -ArgumentList "/S" -Wait
}elseif(Test-Path "C:\Program Files\Notepad++\uninstall.exe"){
Start-Process -FilePath "C:\Program Files\Notepad++\uninstall.exe" -ArgumentList "/S" -Wait
}
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
}
|
combined_dataset/train/non-malicious/sample_31_10.ps1
|
sample_31_10.ps1
|
@{
GUID="{Fb6cc51d-c096-4b38-b78d-0fed6277096a}"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
RootModule="Microsoft.Management.Infrastructure.CimCmdlets"
RequiredAssemblies="Microsoft.Management.Infrastructure.CimCmdlets.dll","Microsoft.Management.Infrastructure.Dll"
FunctionsToExport = @()
CmdletsToExport= "Get-CimAssociatedInstance", "Get-CimClass", "Get-CimInstance", "Get-CimSession", "Invoke-CimMethod",
"New-CimInstance","New-CimSession","New-CimSessionOption","Register-CimIndicationEvent","Remove-CimInstance",
"Remove-CimSession","Set-CimInstance",
"Export-BinaryMiLog","Import-BinaryMiLog"
AliasesToExport = "gcim","scim","ncim", "rcim","icim","gcai","rcie","ncms","rcms","gcms","ncso","gcls"
HelpInfoUri="https://aka.ms/powershell73-help"
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA1HwyDFeHiXK3E
# lEPj+wpNXm/MOZNih5kulbh+qBUhN6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDHP48KQXhNrQjE8lMQHoBsl
# grWr2tSJ8SCaJcAk6qAYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEACjKeyzJ4dgoNazI/SMf1yN3NdXSvUOWerIVdMQvgUhHsEVQIV2qy440x
# /lWNqbtAjZxjW2dD3w8FVsP+MXVO/4KoVEGyo9a7/ai42TUWpMuTcOvTs6jwpdbC
# KqnQ5iGLWujCA4wDq71UXPZGEEnRNKYE56k+U5vQsPEMECOWOmYeb3+6VDPPcQfb
# lceE5mF7mNp8sp0kkDFHwGnqLhhRP5Xx9A6FCEMBJMu/zqKv/qKAtrQss6Ur2V/n
# vebvWJT6qSVKNTDlwh+Gu8+hwqt1NKqzQUzIFgwbFvkE7Ts91VbLRDiC2HwWq/KG
# LvCeQ3T8Gjxum5YlOj2/o1G3/zvwD6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCdOlEIonyMeFl9zK/NaKg6p/WdqxbtL8eLOhHth7l24AIGZYMzcags
# GBMyMDI0MDExMTA0MzQxNC43MDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOlJYA0wIhgPMjAyNDAxMTEwMjI3MjVaGA8yMDI0MDExMjAyMjcyNVowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6UlgDQIBADAKAgEAAgIbIQIB/zAHAgEAAgISuDAK
# AgUA6UqxjQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFkFEliZXMyT+yX5
# rvA21SFg+y9Ujd+D6ydr3euZ86pmIpuHE9VLYFWURbr2o8/gp2tog15VATitC2FV
# NzIVleDF8frsHdhnW4UoO86rPmx5TBxIZt/UkYUn5VsI2wMkNNRMBw3WpsgmKFrE
# uwvY9rTRcRmMy9cqYB5i09uzr6ODMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgp45zdQxHotOQl9sHtqv3dn4daBuz65P5KUIOg2mUpZwwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIPBrc4TxOks9oaZ4EPUAG2fZqlTGot2+EgTfKsqe
# zOdlMA0GCSqGSIb3DQEBCwUABIICAHTTxPzr/ihujNLm4G23QP25m0W8KrjidaLh
# t/bbGIMnAebTe2JxFyR6juo76wkRZL9gtwx9tO54J1G4REYCYq/0LsP6WLoots/3
# zXRTNV2Lwk4V7Di73Ncg4yUsSVzk3HSpScii9VSrphuIXNQmjCLxQNERkmFx7TtK
# qUW4rRBEuCIggZdl8aQ+9YX/ncAE8mBYqeFgMJicuSePHxL7osPTeYn91DkDz0Je
# znqucQ2roqPe1HMJOk3MZ12spqDjnK5LgwWF8sagZPW/9m4WoYz6/tmzRuQ6HsbG
# Y+Df+Pxmb80QiuKaSUKmrm3TzGeTduPuMSt1nIv2hKJZXT5riTwd6x61hhLh/DMl
# m5ByTT/UOUsJjHY1VOc2vQQlDw8nFpPDxQ/qg6rURuIGnWSgl5uhZUPm74F+UX8H
# 9OTQlcffu10yeYDlEy4UxZ8YTmgHo2JT/ImEJUH1lCmdP95yu6wjrDEJ7YzBindt
# Ecyf1Tj1/+3rIxI8kOmODlUMD/4D3Db4VY0IbGifobJWxUW7Obv8b6mOgwqtt5Dh
# rRSAcjH4oTrA26J/pDJmv7ROTKNi8806tUbXmwkyyYUfgovxiUZZx1uKLZ6ohQSH
# AlE5UOK0GxWBelcFwi/AZ4Et1n4FaNcfAji+xYmGUb3RnPg33ULzCp4nCBEGVNMX
# 6Ap14BEj
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_16.ps1
|
sample_31_16.ps1
|
#
# Module manifest for module 'OCI.PSModules.Managementdashboard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Managementdashboard.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '75973f59-c3d0-4e5a-af34-7a8a94e15cfd'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Managementdashboard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementdashboard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIManagementdashboardDashboard',
'Get-OCIManagementdashboard',
'Get-OCIManagementdashboardManagementSavedSearch',
'Get-OCIManagementdashboardManagementSavedSearchesList',
'Get-OCIManagementdashboardsList',
'Import-OCIManagementdashboardDashboard',
'Move-OCIManagementdashboardManagementSavedSearchesCompartment',
'Move-OCIManagementdashboardsCompartment',
'New-OCIManagementdashboard',
'New-OCIManagementdashboardManagementSavedSearch',
'Remove-OCIManagementdashboard',
'Remove-OCIManagementdashboardManagementSavedSearch',
'Update-OCIManagementdashboard',
'Update-OCIManagementdashboardManagementSavedSearch'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementdashboard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/5.ps1
|
5.ps1
|
if (($PSVersionTable.PSVersion.Major -ge 6) -and !$IsWindows) {
function Set-ConsoleMode {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")]
param()
}
return
}
$consoleModeSource = @"
using System;
using System.Runtime.InteropServices;
public class NativeConsoleMethods
{
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern IntPtr GetStdHandle(int handleId);
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern bool GetConsoleMode(IntPtr hConsoleOutput, out uint dwMode);
[DllImport("kernel32.dll", CharSet = CharSet.Unicode, SetLastError = true)]
public static extern bool SetConsoleMode(IntPtr hConsoleOutput, uint dwMode);
public static uint GetConsoleMode(bool input = false)
{
var handle = GetStdHandle(input ? -10 : -11);
uint mode;
if (GetConsoleMode(handle, out mode))
{
return mode;
}
return 0xffffffff;
}
public static uint SetConsoleMode(bool input, uint mode)
{
var handle = GetStdHandle(input ? -10 : -11);
if (SetConsoleMode(handle, mode))
{
return GetConsoleMode(input);
}
return 0xffffffff;
}
}
"@
[Flags()]
enum ConsoleModeInputFlags
{
ENABLE_PROCESSED_INPUT = 0x0001
ENABLE_LINE_INPUT = 0x0002
ENABLE_ECHO_INPUT = 0x0004
ENABLE_WINDOW_INPUT = 0x0008
ENABLE_MOUSE_INPUT = 0x0010
ENABLE_INSERT_MODE = 0x0020
ENABLE_QUICK_EDIT_MODE = 0x0040
ENABLE_EXTENDED_FLAGS = 0x0080
ENABLE_AUTO_POSITION = 0x0100
ENABLE_VIRTUAL_TERMINAL_PROCESSING = 0x0200
}
[Flags()]
enum ConsoleModeOutputFlags
{
ENABLE_PROCESSED_OUTPUT = 0x0001
ENABLE_WRAP_AT_EOL_OUTPUT = 0x0002
ENABLE_VIRTUAL_TERMINAL_PROCESSING = 0x0004
}
function Set-ConsoleMode
{
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")]
param(
[Parameter(ParameterSetName = "ANSI")]
[switch]
$ANSI,
[Parameter(ParameterSetName = "Mode")]
[uint32]
$Mode,
[switch]
$StandardInput
)
begin {
if (!('NativeConsoleMethods' -as [System.Type])) {
Add-Type $consoleModeSource
}
}
end {
if ($ANSI)
{
$outputMode = [NativeConsoleMethods]::GetConsoleMode($false)
$null = [NativeConsoleMethods]::SetConsoleMode($false, $outputMode -bor [ConsoleModeOutputFlags]::ENABLE_VIRTUAL_TERMINAL_PROCESSING)
if ($StandardInput)
{
$inputMode = [NativeConsoleMethods]::GetConsoleMode($true)
$null = [NativeConsoleMethods]::SetConsoleMode($true, $inputMode -bor [ConsoleModeInputFlags]::ENABLE_VIRTUAL_TERMINAL_PROCESSING)
}
}
else
{
[NativeConsoleMethods]::SetConsoleMode($StandardInput, $Mode)
}
}
}
|
combined_dataset/train/non-malicious/1163.ps1
|
1163.ps1
|
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Test-NewTempDir
{
$tmpDir = New-TempDir
try
{
Assert-DirectoryExists $tmpDir
}
finally
{
Uninstall-Directory -Path $tmpDir -Recurse
}
}
function Test-ShouldSupportPrefix
{
$tempDir = New-TempDir -Prefix 'fubar'
try
{
Assert-DirectoryExists $tempDir
Assert-Like $tempDir.Name 'fubar*'
}
finally
{
Uninstall-Directory -Path $tempDir -Recurse
}
}
function Test-ShouldSupportPathsForPrefix
{
$tempDir = New-TempDirectory -Prefix $PSCommandPath
try
{
Assert-DirectoryExists $tempDir
Assert-Like $tempDir.Name ('{0}*' -f (Split-Path -Leaf -Path $PSCommandPath))
}
finally
{
Uninstall-Directory -Path $tempDir -Recurse
}
}
|
combined_dataset/train/non-malicious/sample_12_34.ps1
|
sample_12_34.ps1
|
#************************************************
# DC_WebClient-Component.ps1
# Version 1.0
# Date: 2009-2014
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about WebClient/WebDAV.
# Called from: Networking Diagnostics
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWebClient -Status $ScriptVariable.ID_CTSWebClientDescription
# detect OS version and SKU
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
function RunNetSH ([string]$NetSHCommandToExecute="")
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWebClient -Status "netsh $NetSHCommandToExecute"
$NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6
"`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
#----------Registry
$OutputFile= $Computername + "_WebClient_reg_output.TXT"
$CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\WebClient",
"HKLM\System\CurrentControlSet\Services\MRxDAV",
"HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider",
"HKCU\Network",
"HKCU\Software\Microsoft\Office\14.0\Common\Internet",
"HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
$sectionDescription = "WebClient"
RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "WebClient registry output" -SectionDescription $sectionDescription
#Windows Server 2008+
if ($bn -gt 6000)
{
#----------Netsh
$OutputFile = $ComputerName + "_WebClient_netsh_winhttp-proxy-settings.txt"
RunNetSH -NetSHCommandToExecute "winhttp show proxy"
CollectFiles -filesToCollect $OutputFile -fileDescription "WebClient-WinHTTP-proxy-settings" -SectionDescription $sectionDescription
}
#Windows Server 2003
else
{
#----------ProxyCfg
$OutputFile = $ComputerName + "_WebClient_proxycfg.txt"
$CommandToExecute = "cmd.exe /c proxycfg.exe >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
CollectFiles -filesToCollect $OutputFile -fileDescription "WebClient-WinHTTP-proxy-settings_proxycfg" -SectionDescription $sectionDescription
}
#----------Driver Information for WebClient
#$OutputFileSym = "_WebClient"
# Array of file names to pass to checksym
#[array]$arrFileNames = @("davclnt.dll","webclnt.dll")
# Call DC_ChkSym.ps1 with array of files
#Run-DiagExpression .\DC_ChkSym.ps1 -FolderName "$Env:SystemRoot\System32" -FileMask $arrFileNames -Prefix $OutputFileSym -Suffix "_binaries_dll" -FileDescription "WebClient Driver Versions" -Recursive $true
#Run-DiagExpression .\DC_ChkSym.ps1 -FolderName "$Env:SystemRoot\System32\drivers" -FileMask "mrxdav.sys" -Prefix $OutputFileSym -Suffix "_binaries_sys" -FileDescription "Offline Files and Folders Driver Versions"
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNnjttSe4LwR7G
# Za3ALC7VXCkrS2GVebpjsJIGEZpI3aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMI5kaY7ypXliDurX2LLvp9W
# WzW8SDF/JYUu6dxSlLLxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAl1eopaykGN4wzF8zF5pvruBjqLY8Yrl0DSa9e+RItoqwWhn3MulW8FSC
# NoG1GytyiqAUUDySg3Ks7OF7atCBnA4XJXVivxp54v8QlXVGchxFx7L7D8XQSmuX
# tOoIKonScyV90WfQUASgZX1nz7mqcFwkPTPuABKQFTrPjoSLGAkjKRKMhepcc9v0
# fC/+QBRYLGCVo5U2DBx+Lnw3jRMrHZXz/RMGzt0ou8yb4sGbTNSnvTAfL+R9sMd7
# cThVn2OBd2o3320YtjtjD8JJa42jWjL3PPOOGJCmZ6+ohs16yCFLblnw2H2oZ2vn
# RJmm8WG9f2zezaducHuJYssOTKOdQaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBz9fr9wx3OQgOkS+ui5iZhX5IVYT3Ogf8PLlNlO5iaxgIGZutLSAPe
# GBMyMDI0MTAyODExNDA0My44MTlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4fPfBZdahAAEAAAH/MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjRDMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyeiV0pB7bg8/qc/mkiDd
# JXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4dU4VCkAZEXqvkxP5QNTtB
# G5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxh
# ZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAnncUdtp1xjGmCpdBMygk/
# K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4
# xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3Y
# SEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr9/fIEpPAlC8YisxXaGX4
# RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7
# XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbiaboi12usV8axtlT/dCeP
# C4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA4y3s6G+gQ35o90j2i6am
# aa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49tdsWTIgZWVOSS9uUHhSY
# kbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/
# d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOSNN5MpLiyun
# m866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUAp6WtgolIrativXjOG1lI
# jayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyfOievfbsIzTk/G51+uiUJ
# k772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2T
# CtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3kN8N56jpl9kotLhdvd89
# RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU3dLYTAI91gTNUF7BA9q1
# EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMS
# uwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+c
# RClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tytuulYYcRK95qihF0irQs6
# /WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3XRROwAv016ICuT8hY1In
# yW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTSY4OGuGU1SXaH49JSP3t8
# yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUlcnPkwRLFRPXFspmggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0MTAyOTA5Mzk0OVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEAAgIFPAIB/zAHAgEAAgIU
# KTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAuUNJmV2WE
# mZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaHyPjIBqzVVX+OsCmMA4rC
# SBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cqWgcxpcvR5+XFiKoxtNrZ
# +ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedWcWiD6dyYPjiJ10ZllDJA
# kIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7aY8kNavDIwAwm/WFtYzSw
# Fv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4swD4QJBUY7k+61Fk5XlZ
# u6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgM+Vnndrn
# wRmd4MtFkfe4ED+8thdHxyWNWDGgnT5g2wYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8upyn/TCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/xI4fPfBZdahAAEA
# AAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJkD9cXZckbMA0GCSqGSIb3
# DQEBCwUABIICAMQyqhXOGw16vs0AooQRm0bu3lkeRZ0H92j5O68va7P88Pj3sEhM
# 45f3sN0S4DYdOejODq8PzvnRUigcWtYtgQSHhqHBer0WjMvHCaEkDDrnxVbQe3cJ
# cC345qki67HEdeo7KyD5MByte33XEHlqrVGC4JAxmtyiLsf8+K43CrRc6yXFYpum
# t82TdPvQgTuSKQV/gnsGytaApr0XArjnTtVDD2ytAiwkNI/L57FB/jZDhH/NqEa4
# huFCVUX9oVQ3B2Nw/OXT+JYQIJNgKg/wv6RHne9egIVBpS7Tq2EeD0KzgBk5FjGk
# ZZUJovSg1ADz1FDNeDx0v3vKdgJsqeukqLLj/Bh58A0yddHLuTqMbGcEhA6SLNRN
# mZtbYSF/oGVYjbkpfVNeVVFhxAPrfgitoMuxb1h+rp4gQQMI4nku7JKt+CQZ6wSa
# bVom+zk+ofGdDN3VduhBpJpc98qLWpHNzbyMbGmDpp94+rbBZfbQ6VvjPMVmEGDH
# 3n5fZfJ/5roFzMSoHHv9lCm1RQgPx3HhLypSvOOgGQegMZcYZ5bZo8/8syVi5mmB
# dlE9VeGIAdy6gjqYCOjWPSGloTICmKuaODgzWRajUwBJj3rdgHOR5xQvjdM4Covu
# y/fQD13XCGRXHg07DwbYI38HdLdGa+EgdHw1sFlnQ1ESb+SQJQ5cU55c
# SIG # End signature block
|
combined_dataset/train/non-malicious/2377.ps1
|
2377.ps1
|
[CmdletBinding()]
[OutputType([array])]
param
(
[string[]]$Computername = 'localhost',
[Parameter(ValueFromPipeline = $true,
ValueFromPipelineByPropertyName = $true)]
[ValidatePattern('[A-Z]')]
[string]$DriveLetter,
[ValidateSet('KB','MB','GB','TB')]
[string]$SizeOutputLabel = 'MB'
)
Begin {
try {
$WhereQuery = "SELECT FreeSpace,DeviceID FROM Win32_Logicaldisk"
if ($PsBoundParameters.DriveLetter) {
$WhereQuery += ' WHERE'
$BuiltQueryParams = { @() }.Invoke()
foreach ($Letter in $DriveLetter) {
$BuiltQueryParams.Add("DeviceId = '$DriveLetter`:'")
}
$WhereQuery = "$WhereQuery $($BuiltQueryParams -join ' OR ')"
}
Write-Debug "Using WQL query $WhereQuery"
$WmiParams = @{
'Query' = $WhereQuery
'ErrorVariable' = 'MyError';
'ErrorAction' = 'SilentlyContinue'
}
} catch {
Write-Error $_.Exception.Message
}
}
Process {
try {
foreach ($Computer in $Computername) {
$WmiParams.Computername = $Computer
$WmiResult = Get-WmiObject @WmiParams
if ($MyError) {
throw $MyError
}
foreach ($Result in $WmiResult) {
if ($Result.Freespace) {
[pscustomobject]@{
'Computername' = $Computer;
'DriveLetter' = $Result.DeviceID;
'Freespace' = [int]($Result.FreeSpace / "1$SizeOutputLabel")
}
}
}
}
} catch {
Write-Error $_.Exception.Message
}
|
combined_dataset/train/non-malicious/sample_40_52.ps1
|
sample_40_52.ps1
|
#
# Module manifest for module 'Microsoft.SME.Shell'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.SME.Shell.psm1'
# Version number of this module.
ModuleVersion = '4.174.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '80F3B499-1FD9-43BC-AAAA-EBB12DD958A1'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Disable-WACSHCredSspClientRole',
'Disable-WACSHCredSspManagedServer',
'Enable-WACSHCredSSPClientRole',
'Enable-WACSHCredSspManagedServer',
'Get-WACSHArcStatus',
'Get-WACSHCimWin32LogicalDisk',
'Get-WACSHCimWin32NetworkAdapter',
'Get-WACSHCimWin32OperatingSystem',
'Get-WACSHCimWin32PhysicalMemory',
'Get-WACSHCimWin32Processor',
'Get-WACSHClusterInventory',
'Get-WACSHClusterNodes',
'Get-WACSHCredSspClientConfigurationOnGateway',
'Get-WACSHCredSspClientRole',
'Get-WACSHCredSspManagedServer',
'Get-WACSHDecryptedDataFromNode',
'Get-WACSHEncryptionJWKOnNode',
'Get-WACSHRebootPendingStatus',
'Get-WACSHScheduledTask',
'Get-WACSHServerInventory',
'Get-WACSHSystemLockdownPolicy',
'Get-WACSHUpdateStatus',
'New-WACSHWindowsAdminCenterUpdateSchedule',
'Remove-WACSHInstallUpdateScheduledTask',
'Set-WACSHAzureHybridManagement',
'Start-WACSHScheduledReboot',
'Stop-WACSHReboot',
'Test-WACSHCredSsp',
'Test-WACSHScriptCanBeRun'
)
# Function attributes: {"localScripts":["Disable-WACSHCredSspClientRole","Disable-WACSHCredSspManagedServer","Enable-WACSHCredSSPClientRole","Enable-WACSHCredSspManagedServer","Get-WACSHArcStatus","Get-WACSHCimWin32LogicalDisk","Get-WACSHCimWin32NetworkAdapter","Get-WACSHCimWin32OperatingSystem","Get-WACSHCimWin32PhysicalMemory","Get-WACSHCimWin32Processor","Get-WACSHClusterInventory","Get-WACSHClusterNodes","Get-WACSHCredSspClientConfigurationOnGateway","Get-WACSHCredSspClientRole","Get-WACSHCredSspManagedServer","Get-WACSHDecryptedDataFromNode","Get-WACSHEncryptionJWKOnNode","Get-WACSHRebootPendingStatus","Get-WACSHScheduledTask","Get-WACSHServerInventory","Get-WACSHSystemLockdownPolicy","Get-WACSHUpdateStatus","New-WACSHWindowsAdminCenterUpdateSchedule","Remove-WACSHInstallUpdateScheduledTask","Set-WACSHAzureHybridManagement","Start-WACSHScheduledReboot","Stop-WACSHReboot","Test-WACSHCredSsp","Test-WACSHScriptCanBeRun"],"externalScripts":[]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVAJlfSzYLTBpC
# WMRNLcmmYQI4GK5bMwzRuQivnSq4BqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII80i+cK80Q6TYjNsXFjKR4Y
# jK8YiolA/+hBA0DpPDbKMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAn6nmRfw6CVAG3tQtsrEHCFWurTn0kmeuGrIQguQ8jorBXSYqAhx5CthA
# m+xxFqRXBg+86Cd6tgHnLK/MikYPViJtCEOrVq6uuMMYV7sACJm31JZ2Kmt0WzQ6
# K1Nn6LuoWYwcEMtTy9RuuGPVxiSYP8nkLr4xnEsQ+EQSqMJ1QWQbbim2/1zMJmdk
# rnNm53oiHk2wWBXELA0FXj4/hDZU0cA9iLCeyMG4C8m5zm9DZePMqgNvCEuQCtGk
# 5YUCPYtTsREQWle23n8jsXtfxC47tlxpbUKH27+PUVlpleK8hpJF8ZJXxXXl+8ET
# 6s2nLgwo9BX7SVA4jBWX1dje/kwh0qGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBC8LoxHlb6lY+Zl6oZyp48iD/sNem5YsJRv6hpeg5oqgIGZeenjkwD
# GBMyMDI0MDMwNjAwMTEwOS41ODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHpMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM
# MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZImEDAiGA8yMDI0MDMwNTIzMTUy
# OFoYDzIwMjQwMzA2MjMxNTI4WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDpkiYQ
# AgEAMAYCAQACATswBwIBAAICE0owCgIFAOmTd5ACAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEAHwmJ75UvpVI0BqgUzevLz73YwLeVqhOWPFza1hNtNDUp+8lW
# J720BqfFILS2HYZC+belKRkXHF9d9s9I9gvJJ+uhm9XpnAmR1Oi0M36qpFRaI/R9
# SBUuB0KzR6GGCPS3vRipIFIk1Z8UxKH6nmtMcvF68voJbiAJFU6u6j5/a8gFGP08
# RCzrV8sg8HvmOGfRVNzOHd1nzaFNPuM4R060SXwaev1nKekPTO2+LvaP8N/mOgPp
# ZQrS++5PmSwMd02gJs2qqNMTqthSlagV8gTtHWZnvpmBV7D93KlsFUEgYD5UjZAH
# E6ACBeqvp1V4TORN8bvd6VxtPgIEsw6+Q1zM8DGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIEfJGeVOD4zma5X+e8h1FWBn1IFsMCe2ykzOrbJ16zwPMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg1Xf9PmFLuKPBqjjrpGiwHvDASJu3
# RrU/kSojASP2EXgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAfGzRfUn6MAW1gABAAAB8TAiBCBFz4Lqxj9rIhyX+w3SIoq90oUMFrUj
# B4BkCfdrz6QJqDANBgkqhkiG9w0BAQsFAASCAgADDgpMvQBYqUxfBoraz5FL4o4T
# 2zJsv8ZXOM/QJVo8A9ednuvzMzRvTGsGxB4R8Bb5QXbxXQNEckPbwScv+vNcO2bH
# N/Esogn5O9birh7DNdk1wwEhowKlp2EWINWaNTWsjr4ru033Tev4c7cvAZtBVCPM
# 9G1Va+MEeXbbmQQ/ZLBEGFyhlmHWGUBmwpiph37u/y1CBHz49DC+BazFxc3/uyLz
# dBGTMwEgJhrVktifbqe9R5ZncFKvRgHz0w5JqYlx12N7JsLAypmsfzjxzgcvsLVF
# lKKhubDRTSizJBzdUlVXmdSLk8IX+2yiFEl0bsw4c4EWIK8fZx40kwPZ9wiU5HUx
# jgKjGe1atmy44oVa6TSi4EVs84+aWRFgzjULDPAMMVlG5aSYdqxs4QJG+Oo9EwXE
# 1a92GeaCqBAEfnmMNkfqaREvj2RmieKliMo/eHQB2fvEbWcLQBRy6rwpFbZYNsu4
# OR9FqZQT5i2fkLlLOpor4XVhW4gwQhnSyjKPTgyFkSces1tiTVd/pp3UNp3qPUxD
# V5AvLBDysqV+gWMsNa5a7Pyxs4k2G9tYrjWajSNopX/YsNKs7bIr2wbtWHb2IB3U
# K88chGvP+IStpaulprjcHqU2MT/uil/7lZraoJXUlcjWSvqDiS0jTsOaTred45TQ
# wooCs8pHIsgiF7uYFQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_6_93.ps1
|
sample_6_93.ps1
|
// ==================================================================
// DCIM_CSEnabledLogicalElementCapabilities
// ==================================================================
[ dynamic, provider("dcismprovider"),
Description ("A class derived from ComputerSystem"
" to represent an DCIM's Server." )
]
class DCIM_CSEnabledLogicalElementCapabilities : CIM_EnabledLogicalElementCapabilities {
[
Description ("A unique identifier for the instance. The property value shall be \"DCIM:ComputerCap:1\"."),
Key,
Override ("InstanceID")
]
string InstanceID;
[
Description ("Boolean indicating whether the ElementName can be modified. This property value shall be FALSE."),
Mappingstrings { "FC-SWAPI.INCITS-T11|SWAPI_UNIT_CONFIG_CAPS_T|EditName" },
Modelcorrespondence { "CIM_ManagedElement.ElementName" },
Override ("ElementNameEditSupported"),
Required
]
boolean ElementNameEditSupported;
[
Description ("The user-friendly name for this instance. The property value is \"Computer System Capabilities\"."),
Override ("ElementName"),
Required
]
string ElementName;
[
Description ("RequestedStatesSupported indicates the possible states that can be requested when using the method RequestStateChange on the EnabledLogicalElement."),
Modelcorrespondence { "CIM_EnabledLogicalElement.RequestStateChange" },
Override ("RequestedStatesSupported[]"),
Required,
Valuemap { "2", "3", "11" },
Values { "Enabled", "Disabled", "Reset" }
]
uint16 RequestedStatesSupported[];
};
/* SIG # Begin signature block */
/* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOiMc3rnGq7C+g */
/* z8HWO+fXU3r0C/fjSY614MarA3brMaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCPKaKCYDs+ */
/* 8WQFiAR6GwwOm2EOx07B6Xu++atrlGKrBTBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYAoUCMWF0r4wJsYGEYebdCYrml3ZYLs7JyGvYgnf72ktGvU */
/* 9iddKeedX3xxwCgab3BbRRIf8PdZfjiTGu4wTr4uX1kXM2BlEPDgX/Qajf+u879q */
/* M2vIbRxIhu3GV8kQV5Mat9Tw49WYHKAWjUil40PswY8LmGY4WNi9cDFFw3DOxTCE */
/* jI7/sLtyT1OOMLwnQXivhuNVRVRt8l3grucT/euynlKshjYjtHIjVcPhtk+5z5b4 */
/* JmuYwxH5AM/N28xm2CuXU3+scAavD6V2Z31MXq3KzzcVoiWmRmBLAw90bQmUMY3X */
/* gMlVc7HJml1tyiKqpF7DySBZQ0A33h5x1WsCNyJpSF1nG0pOS+BLkYhGv8rtFnnk */
/* syAHfdfGUZerlETZibC6G8Ywu3SQx6empM10GFYXIZILif5TDOGYL6m3q7AnlIas */
/* 3pNksZaMo0BBsIfczda5PsKHCCRSs4Dh/HM2ngaRfgTy7HYq98fD1DAeQCxplVw8 */
/* akl1GMRHbrmh0LpKO7mhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */
/* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */
/* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQg1Y6hnROOh9uy */
/* dOw7tyJQaH6pf36FRFWoPgqUVcnXeeUCEDvocaVrTv84hlLvaSOBNwgYDzIwMjQw */
/* OTIwMDcwMDQzWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */
/* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */
/* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */
/* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */
/* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */
/* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */
/* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */
/* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */
/* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */
/* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */
/* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */
/* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */
/* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */
/* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */
/* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */
/* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */
/* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */
/* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */
/* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */
/* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */
/* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */
/* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */
/* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */
/* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */
/* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */
/* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */
/* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */
/* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */
/* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */
/* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */
/* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */
/* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */
/* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */
/* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */
/* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */
/* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */
/* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */
/* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */
/* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */
/* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */
/* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */
/* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */
/* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */
/* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */
/* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */
/* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */
/* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */
/* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */
/* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */
/* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */
/* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */
/* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */
/* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */
/* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */
/* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */
/* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */
/* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */
/* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */
/* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */
/* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */
/* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */
/* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */
/* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */
/* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */
/* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */
/* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */
/* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */
/* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */
/* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */
/* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */
/* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */
/* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */
/* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */
/* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */
/* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */
/* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */
/* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */
/* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */
/* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */
/* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */
/* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */
/* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */
/* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */
/* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */
/* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */
/* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */
/* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */
/* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */
/* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */
/* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */
/* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */
/* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */
/* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */
/* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */
/* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */
/* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */
/* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */
/* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */
/* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */
/* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */
/* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */
/* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */
/* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */
/* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */
/* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */
/* MDcwMDQzWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */
/* GZzPQDAvBgkqhkiG9w0BCQQxIgQg61JNO6svT79XP0UUtyynfV/jbltuE8GVnOxd */
/* NlL3dd8wNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */
/* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAh0YDVzt1SZE5I/NCU3Oo */
/* jOl5LrTWTw602iVNsnqJy6A944It0qVv+WGBMpgraLbcJiV4e/iH41K8epTZolXO */
/* pEmPi2YLzw8memfHIXxcP0L66mC3zgcSw5ifOjz+sC6kn15l+D/MZFgrSF/fUkZT */
/* WejSLIUiq6uNS7opWG5DvcO6hWPu2rzZpbiiZFjT0nI9vPnUYQTUs1ZcqAB9MS36 */
/* MCcS5YXPGa7iRaOkyS/wZw0OqljLQPvG7jIeJnRXYVDrnOh+OCKi18ciaaRzb8qa */
/* 810cLd7HcsCrg2h8NoWKSdvtU86J+JiuDl9iOIbsWFc9KsL3Qk/BYnIAYniBbUQB */
/* uZgK5/Tuzcyl00AS0AXkGhNBkXZFm/MKiHFYY7NMw4qLcBUDpECsMqkCj+toxcYN */
/* iIs9dO3dcqg+MbwRhpVDu1wk6hsOqKYzr8tlm/efD7YiDzK/Efq3M6PR3RRGJOZJ */
/* v0nHA17mwrYCGkiIG4SI+CUjL9pltRKHVcENI1rT5JKgumVkj9SRoESqxEr+PL2z */
/* l0M6f3HO63l5oPUrLd/czHsuGB8u4svrlk3z7s78uL76mIBz3VSzsPdrQ4PF6DHT */
/* gA0U1W2OmB7p+Zm+pbDC3c4L70CwqNngrewjS1bBQGnyj3mCz/DR13q58E7bhpcs */
/* mMdnKOvIfTT1hIpaXSD4bbk= */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_13_7.ps1
|
sample_13_7.ps1
|
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Ja
PromptNoString=&Nein
BundleFound=Bundle gefunden: {0}
PackageFound=Paket gefunden: {0}
EncryptedBundleFound=Verschlüsseltes Bundle gefunden: {0}
EncryptedPackageFound=Verschlüsseltes Paket gefunden: {0}
CertificateFound=Zertifikat gefunden: {0}
DependenciesFound=Abhängigkeitspaket(e) gefunden:
GettingDeveloperLicense=Entwicklerlizenz wird abgerufen...
InstallingCertificate=Zertifikat wird installiert...
InstallingPackage=\nApp wird installiert...
AcquireLicenseSuccessful=Entwicklerlizenz wurde erfolgreich abgerufen.
InstallCertificateSuccessful=das Zertifikat wurde erfolgreich installiert.
Success=\nErfolgreich: Ihre App wurde erfolgreich installiert.
WarningInstallCert=\nSie sind dabei, ein digitales Zertifikat im Zertifikatspeicher "Vertrauenswürdige Personen" Ihres Computers zu installieren. Diese Aktion stellt ein ernstzunehmendes Risiko dar und sollte nur ausgeführt werden, wenn Sie dem Aussteller dieses digitalen Zertifikats vertrauen.\n\nSie sollten das zugeordnete digitale Zertifikat manuell deinstallieren, wenn Sie mit der Verwendung dieser App fertig sind. Anweisungen zu diesem Vorgang finden Sie hier: http://go.microsoft.com/fwlink/?LinkId=243053\n\nMöchten Sie den Vorgang wirklich fortsetzen?\n\n
ElevateActions=\nFühren Sie vor dem Installieren dieser App die folgenden Schritte aus:
ElevateActionDevLicense=\t- Erwerben Sie eine Entwicklerlizenz
ElevateActionCertificate=\t- Installieren Sie das Signaturzertifikat
ElevateActionsContinue=Zum Fortfahren sind Administratoranmeldeinformationen erforderlich. Akzeptieren Sie die Aufforderung der Benutzerkontensteuerung (UAC) und geben Sie Ihr Administratorkennwort ein, wenn Sie dazu aufgefordert werden.
ErrorForceElevate=Sie müssen Administratoranmeldeinformationen eingeben, um fortzufahren. Führen Sie dieses Skript ohne den "-Force"-Parameter oder von einem PowerShell-Fenster mit erhöhten Rechten aus.
ErrorForceDeveloperLicense=Für den Erwerb einer Entwicklerlizenz ist eine Interaktion des Benutzers erforderlich. Führen Sie das Skript ohne den "-Force"-Parameter erneut aus.
ErrorLaunchAdminFailed=Fehler: Es konnte kein neuer Prozess als Administrator gestartet werden.
ErrorNoScriptPath=Fehler: Sie müssen dieses Skript aus einer Datei heraus starten.
ErrorNoPackageFound=Fehler: Im Skriptverzeichnis wurde kein Paket oder Bundle gefunden. Stellen Sie sicher, dass sich das Paket bzw. Bundle, das Sie installieren möchten, im selben Verzeichnis befindet wie dieses Skript.
ErrorManyPackagesFound=Fehler: Im Skriptverzeichnis wurde mehr als ein Paket bzw. Bundle gefunden. Stellen Sie sicher, dass sich nur das Paket bzw. Bundle, das Sie installieren möchten, im selben Verzeichnis befindet wie dieses Skript.
ErrorPackageUnsigned=Fehler: Das Paket bzw. Bundle ist nicht digital signiert, oder die Signatur ist beschädigt.
ErrorNoCertificateFound=Fehler: Im Skriptverzeichnis wurde kein Zertifikat gefunden. Stellen Sie sicher, dass sich das Zertifikat, das zum Signieren des zu installierenden Pakets oder Bundles verwendet wurde, im selben Verzeichnis befindet wie dieses Skript.
ErrorManyCertificatesFound=Fehler: Im Skriptverzeichnis wurde mehr als ein Zertifikat gefunden. Stellen Sie sicher, dass sich nur das Zertifikat, das zum Signieren des zu installierenden Pakets oder Bundles verwendet wurde, im selben Verzeichnis befindet wie dieses Skript.
ErrorBadCertificate=Fehler: Die Datei "{0}" ist kein gültiges digitales Zertifikat. CertUtil wurde mit dem Fehlercode {1} zurückgegeben.
ErrorExpiredCertificate=Fehler: Das Entwicklerzertifikat "{0}" ist abgelaufen. Eine mögliche Ursache ist, dass die Systemuhr nicht auf das richtige Datum und die richtige Uhrzeit eingestellt ist. Wenden Sie sich an den App-Inhaber, damit dieser ein Paket oder Bundle mit einem gültigen Zertifikat erstellt, wenn die Systemeinstellungen richtig sind.
ErrorCertificateMismatch=Fehler: Das Zertifikat stimmt nicht mit dem Zertifikat überein, das zum Signieren des Pakets oder Bundles verwendet wurde.
ErrorCertIsCA=Fehler: Das Zertifikat darf keine Zertifizierungsstelle sein.
ErrorBannedKeyUsage=Fehler: Das Zertifikat darf nicht über die folgende Schlüsselverwendung verfügen: {0}. Die Schlüsselverwendung darf nicht angegeben sein oder muss "DigitalSignature" entsprechen.
ErrorBannedEKU=Fehler: Das Zertifikat darf nicht die folgende erweiterte Schlüsselverwendung besitzen: {0}. Es sind nur die EKUs "Codesignieren" und "Lebensdauersignieren" zulässig.
ErrorNoBasicConstraints=Fehler: Die Basiseinschränkungsextension des Zertifikats fehlt.
ErrorNoCodeSigningEku=Fehler: Die erweiterte Schlüsselverwendung des Zertifikats für das Codesignieren fehlt.
ErrorInstallCertificateCancelled=Fehler: Die Installation des Zertifikats wurde abgebrochen.
ErrorCertUtilInstallFailed=Fehler: Das Zertifikat konnte nicht installiert werden. CertUtil wurde mit dem Fehlercode "{0}" zurückgegeben.
ErrorGetDeveloperLicenseFailed=Fehler: Es konnte keine Entwicklerlizenz erworben werden. Weitere Informationen finden Sie unter http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Fehler: Das Zertifikat konnte nicht installiert werden. Status: {0}. Weitere Informationen finden Sie unter http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Fehler: Die App konnte nicht installiert werden.
ErrorAddPackageFailedWithCert=Fehler: Die App konnte nicht installiert werden. Zur Wahrung der Sicherheit sollten Sie die Deinstallation des Signaturzertifikats in Betracht ziehen, bis Sie die App installieren können. Anweisungen zu diesem Vorgang finden Sie unter:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/3098.ps1
|
3098.ps1
|
Set-StrictMode -Version Latest
$here = $MyInvocation.MyCommand.Path | Split-Path
Get-Module Axiom, Format | Remove-Module
Import-Module $here\..\Axiom\Axiom.psm1 -ErrorAction 'stop' -DisableNameChecking
Import-Module $here\Format.psm1 -ErrorAction 'stop' -DisableNameChecking
function New-PSObject ([hashtable]$Property) {
New-Object -Type PSObject -Property $Property
}
function New-Dictionary ([hashtable]$Hashtable) {
$d = new-object "Collections.Generic.Dictionary[string,object]"
$Hashtable.GetEnumerator() | foreach { $d.Add($_.Key, $_.Value) }
$d
}
Describe "Format-Collection" {
It "Formats collection of values '<value>' to '<expected>' using comma separator" -TestCases @(
@{ Value = (1, 2, 3); Expected = "@(1, 2, 3)" }
) {
param ($Value, $Expected)
Format-Collection -Value $Value | Verify-Equal $Expected
}
}
Describe "Format-Number" {
It "Formats number to use . separator (tests anything only on non-english systems --todo)" -TestCases @(
@{ Value = 1.1; },
@{ Value = [double] 1.1; },
@{ Value = [float] 1.1; },
@{ Value = [single] 1.1; },
@{ Value = [decimal] 1.1; }
) {
param ($Value)
Format-Number -Value $Value | Verify-Equal "1.1"
}
}
Describe "Format-Boolean" {
It "Formats boolean '<value>' to '<expected>'" -TestCases @(
@{ Value = $true; Expected = '$true' },
@{ Value = $false; Expected = '$false' }
) {
param($Value, $Expected)
Format-Boolean -Value $Value | Verify-Equal $Expected
}
}
Describe "Format-Null" {
It "Formats null to '`$null'" {
Format-Null | Verify-Equal '$null'
}
}
Describe "Format-String" {
It "Formats empty string to '<empty>'" {
Format-String -Value "" | Verify-Equal '<empty>'
}
It "Formats string to be sorrounded by quotes" {
Format-String -Value "abc" | Verify-Equal "'abc'"
}
}
Describe "Format-DateTime" {
It "Formats date to orderable format with ticks" {
Format-Date -Value ([dateTime]239842659899234234) | Verify-Equal '0761-01-12T16:06:29.9234234'
}
}
Describe "Format-ScriptBlock" {
It "Formats scriptblock as string with curly braces" {
Format-ScriptBlock -Value {abc} | Verify-Equal '{abc}'
}
}
Describe "Format-Nicely" {
It "Formats value '<value>' correctly to '<expected>'" -TestCases @(
@{ Value = $null; Expected = '$null'}
@{ Value = $true; Expected = '$true'}
@{ Value = $false; Expected = '$false'}
@{ Value = 'a' ; Expected = "'a'"},
@{ Value = '' ; Expected = '<empty>'},
@{ Value = ([datetime]636545721418385266) ; Expected = '2018-02-18T17:35:41.8385266'},
@{ Value = 1; Expected = '1' },
@{ Value = (1, 2, 3); Expected = '@(1, 2, 3)' },
@{ Value = 1.1; Expected = '1.1' },
@{ Value = [int]; Expected = '[int]'}
) {
param($Value, $Expected)
Format-Nicely -Value $Value | Verify-Equal $Expected
}
}
Describe "Format-Type" {
It "Given '<value>' it returns the correct shortened type name '<expected>'" -TestCases @(
@{ Value = [int]; Expected = 'int' },
@{ Value = [double]; Expected = 'double' },
@{ Value = [string]; Expected = 'string' },
@{ Value = $null; Expected = '<none>' }
) {
param($Value, $Expected)
Format-Type -Value $Value | Verify-Equal $Expected
}
}
Describe "Get-ShortType" {
It "Given '<value>' it returns the correct shortened type name '<expected>'" -TestCases @(
@{ Value = 1; Expected = 'int' },
@{ Value = 1.1; Expected = 'double' },
@{ Value = 'a' ; Expected = 'string' },
@{ Value = $null ; Expected = '<none>' },
@{ Value = New-PSObject @{Name = 'Jakub'} ; Expected = 'PSObject'},
@{ Value = [Object[]]1, 2, 3 ; Expected = 'collection' }
) {
param($Value, $Expected)
Get-ShortType -Value $Value | Verify-Equal $Expected
}
}
|
combined_dataset/train/non-malicious/1530.ps1
|
1530.ps1
|
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$GitHubAuthToken,
[Parameter(Mandatory=$true)]
[string]
$GitHubUsername,
[Parameter(Mandatory=$true)]
[string]
$BitbucketExportJsonPath,
[int]
$Count = 1
)
Set-StrictMode -Version 'Latest'
$credential = '{0}:{1}' -f $GitHubUsername,$GitHubAuthToken
$authHeaderValue = 'Basic {0}' -f [Convert]::ToBase64String( [Text.Encoding]::UTF8.GetBytes($credential) )
$headers = @{
'Authorization' = $authHeaderValue;
'Accept' = 'application/vnd.github.v3+json';
}
$issuesUri = 'https://api.github.com/repos/pshdo/Carbon/issues'
$githubIssues = Invoke-RestMethod -Method Get -UseBasicParsing -Uri $issuesUri -Headers $headers
$issueData = Get-Content -Path $BitbucketExportJsonPath -Raw | ConvertFrom-Json
$issueData.issues |
Where-Object { $_.status -eq 'open' -or $_.status -eq 'new' } |
Select-Object -First $Count |
ForEach-Object {
$bbIssue = $_
$issueTag = 'bb-issue-{0}' -f $bbIssue.id
$githubIssue = $githubIssues | Where-Object { ($_.body -match '\b{0}\b' -f [regex]::Escape($issueTag)) }
if( -not $githubIssue )
{
$bbIssueUri = 'https://bitbucket.org/splatteredbits/carbon/issues/{0}' -f $bbIssue.id
$author = ''
$authorMention = ''
$createdOn = [datetime]$bbIssue.created_on
$issueImportTitle = 'Imported from [Bitbucket issue
if( $bbIssue.reporter -ne $GitHubUsername )
{
$author = ' by [{0}](https://bitbucket.org/{0})' -f $bbIssue.reporter
$authorMention = " / @$($bbIssue.reporter)"
}
$body = @"
-----
$($bbIssue.content)
"@
$githubIssueJson = [pscustomobject]@{
title = $_.title;
body = $body;
labels = @( $_.priority, $_.kind, 'from-bitbucket' );
} | ConvertTo-Json -Depth 100
$githubIssue = Invoke-RestMethod -Method Post -Uri $issuesUri -Headers $headers -Body $githubIssueJson -UseBasicParsing
}
$githubComments = Invoke-RestMethod -Method Get -Uri $githubIssue.comments_url -Headers $headers
$issueData.comments |
Where-Object { $_.issue -eq $bbIssue.id -and $_.content } |
Sort-Object -Property { [int]$_.id } |
ForEach-Object {
$comment = $_
$commentTag = 'bb-issue-comment-{0}' -f $comment.id
$gitHubComment = $githubComments | Where-Object { $_.body -match ('\b{0}\b' -f [regex]::Escape($commentTag)) }
$author = ''
$authorMention = ''
$created_on = [datetime]$comment.created_on
if( $comment.user -ne $GitHubUsername )
{
$author = ' by [{0}](https://bitbucket.org/{0})' -f $comment.user
$authorMention = ' / @{0}' -f $comment.user
}
if( -not $githubComment )
{
$commentBody = @"
$($comment.content)
"@
$commentJson = [pscustomobject]@{
body = $commentBody
} | ConvertTo-Json
Invoke-RestMethod -Method Post -Uri $githubIssue.comments_url -Headers $headers -Body $commentJson -UseBasicParsing
}
}
}
|
combined_dataset/train/non-malicious/Get-MSDNInfo.ps1
|
Get-MSDNInfo.ps1
|
function Get-MSDNInfo
{
<#
.SYNOPSIS
Opens the MSDN web page of an object member: type, method or property.
.DESCRIPTION
The Get-MSDNInfo function enables you to quickly open a web browser to the MSDN web
page of any given instance of a .NET object. You can also refer to Get-MSDNInfo by its alias: 'msdn'.
.PARAMETER InputObject
Specifies an instance of a .NET object.
.PARAMETER Name
Specifies one member name (type, property or method name).
.PARAMETER MemberType
Specifies the type of the object member.
Possible values are: 'Type','Property','Method' or their shortcuts: 'T','M','P'.
The default value is 'Type'.
.PARAMETER Culture
If MSDN has localized versions then you can use this parameter with a value of the localized
version culture string. The default value is 'en-US'. The full list of cultures can be found by
executing the following command:
PS > [System.Globalization.CultureInfo]::GetCultures('AllCultures')
.PARAMETER List
The List parameter orders the function to print a list of the incoming object's methods and properties.
You can use the List parameter to get a view of the object members that the function support.
.EXAMPLE
PS> $ps = Get-Process -Id $pid
PS> $ps | Get-MSDNInfo -List
TypeName: System.Diagnostics.Process
MemberType Name
---------- ----
Method BeginErrorReadLine
Method BeginOutputReadLine
Method CancelErrorRead
Method CancelOutputRead
Method Close
Method CloseMainWindow
Method CreateObjRef
Method Dispose
Method EnterDebugMode
Method Equals
Method GetCurrentProcess
Method GetHashCode
Method GetLifetimeService
Method GetProcessById
Method GetProcesses
(...)
Property BasePriority
Property Container
Property EnableRaisingEvents
Property ExitCode
Property ExitTime
Property Handle
Property HandleCount
Property HasExited
Property Id
Property MachineName
Property MainModule
(...)
Description
-----------
The first command store the current session process object in a variable named $ps.
The variable is piped to Get-MSDNInfo which specifies the List parameter. The result is a list of the process object members.
.EXAMPLE
PS> $date = Get-Date
PS> Get-MSDNInfo -InputObject $date -MemberType Property
TypeName: System.DateTime
1. Date
2. Day
3. DayOfWeek
4. DayOfYear
5. Hour
6. Kind
7. Millisecond
8. Minute
9. Month
10. Now
11. Second
12. Ticks
13. TimeOfDay
14. Today
15. UtcNow
16. Year
Enter the Property item number ( Between 1 and 16. Press CTRL+C to cancel):
Description
-----------
The command gets all the properties of the date object and prints a numbered menu.
You are asked to supply the property item number. Once you type the number and press the Enter key, the function
invokes the given property web page in the default browser.
.EXAMPLE
PS> $date = Get-Date
PS> Get-MSDNInfo -InputObject $date
Description
-----------
Opens the web page of the object type name.
.EXAMPLE
Get-Date | Get-MSDNInfo -Name DayOfWeek -MemberType Property
Description
-----------
If you know the exact property name and you don't want the function to print the numbered menu then
you can pass the property name as an argument to the MemberType parameter. This will open the MSDN
web page of the DayOfWeek property of the DateTime structure.
.EXAMPLE
PS> $winrm = Get-Service -Name WinRM
PS> $winrm | msdn -mt Method
TypeName: System.ServiceProcess.ServiceController
1. Close
2. Continue
3. CreateObjRef
4. Dispose
5. Equals
6. ExecuteCommand
7. GetDevices
8. GetHashCode
9. GetLifetimeService
10. GetServices
11. GetType
12. InitializeLifetimeService
13. Pause
14. Refresh
15. Start
16. Stop
17. ToString
18. WaitForStatus
Enter the Method item number ( Between 1 and 18. Press CTRL+C to cancel):
Description
-----------
The command prints a numbered menu of the WinRM service object methods.
You are asked to supply the method item number. Once you type the number and press the Enter
key, the function invokes the given method web page in the default browser.
The command also uses the 'msdn' alias of the function Get-MSDNInfo and the alias 'mt' of the MemberType parameter.
.EXAMPLE
$date | Get-MSDNInfo -Name AddDays -MemberType Method
Description
-----------
Opens the page of the AddDays DateTime method.
.NOTES
Author: Shay Levy
Blog : http://blogs.microsoft.co.il/blogs/ScriptFanatic/
.LINK
http://blogs.microsoft.co.il/blogs/ScriptFanatic/
#>
[CmdletBinding(DefaultParameterSetName='Type')]
param(
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true)]
[ValidateNotNullOrEmpty()]
[System.Object]$InputObject,
[Parameter(ParameterSetName='Type')]
[ValidateNotNullOrEmpty()]
[System.String]$Name,
[Parameter(ParameterSetName='Type')]
[ValidateNotNullOrEmpty()]
[ValidateSet('Type','Method','Property','t','m','p')]
[Alias('mt')]
[System.String]$MemberType='Type',
[Parameter(ParameterSetName='Type')]
[ValidateNotNullOrEmpty()]
[System.String]$Culture='en-US',
[Parameter(ParameterSetName='List')]
[switch]$List
)
begin
{
$baseUrl = "http://msdn.microsoft.com/$Culture/library/"
# exclude special name members
$SpecialName = [System.Reflection.MethodAttributes]::SpecialName
switch -regex($MemberType)
{
'^(Type|t)$' {$MemberType='Type'; break}
'^(Method|m)$' {$MemberType='Method'; break}
'^(Property|p)$' {$MemberType='Property'; break}
default {$MemberType='Type'}
}
}
process
{
if($MemberType -eq 'Type' -AND $Name)
{
Throw "Invalid 'MemberType' value. Please enter another value: 'Property' or 'Method'."
}
if($PSCmdlet.ParameterSetName -eq 'List')
{
Write-Host "`n`t TypeName: $($InputObject.GetType().FullName)"
$InputObject.GetType().GetMembers() | Where-Object {$_.MemberType -match '^(method|property)$' -AND !($_.Attributes -band $SpecialName)} | Sort-Object MemberType,Name -Unique | Format-Table MemberType,Name -Auto
}
else
{
$member = $InputObject.GetType().GetMembers() | Where-Object {$_.MemberType -eq $MemberType -AND !($_.Attributes -band $SpecialName)} | Select-Object Name,MemberType,DeclaringType -Unique | Sort-Object Name
if($MemberType -eq 'Type')
{
Start-Process -FilePath ("$baseUrl{0}.aspx" -f $InputObject.GetType().FullName)
break
}
if($Name)
{
$m = $member | Where-Object {$_.MemberType -eq $MemberType -AND $_.Name -eq $Name}
if($m)
{
Start-Process -FilePath ("$baseUrl{0}.{1}.aspx" -f $m.DeclaringType,$m.Name)
}
else
{
Write-Error "'$Name' is not a $MemberType of '$($InputObject.GetType().FullName)'. Check the Name and try again."
}
}
else
{
# display numbered members menu
Write-Host "`n TypeName: $($InputObject.GetType().FullName)`n"
for($i=0;$i -lt $member.count; $i++)
{
Write-Host "$($i+1). $($member[$i].name)"
}
do{
[int]$num = Read-Host -Prompt "`nEnter the $membertype item number ( Between 1 and $($member.count). Press CTRL+C to cancel)"
} while ( $num -lt 1 -or $num -gt $member.count)
Start-Process -FilePath ("$baseUrl{0}.{1}.aspx" -f $member[$num-1].DeclaringType,$member[$num-1].Name)
}
}
}
}
Set-Alias -Name msdn -Value Get-MSDNInfo
|
combined_dataset/train/non-malicious/WakeOnLan.ps1
|
WakeOnLan.ps1
|
#wakeonlan $computer
function WakeOnLan($computer)
{
$select=$select |where-object {$_.computername -eq $computer} |Select-Object mac
if ($select.mac -eq $null)
{
echo "workstation not found.epic fail. use all to wake'em all"
}
else
{
$select.mac -match "(..)(..)(..)(..)(..)(..)" | out-null
$mac= [byte[]]($matches[1..6] |% {[int]"0x$_"})
$UDPclient = new-Object System.Net.Sockets.UdpClient
$UDPclient.Connect(([System.Net.IPAddress]::Broadcast),4000)
$packet = [byte[]](,0xFF * 102)
6..101 |% { $packet[$_] = $mac[($_%6)]}
$UDPclient.Send($packet, $packet.Length)
echo "workstation $computer is booting up..."
}
}
#wakeonlan all the computers
function WakeOnLanAll
{
$computers=$select | Select-Object computername
foreach ($computer in $computers)
{
$target = $computer.computername
WakeOnLan($target)
#delay to be powergrid friendly
Start-Sleep -seconds 5
}
}
#shutdown $computer
function ShutDown($computer)
{
if ($computer.ToLower() -eq "all")
{
$select=$select|Select-Object computername
foreach ($computername in $select)
{
$target=$computername.computername
get-wmiobject win32_operatingsystem -computer $target | foreach {$_.shutdown()}
}
}
else {
$select=$select |where-object {$_.computername -eq $computer} |Select-Object computername
if ($select.computername -eq $null)
{
echo "workstation $computer not found.epic fail. use all to kill'em all"
}
else
{
get-wmiobject win32_operatingsystem -computer $computer | foreach {$_.Shutdown()}
}
}
}
####reboot $computer
function Reboot($computer)
{
#reboot all
if ($computer.ToLower() -eq "all")
{
$select=$select|Select-Object computername
foreach ($computername in $select)
{
$target=$computername.computername
get-wmiobject win32_operatingsystem -computer $target | foreach {$_.reboot()}
}
}
else {
$select=$select |where-object {$_.computername -eq $computer} |Select-Object computername
#check input
if ($select.computername -eq $null)
{
echo "workstation $computer not found.epic fail. use all to kill'em all"
}
#reboot
else
{
get-wmiobject win32_operatingsystem -computer $computer | foreach {$_.reboot()}
#delay to be powergrid friendly
Start-Sleep -seconds 5
}
}
}
###################
$option=read-host "Enter option"
$select=Import-Csv workstations.csv
switch ($option)
{
"wol" {
$computer=read-host "Enter Workstation to wake..."
if ($computer -eq "all")
{
WakeOnLanAll
}
else {
WakeOnLan($computer)
ping -4 -n 25 $computer
}
}
"reboot" {
$computer=read-host "Enter Workstation to reboot..."
Reboot($computer)
}
"shutdown" {
$computer=read-host "Enter Workstation to kill..."
Shutdown($computer)
}
default {echo "error!options are : wol, reboot, shutdown"}
}
|
combined_dataset/train/non-malicious/sample_12_93.ps1
|
sample_12_93.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vault'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vault.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vault Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList',
'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList',
'Invoke-OCIVaultRotateSecret',
'Invoke-OCIVaultScheduleSecretDeletion',
'Invoke-OCIVaultScheduleSecretVersionDeletion',
'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret',
'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretRotation',
'Stop-OCIVaultSecretVersionDeletion', 'Update-OCIVaultSecret'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4203.ps1
|
4203.ps1
|
param
(
[ValidateNotNullOrEmpty()]$MSPFileName = 'accessde-en-us.msp',
[ValidateNotNullOrEmpty()]$MSPProperty = 'KBArticle Number'
)
function Get-MSPFileInfo {
param
(
[Parameter(Mandatory = $true)][IO.FileInfo]$Path,
[Parameter(Mandatory = $true)][ValidateSet('Classification', 'Description', 'DisplayName', 'KBArticle Number', 'ManufacturerName', 'ReleaseVersion', 'TargetProductName')][string]$Property
)
try {
$WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer
$MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($Path.FullName, 32))
$Query = "SELECT Value FROM MsiPatchMetadata WHERE Property = '$($Property)'"
$View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null)
$Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1)
return $Value
} catch {
Write-Output $_.Exception.Message
}
}
Get-MSPFileInfo -Path $MSPFileName -Property $MSPProperty
|
combined_dataset/train/non-malicious/sample_16_17.ps1
|
sample_16_17.ps1
|
# Localized 02/17/2024 04:13 AM (GMT) 303:7.2.30118 CL_LocalizationData.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Troubleshooting
Troubleshoot_DetectDVDDevice=Checking DVD device ...
Troubleshoot_DetectDVDvideoDecoder=Checking video decoder for DVD playback ...
Troubleshoot_DetectDVDAudioDecoder=Checking audio decoder for DVD playback ...
Resolution_Title=Resolution
CDRomDeviceName=Name
PnPDeviceID=ID
Status=Status
Report_Name_CDRomDeviceInformation=DVD/CD-ROM drives
Report_Description_CDRomDeviceInformation=Information for DVD/CD-ROM drives
###PSLOC
'@
|
combined_dataset/train/non-malicious/Execute-RunspaceJob.ps1
|
Execute-RunspaceJob.ps1
|
<#
.SYNOPSIS
Executes a set of parameterized script blocks asynchronously using runspaces, and returns the resulting data.
.DESCRIPTION
Encapsulates generic logic for using Powershell background runspaces to execute parameterized script blocks in an
efficient, multi-threaded fashion.
For detailed examples of how to use the function, see http://awanderingmind.com/tag/execute-runspacejob/.
.PARAMETER ScriptBlock
The script block to execute. Should contain one or more parameters.
.PARAMETER ArgumentList
A hashtable containing data about the entity to be processed. The key should be a unique string to
identify the entity to be processed, such as a server name. The value should be another hashtable
of arguments to be passed into the script block.
.PARAMETER ThrottleLimit
The maximum number of concurrent threads to use. Defaults to 10.
.PARAMETER RunAsync
If specified, the function will not wait for all the background runspaces to complete. Instead, it will return
an array of runspace objects that can be used to further process the results at a later time.
.NOTES
Author: Josh Feierman
Date: 7/15/2012
Version: 1.1
#>
function Execute-RunspaceJob
{
[Cmdletbinding()]
param
(
[parameter(mandatory=$true)]
[System.Management.Automation.ScriptBlock]$ScriptBlock,
[parameter(mandatory=$true,ValueFromPipeline=$true)]
[System.Collections.Hashtable]$ArgumentList,
[parameter(mandatory=$false)]
[int]$ThrottleLimit = 10,
[parameter(mandatory=$false)]
[switch]$RunAsync
)
begin
{
try
{
#Instantiate runspace pool
$runspacePool = [runspacefactory]::CreateRunspacePool(1,$ThrottleLimit)
$runspacePool.Open()
#Array to hold runspace data
$runspaces = @()
#Array to hold return data
$data = @()
}
catch
{
Write-Warning "Error occurred initializing function setup."
Write-Warning $_.Exception.Message
break
}
}
process
{
# Queue all sets of parameters for execution
foreach ($Argument in $ArgumentList.Keys)
{
try
{
$rowIdentifier = $Argument
Write-Verbose "Queuing item $rowIdentifier for processing."
$runspaceRow = "" | Select-Object @{n="Key";e={$rowIdentifier}},
@{n="Runspace";e={}},
@{n="InvokeHandle";e={}}
$powershell = [powershell]::Create()
$powershell.RunspacePool = $runspacePool
$powershell.AddScript($scriptBlock).AddParameters($ArgumentList[$rowIdentifier]) | Out-Null
$runspaceRow.Runspace = $powershell
$runspaceRow.InvokeHandle = $powershell.BeginInvoke()
$runspaces += $runspaceRow
}
catch
{
Write-Warning "Error occurred queuing item '$Argument'."
Write-Warning $_.Exception.Message
}
}
}
end
{
try
{
if ($RunAsync)
{
Write-Output $runspaces
}
else
{
$totalCount = $runspaces.Count
# Wait for all runspaces to complete
while (($runspaces | Where-Object {$_.InvokeHandle.IsCompleted -eq $false}).Count -gt 0)
{
$completedCount = ($runspaces | Where-Object {$_.InvokeHandle.IsCompleted -eq $true}).Count
Write-Verbose "Completed $completedCount of $totalCount"
Start-Sleep -Seconds 1
}
# Retrieve returned data and handle any threads that had errors
foreach ($runspaceRow in $runspaces)
{
try
{
Write-Verbose "Retrieving data for item $($runspaceRow.Key)."
if ($runspaceRow.Runspace.InvocationStateInfo.State -eq "Failed")
{
$errorMessage = $runspaceRow.Runspace.InvocationStateInfo.Reason.Message
Write-Warning "Processing of item $($runspaceRow.Key) failed with error: $errorMessage"
}
else
{
$data += $runspaceRow.Runspace.EndInvoke($runspaceRow.InvokeHandle)
}
}
catch
{
Write-Warning "Error occurred processing result of runspace for set '$($runspaceRow.Key)'."
Write-Warning $_.Exception.Message
}
finally
{
$runspaceRow.Runspace.dispose()
}
}
$runspacePool.Close()
Write-Output $data
}
}
catch
{
Write-Warning "Error occurred processing returns of runspaces."
Write-Warning $_.Exception.Message
}
}
}
|
combined_dataset/train/non-malicious/sample_18_96.ps1
|
sample_18_96.ps1
|
if (![String]::IsNullOrEmpty($MergeCommitSha)) {
$regexString = "(?mi)^commit[ ][a-z0-9]{40}\r\n^Author:[ ][^\r]+\r\n^Date:[ ]+[^\r]+(\r\n)+([ ]+[\u0020-\u007E]*\r\n)+\r\ndiff[ ]--git[ ][^\r]+\r\n[^-]+---[ ][^\r]+\r\n\+\+\+\s[^\r]+"
$commitData_Capture = "(?mi)^commit[ ](?<sha>[a-z0-9]{40})\r\n(^Merge:(?<merge>[^\r]+)\r\n)?^Author:[ ](?<author>[^\r]+)\r\n^Date:[ ]+(?<date>[^\r]+)(\r\n)+(?<body>([ ]+[\u0020-\u007E]*(\r\n|\Z))+)(\r\n|\Z)(?<diff>diff[ ]--git[ ][^\r]+\r\n([^-]+---[ ](?<old_filename>[^\r]+)\r\n\+\+\+\s(?<new_filename>[^\r]+))?)?"
$patchLine = "(?mi)@@ [-\+]{1}(?<oldLine>\d+),(?<oldCount>\d+) [-\+]{1}(?<newLine>\d+)(,(?<newCount>\d+))?"
$changedLine = "(?mi)^(?<changed>[\^~]{1})"
$utf8 = Microsoft.PowerShell.Utility\New-Object System.Text.UTF8Encoding $false
$gitContent = $(git log -p --word-diff "$($MergeCommitSha)^-" --output-indicator-new=~ --output-indicator-old=^ 3>&1 2>&1)
$gitContent = $gitContent -join "`r`n"
$gitContent = $gitContent -replace "[^\u0020-\u007E\r\n]", ""
$commitDatas = @($gitContent | Get-Matches $commitData_Capture | Microsoft.PowerShell.Core\Where-Object {!(Test-Empty $_)})
$gitContent = $gitContent -replace $commitData_Capture, "~~~~~~~~~~"
$commits = @($gitContent -split '~~~~~~~~~~' | Microsoft.PowerShell.Core\Where-Object {!(Test-Empty $_)})
if ($commits.Count -gt 0) {
for ($i = 0; $i -lt $commits.Count;$i++) {
$commitData = $commitDatas[$i]
$commit = $commits[$i]
while ((Test-Empty $commit)) {
$i++
$commitData = $commitDatas[$i]
$commit = $commits[$i]
}
$old_filename = "$($commitData.old_filename)".TrimStart("a/").Trim()
$new_filename = "$($commitData.new_filename)".TrimStart("b/").Trim()
if ($new_filename -match "/dev/null") {
$deleteEvent = New-Object DeleteEvent -ArgumentList $commitData.author, $commitData.sha, $commitData.date
if (![String]::IsNullOrEmpty($old_filename)) {
if (!$prFiles.ContainsKey($old_filename)) {
$prFiles[$old_filename] = New-Object PRFile -ArgumentList $old_filename
}
$prFiles[$old_filename].DeleteEvent = $deleteEvent
}
continue;
}
if (Test-Empty $new_filename) {
continue
}
if (!$prFiles.ContainsKey($new_filename)) {
$prFiles[$new_filename] = New-Object PRFile -ArgumentList $new_filename
$prFiles[$new_filename].Content = $utf8.GetString($(git show "$($MergeCommitSha):$($commitData.new_filename)") -join "`r`n")
$prFiles[$new_filename].Blame = $(git blame $new_filename $MergeCommitSha)
}
$file = $commits[$i]
if (!(Test-Empty $commitData.old_filename) -and !(Test-Empty $commitData.new_filename)) {
$file = $file -replace $commitData_Capture, ""
$patch = $file
$tmpObject = New-Object PRCommit -ArgumentList $commitData.sha, $commitData.merge, $commitData.date, $file, $commitData.author, $old_filename, $new_filename
$tmpObject.Content = $utf8.GetString($(git show "$($commitData.sha):$($commitData.new_filename)") -join "`r`n")
if ($prFiles.ContainsKey($new_filename)) {
$prFiles[$new_filename].Commits += $tmpObject
}
}
else {
Microsoft.PowerShell.Utility\Write-Host "Get-PRData Error: CommitData was corrupt: $file"
}
}
}
else {
Microsoft.PowerShell.Utility\Write-Host "Get-PRData Error: No PR files for $PullRequestNumber"
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6LEgN8UXy+34Q
# qPP8brTyqzW82MLo7A86BO10byZu8aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBfH96znEYoTGUnNDq2tQimn
# /0+RU+U07fUz/DdU1KnOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEATevPcjd987H1nagCNcyIvyHvXaNFMu3c0MbtufDsQuZVRF60C3SpRJAp
# DmwUHm4cRN1bLKVA8bV+aZe7GZqd4QWJQ543tuGgyauAmBgYcMQH6TR1ktd3J5qG
# 0+zS0cp1Ud9UHw4ZazpBx9OjiqmNxasMtSAJcunUuIIsOq/Bu0xC94O5MdBZt86C
# PxrNsazlNOVthflL5WSdWGTINy2hPse3uSs8cUYgpoMlMr9MFOsixlGIm5Gy64N3
# nEBxHf5PlGADGUckBunfiBIHCeT9cGcwYHCx6gYeZrjXY/InJh+Zg8TQH0cetxKw
# azOYaSGJrZNx4Pk0rA1axiuc2nJiD6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBSjwiht5HuPin6/qzPjuujiQsrCAJZbsi2kGwcVr4W3wIGZdX7wA4a
# GBMyMDI0MDIyMjE4NTc0My44MDVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmBy34wIhgPMjAyNDAyMjIyMTMyNDZaGA8yMDI0MDIyMzIxMzI0NlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6YHLfgIBADAKAgEAAgIRSwIB/zAHAgEAAgIR2zAK
# AgUA6YMc/gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJvBBMA5ai7Z+UO/
# zymDse3P7lCOhXWj1JxhUfv//cBwLu60QlPDdZUbwBAuNTHD2E50NND6QfOd8lNB
# 8FpjUO3CK8TR67vfZFSJe8U+RdPYKu2bz/4i6noOiAov6NSrc9d+rmsk3A0mmYkM
# uIYb55+9QzaMJgMsGoo7zTWTEt5bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgmD2XBLv0YmS/CHdVAvVP2GbFcQz8ZMUpAvJbNqXRZ1cwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH
# 9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 5Y9qwPM9tAujAAEAAAHlMCIEIL7fbM4gzPMBLFxpC97e81I6i1kf2GHmjt+ZJos9
# ecOqMA0GCSqGSIb3DQEBCwUABIICAC8P9WmRTf22+uHVckQv+ED6zPIr9A3pYmcC
# CNJyY4cHb4DtkOqPjFWG0cS59cy/1ukeKgWxZ2P3ApGHMqWcyNP8AbHGuwn978kR
# 0Kov8IUbldMHs3u3oxl0Stl5UY537sipWq88dUctq0summP+AHIDlbV+BuP4HOPK
# Dy2ZoXtNBzpTj4bfL+6Tety+D4oZs5TIaVnr9wr2Yr1E2tsuw+bIBqt2yat0tovR
# enEwrkArE8FBYFa0BDB3CP+1Q4reUM/w0EavJ2T1RKEVSVJUNmRmLb+iSjeyaoVV
# eqmqkQ/tB6YA3QPnJWzaSSr02nqMz06JI/4F1Zd7u7kZJ41kjKTWwLG3mwhbErPD
# t7z+98szokqW+R5i8Pl37V55o/1SXgSfo59jLFdY3mnOAGK4rYkxHEF/KNFmmX/e
# vL9lsEDTayhpHFbVBIDKtXSdWg1ZfbbS9wMaPbaobTCPsHJX3rP274Mxd1dJkICH
# Of1CCdiHmoeOMfBQJqobh66AvBnj6WYd+Ga6YxVjlKULazTmMlhZPMjdIOX0wtfZ
# Q2hxQPQGKqBhFcKM21YeVnjT6zTVZwouNAR69VEjM4Jgy3Y58r/jAa5MgxxhwcnF
# zOXfkdV+Ca5egkXClSBm4ji2cJ8QJ8pJq3uw/x7uH0H+nsrqOuPrwgbq/wiEb8Kl
# zPAevqTQ
# SIG # End signature block
|
combined_dataset/train/non-malicious/2416.ps1
|
2416.ps1
|
[CmdletBinding()]
param (
[Parameter(Mandatory = $False,
ValueFromPipeline = $False,
ValueFromPipelineByPropertyName = $True)]
[string]$SiteCode = 'UHP',
[Parameter(Mandatory = $False,
ValueFromPipeline = $False,
ValueFromPipelineByPropertyName = $True)]
[string]$SiteServer = 'CONFIGMANAGER',
[Parameter(Mandatory = $True,
ValueFromPipeline = $True,
ValueFromPipelineByPropertyName = $True)]
[string]$CollectionName
)
begin {
try {
if ([Environment]::Is64BitProcess) {
throw 'This script must be run in a x86 shell.'
}
$ConfigMgrModule = "$($env:SMS_ADMIN_UI_PATH | Split-Path -Parent)\ConfigurationManager.psd1"
if (!(Test-Path $ConfigMgrModule)) {
throw 'Configuration Manager module not found in admin console path'
}
Import-Module $ConfigMgrModule
$BeforeLocation = (Get-Location).Path
} catch {
Write-Error $_.Exception.Message
}
}
process {
try {
Set-Location "$SiteCode`:"
$CommonWmiParams = @{
'ComputerName' = $SiteServer
'Namespace' = "root\sms\site_$SiteCode"
}
$CollectionId = Get-WmiObject @CommonWmiParams -Query "SELECT CollectionID FROM SMS_Collection WHERE Name = '$CollectionName'" | select -ExpandProperty CollectionID
if (!$CollectionId) {
throw "No collection found with the name $CollectionName"
}
$CollectionMembers = Get-WmiObject @CommonWmiParams -Query "SELECT Name FROM SMS_CollectionMember_a WHERE CollectionID = '$CollectionId'" | Select -ExpandProperty Name
if (!$CollectionMembers) {
Write-Warning 'No collection members found in collection'
} else {
@($CollectionMembers).foreach({
Remove-CMDeviceCollectionDirectMembershipRule -CollectionID $CollectionID -ResourceName $_ -force
})
}
} catch {
Write-Error $_.Exception.Message
}
}
end {
Set-Location $BeforeLocation
}
|
combined_dataset/train/non-malicious/sample_50_51.ps1
|
sample_50_51.ps1
|
# Get the version of the Torizon IDE Extension from package.json
$env:TEST_EXTENSION_VERSION = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).version
$env:TEST_VSCODE_CLEANUP = $true
# Start the tests from a clean environment, unless explictly setting to false
# the env variable
if ($env:TEST_VSCODE_CLEANUP -Eq $true) {
# cleanup
Write-Output "Clearing dotvscode and ~/.apollox"
# remove dotvscode
if (Test-Path "dotvscode") {
Remove-Item -Recurse -Force "dotvscode"
}
# remove .apollox
if (Test-Path -Path "$env:HOME/.apollox") {
Remove-Item -Recurse -Force "$env:HOME/.apollox"
}
}
if (!(Test-Path "dotvscode")) {
# get test-resources
# If vscode-extension-tester hasn't been released for the latest VSCode:
# https://github.com/redhat-developer/vscode-extension-tester
# use the -c <vscode version> parameter, ex: npx extest get-vscode -c 1.86.2
# When bumping vscode-extension-tester also bump this version here to the latest supported
npx extest get-vscode -s "dotvscode"
npx extest get-chromedriver -s "dotvscode"
}
# clean file stream
Write-Host "" > "dotvscode/currentTestTerminalOutput.log"
# remove out and recompiled it, this is useful for local tests
if (Test-Path .\out) {
Remove-Item -Recurse -Force .\out
}
# compile and pack
# apollox
npm --prefix ../apollox run pack
$APOLLOX_FILE = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).dependencies.apollox
$APOLLOX_FILE = $APOLLOX_FILE.replace('file:','')
Copy-Item $APOLLOX_FILE .
# apollox-vscode
npm run pack
# install
npm install
npx extest install-vsix -e "dotvscode/extensions" -f ./apollox-vscode-linux-x64-$env:TEST_EXTENSION_VERSION.vsix -s "dotvscode"
|
combined_dataset/train/non-malicious/964.ps1
|
964.ps1
|
$rgName='MyResourceGroup'
$location='eastus'
New-AzResourceGroup -Name $rgName -Location $location
$vnet1 = New-AzVirtualNetwork -ResourceGroupName $rgName -Name 'Vnet1' -AddressPrefix '10.0.0.0/16' -Location $location
$vnet2 = New-AzVirtualNetwork -ResourceGroupName $rgName -Name 'Vnet2' -AddressPrefix '10.1.0.0/16' -Location $location
Add-AzVirtualNetworkPeering -Name 'LinkVnet1ToVnet2' -VirtualNetwork $vnet1 -RemoteVirtualNetworkId $vnet2.Id
Add-AzVirtualNetworkPeering -Name 'LinkVnet2ToVnet1' -VirtualNetwork $vnet2 -RemoteVirtualNetworkId $vnet1.Id
|
combined_dataset/train/non-malicious/1369.ps1
|
1369.ps1
|
function Clear-CMofAuthoringMetadata
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$Path
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$tempDir = New-CTempDirectory -Prefix ('Carbon+ClearMofAuthoringMetadata+') -WhatIf:$false
foreach( $item in (Get-ChildItem -Path $Path -Filter '*.mof') )
{
Write-Verbose ('Clearing authoring metadata from ''{0}''.' -f $item.FullName)
$tempItem = Copy-Item -Path $item.FullName -Destination $tempDir -PassThru -WhatIf:$false
$inComment = $false
$inAuthoringComment = $false
$inConfigBlock = $false;
Get-Content -Path $tempItem |
Where-Object {
$line = $_
if( $line -like '/`**' )
{
if( $line -like '*`*/' )
{
return $true
}
$inComment = $true
return $true
}
if( $inComment )
{
if( $line -like '*`*/' )
{
$inComment = $false
$inAuthoringComment = $false
return $true
}
if( $line -like '@TargetNode=*' )
{
$inAuthoringComment = $true
return $true
}
if( $inAuthoringComment )
{
return ( $line -notmatch '^@(GeneratedBy|Generation(Host|Date))' )
}
return $true
}
if( $line -eq 'instance of OMI_ConfigurationDocument' )
{
$inConfigBlock = $true
return $true
}
if( $inConfigBlock )
{
if( $line -like '};' )
{
$inConfigBlock = $false;
return $true
}
return ($line -notmatch '(Author|(Generation(Date|Host)))=');
}
return $true
} |
Set-Content -Path $item.FullName
}
}
|
combined_dataset/train/non-malicious/sample_42_69.ps1
|
sample_42_69.ps1
|
#
# Module manifest for module 'OCI.PSModules.Mediaservices'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Mediaservices.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c1b780bd-0bdf-4759-a6cb-6edb4ac392d6'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Mediaservices Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mediaservices.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIMediaservicesMediaAssetLock',
'Add-OCIMediaservicesMediaWorkflowConfigurationLock',
'Add-OCIMediaservicesMediaWorkflowJobLock',
'Add-OCIMediaservicesMediaWorkflowLock',
'Add-OCIMediaservicesStreamCdnConfigLock',
'Add-OCIMediaservicesStreamDistributionChannelLock',
'Add-OCIMediaservicesStreamPackagingConfigLock',
'Get-OCIMediaservicesMediaAsset',
'Get-OCIMediaservicesMediaAssetDistributionChannelAttachment',
'Get-OCIMediaservicesMediaAssetDistributionChannelAttachmentsList',
'Get-OCIMediaservicesMediaAssetsList',
'Get-OCIMediaservicesMediaWorkflow',
'Get-OCIMediaservicesMediaWorkflowConfiguration',
'Get-OCIMediaservicesMediaWorkflowConfigurationsList',
'Get-OCIMediaservicesMediaWorkflowJob',
'Get-OCIMediaservicesMediaWorkflowJobsList',
'Get-OCIMediaservicesMediaWorkflowsList',
'Get-OCIMediaservicesMediaWorkflowTaskDeclarationsList',
'Get-OCIMediaservicesStreamCdnConfig',
'Get-OCIMediaservicesStreamCdnConfigsList',
'Get-OCIMediaservicesStreamDistributionChannel',
'Get-OCIMediaservicesStreamDistributionChannelsList',
'Get-OCIMediaservicesStreamPackagingConfig',
'Get-OCIMediaservicesStreamPackagingConfigsList',
'Get-OCIMediaservicesSystemMediaWorkflowsList',
'Invoke-OCIMediaservicesIngestStreamDistributionChannel',
'Move-OCIMediaservicesMediaAssetCompartment',
'Move-OCIMediaservicesMediaWorkflowCompartment',
'Move-OCIMediaservicesMediaWorkflowConfigurationCompartment',
'Move-OCIMediaservicesMediaWorkflowJobCompartment',
'Move-OCIMediaservicesStreamDistributionChannelCompartment',
'New-OCIMediaservicesMediaAsset',
'New-OCIMediaservicesMediaWorkflow',
'New-OCIMediaservicesMediaWorkflowConfiguration',
'New-OCIMediaservicesMediaWorkflowJob',
'New-OCIMediaservicesPlaylist', 'New-OCIMediaservicesSessionToken',
'New-OCIMediaservicesStreamCdnConfig',
'New-OCIMediaservicesStreamDistributionChannel',
'New-OCIMediaservicesStreamPackagingConfig',
'Remove-OCIMediaservicesMediaAsset',
'Remove-OCIMediaservicesMediaAssetDistributionChannelAttachment',
'Remove-OCIMediaservicesMediaAssetLock',
'Remove-OCIMediaservicesMediaWorkflow',
'Remove-OCIMediaservicesMediaWorkflowConfiguration',
'Remove-OCIMediaservicesMediaWorkflowConfigurationLock',
'Remove-OCIMediaservicesMediaWorkflowJob',
'Remove-OCIMediaservicesMediaWorkflowJobLock',
'Remove-OCIMediaservicesMediaWorkflowLock',
'Remove-OCIMediaservicesStreamCdnConfig',
'Remove-OCIMediaservicesStreamCdnConfigLock',
'Remove-OCIMediaservicesStreamDistributionChannel',
'Remove-OCIMediaservicesStreamDistributionChannelLock',
'Remove-OCIMediaservicesStreamPackagingConfig',
'Remove-OCIMediaservicesStreamPackagingConfigLock',
'Update-OCIMediaservicesMediaAsset',
'Update-OCIMediaservicesMediaWorkflow',
'Update-OCIMediaservicesMediaWorkflowConfiguration',
'Update-OCIMediaservicesMediaWorkflowJob',
'Update-OCIMediaservicesStreamCdnConfig',
'Update-OCIMediaservicesStreamDistributionChannel',
'Update-OCIMediaservicesStreamPackagingConfig'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mediaservices'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1220.ps1
|
1220.ps1
|
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
$hostsFile = $null
$hostname = 'example.com'
function Get-HostsEntry
{
param(
[string]
$HostName,
[string]
$Path = $hostsFile
)
$HostName = [Text.RegularExpressions.Regex]::Escape( $HostName )
Get-Content -Path $Path |
Where-Object { $_ -match ('^[0-9a-f.:]+\s+\b{0}\b' -f $HostName) }
}
function Assert-HostsEntry
{
param(
[string]
$HostName,
[string]
$Path = $hostsFile
)
(Get-HostsEntry -HostName $HostName -Path $Path) | Should Not BeNullOrEmpty
}
function Assert-NoHostsEntry
{
param(
[string]
$HostName,
[string]
$Path = $hostsFile
)
(Get-HostsEntry -HostName $HostName -Path $Path) | Should BeNullOrEmpty
}
function New-TestHostsFile
{
param(
[Parameter(ValueFromPipeline=$true)]
[string]
$InputObject
)
begin
{
$path = Join-Path -Path (Get-Item -Path 'TestDrive:').FullName -ChildPath ('Carbon+Test-RemoveHostsEntry+{0}' -f [IO.Path]::GetRandomFileName())
}
process
{
if( $InputObject )
{
$InputObject | Add-Content -Path $path
}
}
end
{
return $path
}
}
Describe 'Remove-HostsEntry when removing an IPv6 address' {
$hostsFile = '2001:4860:4860::8844 one','2001:4860:4860::8844 two' | New-TestHostsFile
Remove-HostsEntry -HostName 'two' -Path $hostsFile
It 'should remove the hosts entry' {
Get-Content -Path $hostsFile | Where-Object { $_ -like '* two' } | Should BeNullOrEmpty
Get-Content -Path $hostsFile | Where-Object { $_ -like '* one' } | Should Not BeNullOrEmpty
}
}
Describe 'Remove-HostsEntry' {
BeforeEach {
$hostsFile = New-TestHostsFile
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $hostname -Path $hostsFile
}
AfterEach {
if( (Test-Path -Path $hostsFile -PathType Leaf) )
{
Remove-Item $hostsFile
}
}
It 'should remove hosts entry' {
Remove-HostsEntry -HostName $hostname -Path $hostsFile
Assert-NoHostsEntry -HostName $hostname
}
It 'should ignore similar hosts entry with different t l d' {
$dup = '{0}m' -f $hostname
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $dup -Path $hostsFile
Remove-HostsEntry $hostname -Path $hostsFile
Assert-NoHostsEntry -HostName $hostname
Assert-HostsEntry -HostName $dup
}
It 'should ignore similar hosts entry with similar tld' {
$dup = 'example.co'
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $dup -Path $hostsFile
Remove-HostsEntry $hostname -Path $hostsFile
Assert-NoHostsEntry -HostName $hostname
Assert-HostsEntry -HostName $dup
}
It 'should ignore similar hosts entry with extra sub domain' {
$dup = 'www.{0}' -f $hostname
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $dup -Path $hostsFile
Remove-HostsEntry $hostname -Path $hostsFile
Assert-NoHostsEntry -HostName $hostname
Assert-HostsEntry -HostName $dup
}
It 'should ignore comments when removing' {
$dup = 'www.{0}' -f $hostname
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $dup -Description $hostname -Path $hostsFile
Remove-HostsEntry $hostname -Path $hostsFile
Assert-NoHostsEntry -HostName $hostname
Assert-HostsEntry -HostName $dup
}
It 'should remove multiple hosts entries' {
$hostname2 = 'www.{0}' -f $hostname
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $hostname2 -Path $hostsFile
Remove-HostsEntry -HostName $hostname,$hostname2 -Path $hostsFile
Assert-NoHostsEntry $hostname
Assert-NoHostsEntry $hostname2
}
It 'should remove multiple hosts entries from pipeline' {
$hostname2 = 'www.{0}' -f $hostname
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $hostname2 -Path $hostsFile
($hostname,$hostname2) | Remove-HostsEntry -Path $hostsFile
Assert-NoHostsEntry $hostname
Assert-NoHostsEntry $hostname2
}
It 'should operate on windows hosts file' {
Set-HostsEntry -IPAddress '1.2.3.4' -HostName $hostname
Remove-HostsEntry -HostName $hostname
Assert-NoHostsEntry -HostName $hostname -Path 'C:\Windows\system32\drivers\etc\hosts'
}
It 'should support what if' {
Remove-HostsEntry -HostName $hostname -WhatIf -Path $hostsFile
Assert-HostsEntry -HostName $hostname
}
}
|
combined_dataset/train/non-malicious/Move-Mailbox _1.ps1
|
Move-Mailbox _1.ps1
|
param(
#distribution group holding usermailbox(es)
[string] $DistGroup = "XC2010Move",
#move requests per batch/script run
[int] $BatchCount = 5
)
#remove user(s) without mailbox
Get-DistributionGroupMember $DistGroup | get-user -Filter {Recipienttype -eq "User"} -EA SilentlyContinue | Remove-DistributionGroupMember -Identity $DistGroup -Confirm:$False
#remove mailbox(es) already moved to 2010 (by previous script run)
Get-DistributionGroupMember $DistGroup | Get-Mailbox -EA SilentlyContinue -RecipientTypeDetails "UserMailbox" | Remove-DistributionGroupMember -Identity $DistGroup -Confirm:$False
#get pre-2010 mailbox(es) not yet moved
$MB2Move = Get-DistributionGroupMember $DistGroup | Get-Mailbox -EA SilentlyContinue | Where {($_.RecipientTypeDetails -eq "LegacyMailbox") -and ($_.MailboxMoveStatus -eq ‘None’) -and ($_.ExchangeUserAccountControl -ne "AccountDisabled")} | Get-Random -Count $BatchCount
#create batch label as reference
$batch = "$($env:computername)_MoveMB_{0:ddMMM_yyyy}" -f (Get-Date)
#move pre-2010 mailbox(es)
ForEach ($SingleMailbox in $MB2Move) {New-MoveRequest –Identity $SingleMailbox -BadItemLimit 100 -AcceptLargeDataLoss -Batchname $batch}
#set quotas on moved mailbox(es)
Get-DistributionGroupMember $DistGroup | Get-Mailbox -RecipientTypeDetails "UserMailbox" -EA SilentlyContinue | Where {($_.MailboxMoveStatus -eq ‘Completed’)} | Set-Mailbox -Identity $_ -IssueWarningQuota "1920MB" -ProhibitSendQuota "1984MB" -ProhibitSendReceiveQuota "2048MB"}
#remove move request(s) upon completion
Get-MoveRequest -MoveStatus Completed | Remove-MoveRequest -Confirm:$False
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.